You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Actually, all proxy settings are bond to values and deployed as env and envFrom configMaps.
As we want to hide username and password in our gitlab instance, we would like to use an existing secret that we could sync from external tools (as external secret operator).
But first i would discuss how to implement it. I see two options :
Break the existent and pass the HTTP_PROXY in a secret, generated by helm or provided by user.
Use the existent env values and adapt it.
I'd say that as we have secret information, it should be a secret. But it will break possible third party tools used by persons to tweak pod environment variable and/or configmaps holding the proxy configuration.
Any income is welcome.
The text was updated successfully, but these errors were encountered:
ClementJ35
changed the title
Add feature - Support existing secret to configure http_proxy, https_proxy and no_proxy
Add feature - Support existing secret to configure http_proxy and https_proxy
Sep 6, 2024
Hi,
Actually, all proxy settings are bond to values and deployed as env and envFrom configMaps.
As we want to hide username and password in our gitlab instance, we would like to use an existing secret that we could sync from external tools (as external secret operator).
I will make a PR soon, working here : https://github.com/ClementJ35/harbor-helm/tree/add-existing-secret-to-proxy
But first i would discuss how to implement it. I see two options :
I'd say that as we have secret information, it should be a secret. But it will break possible third party tools used by persons to tweak pod environment variable and/or configmaps holding the proxy configuration.
Any income is welcome.
The text was updated successfully, but these errors were encountered: