Closed jeanpommier closed 1 year ago
Thank you for the PR, one remark is that I much prefer to do like it's already possible for database credentials.
Create a Kubernetes Secret anyway if the user doesn't pass one: https://github.com/georchestra/helm-georchestra/blob/main/templates/database/database-geodata-secret.yaml
Instead of having the ability to pass a Kubernetes Secret, but still allow the ability to pass the password through an environment variable.
By the way, this time the CI is throwing a real error :smile:: https://github.com/georchestra/helm-georchestra/actions/runs/6000210528/job/16271828142?pr=47#step:7:34 (I did fix the CI so now it should throw real errors if they are detected)
I much prefer to do like it's already possible for database credentials
Okay, I can update it accordingly. Are you fine with using the
envFrom:
- secretRef:
syntax anyway ?
Is this better ?
Good for me but I think one day we should document the structure of each secret :).
Good for me but I think one day we should document the structure of each secret :).
You mean you'd rather have it more explictly loading just the one environment variable ? It's fine by me too
Good for me but I think one day we should document the structure of each secret :).
You mean you'd rather have it more explictly loading just the one environment variable ? It's fine by me too
No, I mean there are a lot of other cases where we allow an external secret but it's undocumented.
CI failure doesn't seem related to this PR, right @edevosc2c ?
mmh that seems like a CI breaking again, that's odd I did my best to get it working properly. I have re-run it in case it would pass again during the night.
I'll check again tomorrow.
Example of valid secret could be
where the value is the actual password base64 encoded (
echo -n 'mysecretldapadminpassword' | base64
)