Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Kustomize controller envFrom helm values #35

Closed
palassis-8451 opened this issue Dec 7, 2021 · 6 comments
Closed

Kustomize controller envFrom helm values #35

palassis-8451 opened this issue Dec 7, 2021 · 6 comments
Labels
enhancement New feature or request

Comments

@palassis-8451
Copy link

palassis-8451 commented Dec 7, 2021

Is your feature request related to a problem ?

If needing to use an Azure service principal to decrypt sops secrets, there doesn't currently exist an option to configure one via the helm values.

Describe the solution you'd like.

Following a similar approach used in the flux v1 helm chart, would like to propose these values exposed and the kustomize controller template updated (see https://github.com/MxNxPx/helm-charts/tree/kustomize-envFrom).

Updated these files:

Describe alternatives you've considered.

NONE

Additional context.

The following branch should be ready for submitting a PR if sign off is given: https://github.com/MxNxPx/helm-charts/tree/kustomize-envFrom

@palassis-8451 palassis-8451 added the enhancement New feature or request label Dec 7, 2021
@dwerder
Copy link
Collaborator

dwerder commented Dec 7, 2021

Without digging to deep into that. Just a question. Does the secret mount does not work her as well?
https://github.com/fluxcd-community/helm-charts/blob/main/charts/flux2/values.yaml#L128

kustomizecontroller:
  # Defines additional mounts with secrets. Secrets must be manually created in the namespace.
  extraSecretMounts: []
    # - name: secret-files
    #   mountPath: /etc/secrets
    #   subPath: ""
    #   secretName: secret-files
    #   readOnly: true

@MxNxPx
Copy link
Contributor

MxNxPx commented Dec 7, 2021

My understanding is that would not work because I cannot specify an environment variable within the controller for it to pull from the secret mount. Also I thought it might be more confusing to go a different route than what the flux documentation specifies.

@palassis-8451
Copy link
Author

@dwerder - If there are no other questions, I am happy to create a pull request, but I believe I need someone to sign off first. Is that correct? Thanks!

@haarchri
Copy link
Collaborator

haarchri commented Dec 8, 2021

please open the PR you need to sign your commit for example git commit -sm "commit with dco" thanks

@palassis-8451
Copy link
Author

please open the PR you need to sign your commit for example git commit -sm "commit with dco" thanks

Thanks @haarchri, pull request is ready: #36

@MxNxPx
Copy link
Contributor

MxNxPx commented Dec 9, 2021

please open the PR you need to sign your commit for example git commit -sm "commit with dco" thanks

Thanks @haarchri, pull request is ready: #36

Closed the pull request per convo with @dwerder and he offered to open a new one.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants