Closed proxyvert closed 1 year ago
We have the same issue and currently try to reverse engineer the Helm chart. Do you know any workaround?
@PaleIntrovert We found the solution in other issues :)
You need to use:
global:
identity:
auth:
connectors:
existingSecret:
name: myExistingSecretName
@floric, I'm very grateful for you help, I checked this structure of values and rendered templates are indeed referencing existingSecret.
Describe the issue:
When I try to utilize existingSecret for camunda components, it still generates default secret and puts value of global.identity.auth.camunda-component.existingSecret in camunda-component secretKey base64 encoded, instead of referencing existingSecret that I created.
snippet from values.yaml:
Actual behavior:
camunda-platform/charts/identity/templates/deployment.yaml env is using default secret that is created by chart:
camunda-platform/charts/identity/templates/connectors-secret.yaml is rendered to:
Expected behavior:
camunda-platform/charts/identity/templates/deployment.yaml env is using myExistingSecret that is created by me that has right secretKey in place:
How to reproduce:
create myExistingSecret that has connectors-secret secretKey and arbitrary value.
use values.yaml and run helm template
Steps to reproduce the issue.
If possible add a minimal reproducer code sample in a new repo/branch. -->
Logs:
Environment:
Please note: Without the following info, it's hard to resolve the issue and probably it will be closed.