feat: existingSecrets support, separate-of-concerns enhancements, custom secret field names support #186
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This pull request is similar to #185 but it takes things a bit further: it adds the existing secret support and also allows to specify field names in secrets if those are not default. Updates also include separate-of-concerns features, allowing to specify additional secrets containing only credentials for external services. This makes secret management more precise and customizable if the user prefers to work with external secrets. Documentation, templates and values have all been updated to reflect changes. Also fixed a bug found in #185 where if an existing secret was defined, its data wasn't mounted to the deployment and env vars referencing to the auth credentials location inside containers were not created. Also some missing fields in documentation were added
Azure and Swift values were named
secretRef
instead ofexisingSecret
to make naming consistent with already presentsecretRef
value for S3 and proxy. At the same timeexistingSecret
value forsecrets
with authentication credentials was named this way because it was already requested to be named that way (see #58) and because many other helm charts use this name to allow users reference their own secrets instead of using generated ones, so this is a UX reasonImplements #58
Key Changes
secrets.existingSecret
value invalues.yaml
and documented it inREADME
, allowing users to use an external Kubernetes Secret resource with authentication data for docker registrysecrets.haSharedSecretKey
andsecrets.htpasswdKey
values tovalues.yaml
and documented them inREADME
, allowing users to specify field names defined insecrets.existingSecret
. If none is set, they default tohaSharedSecret
andhtpasswd
respectivelysecrets.azure.secretRef
value invalues.yaml
and documented it inREADME
, allowing users to use an external Kubernetes Secret resource with authentication data for azuresecrets.azure.accountNameKey
,secrets.azure.accountKeyKey
andsecrets.azure.containerKey
values tovalues.yaml
and documented them inREADME
, allowing users to specify field names defined insecrets.azure.secretRef
. If none is set, they default toaccountName
,accountKey
andcontainer
respectivelysecrets.swift.secretRef
value invalues.yaml
and documented it inREADME
, allowing users to use an external Kubernetes Secret resource with authentication data for swiftsecrets.swift.usernameKey
andsecrets.swift.passwordKey
values tovalues.yaml
and documented them inREADME
, allowing users to specify field names defined insecrets.swift.secretRef
. If none is set, they default toswiftUsername
andswiftPassword
respectivelyproxy.usernameKey
andproxy.passwordKey
values tovalues.yaml
and documented them inREADME
, allowing users to specify field names defined insecrets.existingSecret
. If none is set, they default toproxyUsername
andproxyPassword
respectivelyTemplate and Resource adjustments
secret.yaml
to only create a new Secret ifsecrets.existingSecret
is not set, preventing duplicate or unnecessary secretsdeployment.yaml
andcronjob.yaml
to only annotate with the secret checksum when a new secret is created, ensuring correct rolling updatesDocumentation updates
README
with new values entries added with this pull request. See Key ChangesREADME
forsecrets.haSharedSecret
andsecrets.azure.*
Version Bump
3.1.0
to reflect new features