Closed eloo closed 6 months ago
Only the password which we would recommend using the secret kind for regardless of the configMap source, and this behavior can be disabled by setting the disabled value. We would however welcome a PR which disables all secret functionality however.
the problem is that one can not see easily what depends on the configMap
stuff..
because also some parts of the OIDC config is used there.
So no.. its not only the postgres secret.
further my problem was that i had disabled postgres (set to false) but with existingConfigMap
in use and the rest "not" set its using the default which is "postgres.enabled=true"
the problem is that one can not see easily what depends on the
configMap
stuff..
Yep a PR would be welcome. Everyone in the community is encouraged to contribute. Same as above regarding disabling the secret functionality entirely with an explicitly clear option (must include unsupported
, and terminology similar to insecure
or badPractice
in its name).
So no.. its not only the postgres secret.
I was specifically replying to the specific example you mentioned which is exactly the postgres password included in the secret. But I can see how that may have been confusing.
further my problem was that i had disabled postgres (set to false) but with
existingConfigMap
in use and the rest "not" set its using the default which is "postgres.enabled=true"
Ah yea I forgot helm does that.. it treats false as a zero value so chart values files override it.
Think this is fixed in 0.9.0-beta releases.
Hi,
i was just about to move my configuration file into an own configmap in kubernetes using the
existingConfigMap
key.But i have encountered a lot of issue while doing this and it looks like currently the
existingConfigMap
can not be used as expected because some values ofconfigMap
are used during the helm chart rendering.For example what kind of storage is configured is determined based on a value in
configMap.storage
but this whole key is going to be migrated into the configmap mentioned inexistingConfigMap
Here is an example of the key i am talking about: https://github.com/authelia/chartrepo/blob/master/charts/authelia/templates/deployment.yaml#L129C16-L129C16
Maybe in the future the storage type itself should be a higher level.
Thanks