Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support existing secrets #242

Open
ErikLundJensen opened this issue May 18, 2022 · 4 comments
Open

Support existing secrets #242

ErikLundJensen opened this issue May 18, 2022 · 4 comments

Comments

@ErikLundJensen
Copy link

Real secrets should never be in clear text in value.yaml files. Therefore it would be preferrable if existing secrets could be used in the helm chart.

For example using existing imagePullSecrets instead of the secrets generated by the chart:

{{- if .Values.image.credentials }}

@jmueller42
Copy link

@ErikLundJensen I support to not have secrets in plaintext in yaml files in repository.

This can be fixed with using helm secrets plugin. This allows to use yaml files with encrypted values and keep encrypted files in repositories and only decrypt when running helm install.

See: https://github.com/jkroepke/helm-secrets

Maybe this fixes the problem for you.

@andy-v-h
Copy link

I have an in-house CRD for pulling secrets from AWS SSM into namespaces, and as I'm trying to go to production with this chart I'm hitting similar issues. I want to use this chart as a dependency and then bring my own templates for secrets.

Is there any interest in taking PR's that loosen some of the constraints where secrets come from?

@harishdesetti1206
Copy link

The fix would be to add:

The following snippet in values.yaml

  repository: cockroachdb/cockroach
  tag: v22.1.4
  pullPolicy: IfNotPresent
  credentials: []

The following snippet in templates/statefulset.yaml under spec.template.spec

      {{- with $pullSecrets := .Values.image.pullSecrets }}
      imagePullSecrets: {{- range $k, $secretName := $pullSecrets }}
      - name: {{ $secretName }}
      {{- end }}
      {{- end }}

And just eliminate the file templates/secret.registry.yaml .
It would way easier for the developers to create their own docker registry secret from their terraform configuration or else where. We cannot ask them to write the clear text of username and password and encrypt ourselves.

@jessebot
Copy link

jessebot commented Aug 19, 2023

I know this hasn't been touched in about a year, but I would still really like an existing secret for the initially provisioned users, as right now, you have to pass in plain text passwords for users, which makes the cockroachdb helm chart unusable for me at this time. This would be a good feature for those who cannot pass in plain text passwords to any repos. This is required for some security compliance.

It looks like the work was already started here: https://github.com/cockroachdb/helm-charts/pull/272/files

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants