-
Notifications
You must be signed in to change notification settings - Fork 764
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow custom secret keys #1434
Allow custom secret keys #1434
Conversation
If provided uses username and password in database.external.existingSecret instead of raw credentials Signed-off-by: Philipp Kolberg <[email protected]>
Instead of using the redis.external.password use REDIS_PASSWORD inside redis.external.existingSecret if provided Signed-off-by: Philipp Kolberg <[email protected]>
Instead of using fixed keys that the user must set in order for the config to work give the user the choice to change the keys. This allows the project to use automatically generated secrets that the user is unable to update. Signed-off-by: Philipp Kolberg <[email protected]>
Defaults should be fine for this kind of secret in order to reduce complexity Signed-off-by: Philipp Kolberg <[email protected]>
Signed-off-by: Philipp Kolberg <[email protected]>
The default key ca.crt should be fine for most use-cases. Also this improves the naming scheme. Signed-off-by: Philipp Kolberg <[email protected]>
Signed-off-by: Philipp Kolberg <[email protected]>
…low-custom-secret-keys Signed-off-by: Philipp Kolberg <[email protected]> # Conflicts: # templates/_helpers.tpl
Signed-off-by: Philipp Kolberg <[email protected]>
Signed-off-by: Philipp Kolberg <[email protected]>
Signed-off-by: Philipp Kolberg <[email protected]>
Signed-off-by: Philipp Kolberg <[email protected]>
Signed-off-by: Philipp Kolberg <[email protected]>
Any progress on that PR? Sorry about the confusion, this was ment for #1373 . |
Currently blocked by #1326 which needs to be merged first |
Thanks for the quick followup. I think I might have actually been looking at the wrong PR, 1373 seems to take care of the XSRF token. Sorry for the noise, and also thanks for contributing. |
Signed-off-by: Philipp Kolberg <[email protected]>
Signed-off-by: Philipp Kolberg <[email protected]> # Conflicts: # templates/core/core-dpl.yaml # values.yaml
Signed-off-by: Philipp Kolberg <[email protected]>
This PR is being marked stale due to a period of inactivty. If this PR is still relevant, please comment or remove the stale label. Otherwise, this PR will close in 30 days. |
This PR was closed because it has been stalled for 30 days with no activity. If this PR is still relevant, please re-open a new PR against main. |
Builds on top of #1326 and provides even more configuration options for secrets. Instead of enforcing default secret keys they can now be altered in order to use pre-existing secrets.
Signed-off-by: Philipp Kolberg [email protected]