Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow custom secret keys #1434

Closed
wants to merge 16 commits into from

Conversation

PKizzle
Copy link

@PKizzle PKizzle commented Mar 3, 2023

Builds on top of #1326 and provides even more configuration options for secrets. Instead of enforcing default secret keys they can now be altered in order to use pre-existing secrets.

Signed-off-by: Philipp Kolberg [email protected]

PKizzle added 7 commits March 3, 2023 20:12
If provided uses username and password in database.external.existingSecret instead of raw credentials

Signed-off-by: Philipp Kolberg <[email protected]>
Instead of using the redis.external.password use REDIS_PASSWORD inside redis.external.existingSecret if provided

Signed-off-by: Philipp Kolberg <[email protected]>
Instead of using fixed keys that the user must set in order for the config to work give the user the choice to change the keys. This allows the project to use automatically generated secrets that the user is unable to update.

Signed-off-by: Philipp Kolberg <[email protected]>
Defaults should be fine for this kind of secret in order to reduce complexity

Signed-off-by: Philipp Kolberg <[email protected]>
The default key ca.crt should be fine for most use-cases. Also this improves the naming scheme.

Signed-off-by: Philipp Kolberg <[email protected]>
values.yaml Outdated Show resolved Hide resolved
templates/core/core-dpl.yaml Outdated Show resolved Hide resolved
PKizzle added 6 commits April 13, 2023 05:17
…low-custom-secret-keys

Signed-off-by: Philipp Kolberg <[email protected]>

# Conflicts:
#	templates/_helpers.tpl
Signed-off-by: Philipp Kolberg <[email protected]>
Signed-off-by: Philipp Kolberg <[email protected]>
@PKizzle PKizzle requested a review from zyyw April 13, 2023 15:33
@cdemers
Copy link

cdemers commented May 25, 2023

Any progress on that PR? It would really help users of ArgoCD, as ArgoCD provides a valuable synchronisation status between what's deployed and what's not. Having the xsrf regenerated every time we render the Helm template makes it so that it's either always out of sync, or always synchronizing, which is usually not practical.

Sorry about the confusion, this was ment for #1373 .

@PKizzle
Copy link
Author

PKizzle commented May 25, 2023

Currently blocked by #1326 which needs to be merged first

@cdemers
Copy link

cdemers commented May 25, 2023

Thanks for the quick followup. I think I might have actually been looking at the wrong PR, 1373 seems to take care of the XSRF token. Sorry for the noise, and also thanks for contributing.

PKizzle added 3 commits August 7, 2023 23:45
Signed-off-by: Philipp Kolberg <[email protected]>
Signed-off-by: Philipp Kolberg <[email protected]>

# Conflicts:
#	templates/core/core-dpl.yaml
#	values.yaml
Signed-off-by: Philipp Kolberg <[email protected]>
Copy link

github-actions bot commented Feb 8, 2024

This PR is being marked stale due to a period of inactivty. If this PR is still relevant, please comment or remove the stale label. Otherwise, this PR will close in 30 days.

@github-actions github-actions bot added the Stale label Feb 8, 2024
Copy link

This PR was closed because it has been stalled for 30 days with no activity. If this PR is still relevant, please re-open a new PR against main.

@github-actions github-actions bot closed this Mar 10, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants