You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I'm encountering an issue with the ArgoCD Vault plugin while using Helm with additional arguments settings. The problem arises when I try to utilize the htpasswd function within Helm, and it results in an error message stating "invalid username: user.", which content in the end will be part of the k8s manifest file.
In this configuration, placeholders for secrets are correctly replaced. However, when I use the htpasswd function in Helm, I receive the "invalid username: user" error.
To provide additional context, I'm using AWS Vault as a backend, and my username is set to "user," and my password is set to "pass."
Additionally, here is the Secret YAML file which contains htpasswd command:
It would be great if the vault-plugin runs before helm.
Then it would be possible to run a range function in the secret and generate alot of htpasswd users in 1 go.
Now this has to be generated beforehand and added to a secret which takes out the smart scalability and automation of the user creation.
I'm encountering an issue with the ArgoCD Vault plugin while using Helm with additional arguments settings. The problem arises when I try to utilize the htpasswd function within Helm, and it results in an error message stating "invalid username: user.", which content in the end will be part of the k8s manifest file.
Here is my values.yaml file configuration:
In this configuration, placeholders for secrets are correctly replaced. However, when I use the htpasswd function in Helm, I receive the "invalid username: user" error.
To provide additional context, I'm using AWS Vault as a backend, and my username is set to "user," and my password is set to "pass."
Additionally, here is the Secret YAML file which contains htpasswd command:
To further clarify, here is the plugin configuration:
Expected behavior
Secret should looks like:
Actual behavior
The text was updated successfully, but these errors were encountered: