You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi,
It looks like the chart is heavily reliant in using its own defined secret which is saved with the name of the chart, however my email credentials are already in a different secret.
After reading the chart I notice:
a. Env vars in extraEnv are key:value pairs only and translated into the deployment as an env array as:
env:
- name: <key>
value: <value>
b. Any value in extraSecretEnv are key:value pairs as well, in this case the pair is written as part of the chart secret and the value encoded as base64, so now way to read another secret in that way.
My suggestion would be to add an entry in values.yaml called rawEnv where we can write any env as raw Kubernetes list like:
Hi,
It looks like the chart is heavily reliant in using its own defined secret which is saved with the name of the chart, however my email credentials are already in a different secret.
After reading the chart I notice:
a. Env vars in extraEnv are key:value pairs only and translated into the deployment as an env array as:
b. Any value in extraSecretEnv are key:value pairs as well, in this case the pair is written as part of the chart secret and the value encoded as base64, so now way to read another secret in that way.
My suggestion would be to add an entry in values.yaml called rawEnv where we can write any env as raw Kubernetes list like:
Then it can be added to the helpers.tpl as:
Of course it would be responsibility of the user to see the values are valid and correctly formatted.
The text was updated successfully, but these errors were encountered: