New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
helm values from secrets and configmaps #12060
Comments
This could be addressed with #12050 |
Personally I'd want to add HTTPS and auth for both repo-server and Redis before enabling this. Those should be bare minimum protections for services which serve secrets. |
@crenshaw-dev Agreed, those things would be nice. However at the moment the only option for a case like this with no associated Git repo is to put secret data in plain-text in the Argo Application spec which is also not ideal. |
+1 |
+1 |
+1 this would be incredibly useful! |
This feature is a must haves for bridging the gap between ArgoCD and Terraform resoures. |
+1 this feature would be so useful ! |
Is this Addressed? |
Currently I am using the Argocd Vault Plugin. From terraform I created a secret in the |
Summary
I would like to be able to specify a configmap/secret and key containing Helm values for my application.
Motivation
I am using Argo to install Helm applications from a Helm repository, not a git repository, and am specifying values using the
spec.source.helm.values
field. However when my Helm values contain secrets, I would like to be able to keep them in a secret and reference the secret here instead.More generally, it would be good to be able to specify multiple values sources from configmaps, secrets and inline blocks that are passed to Helm in the order they are defined.
Because of the way I am using ArgoCD as a backend for a user-facing system, it is not practical to use files in a git repository for this.
Proposal
I propose a new field
spec.source.helm.valuesSources
that can hold references to a configmap, secret or inline block, e.g.:These values would be used at the same precedence as the current
spec.source.helm.values
block.The text was updated successfully, but these errors were encountered: