Commit 61a0d61
fix(helm): support secrets.existingSecret for core secrets
When users set secrets.enabled=false to use an external secret via
secrets.existingSecret, the environment variables SESSION_SECRET,
MAGIC_LINK_SECRET, ENCRYPTION_KEY, and MANAGED_WORKER_SECRET were not
being populated from the secret.
The templates only checked `if .Values.secrets.enabled` before setting
these env vars. This change updates the condition to also check for
`secrets.existingSecret`, so users can reference an existing Kubernetes
Secret instead of having the chart create one.
Fixes #2859
Co-authored-by: nicktrn <[email protected]>1 parent cf0aa9b commit 61a0d61
2 files changed
+2
-2
lines changed| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
151 | 151 | | |
152 | 152 | | |
153 | 153 | | |
154 | | - | |
| 154 | + | |
155 | 155 | | |
156 | 156 | | |
157 | 157 | | |
| |||
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
263 | 263 | | |
264 | 264 | | |
265 | 265 | | |
266 | | - | |
| 266 | + | |
267 | 267 | | |
268 | 268 | | |
269 | 269 | | |
| |||
0 commit comments