-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[imio/helm-plausible-analytics] bring your own secret #3
Comments
Salut @mrdotb 🇧🇪, Thanks for your proposal! In fact, we are also interested by this feature. We plan to use external-secret to manage our k8s secrets. Can you open a PR? So, we could work together on this feature?
I wonder if we could not simply remove all these conditions and the same in the secret.yaml file, which would result to pass some emtpy variables if the variables are not set in the values.yaml. (We could also set some default values if it is not set in the values.yaml file). What do you think ? Another solution would be to add the possibility to define extraEnv like this in the
Then, we could set in the
It would allow to add some variables which are not defined by default in the helm chart. |
On my forked version I already did the changes and it work with existing secret created with sealed-secrets or sops.
About the check on secret value from The extraEnv is a good thing for futur env added in plausible. I will rework my current fork and make a PR. |
Resoved by #4. Thanks! |
Bonjour 🇫🇷 ,
Is your feature request related to a problem? Please describe.
I want to define the secret myself. While it's possible to disable
secret.yaml
with.Values.secret.create
the name of the secret cannot be specified. To bring your own secret you have to give it the same name asname: {{ include "plausible-analytics.fullname" . }}
Describe the solution you'd like
A clear and concise description of what you want to happen.
Make the secret name configurable like in
bitnami/clickhouse
with a new key in valuesexistingSecret: ""
Describe alternatives you've considered
Additional context
I already implemented some changes locally but I'm pretty new to k8s / helm so I would like to have your input.
My idea is to add a new function in
_helpers.tpl
to get the specified secret name or default to fullname.Then use it like
In
deployment.yaml
There is some fix to make here there are many checks on values but if you bring your own secret it's does not make sense to refer values. Not sure what is the most idiomatic way to handle this case.
The text was updated successfully, but these errors were encountered: