-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
make it easier to set up secrets #50
Comments
We have secrets that are just timeless, random strings. Those could be generated like this: https://itnext.io/manage-auto-generated-secrets-in-your-helm-charts-5aee48ba6918
Other secrets may regularly be rotated like the ldap ca / cert secrets. |
General problem is discussed at helm/helm-www#1259, while bitnami/charts#3094 show's Binamis way to deal with it. |
Generating them from Helm, reading the old value via Another option is to create a Job that talks to the Kubernetes API via a service account to check the secret and possibly generate them. This will work with |
Either way I think blaming Helm in your docs is inappropriate and should be removed. You are using Helm incorrectly and blaming them, and it's a bad look. https://doc.owncloud.com/ocis/next/deployment/container/orchestration/orchestration.html
All of this is supported by Helm. You just haven't written the Jobs and CronJobs that are the way to do it and works for everyone else. |
Right, the wording is highly unfortunate. Especially since Helm will never do any certificate rotation and it's not the scope of Helm. For these kind of tasks we e.g. cert-manager. Regarding secret generation / what you have been proposing in #141:
Do you have an example chart at that that does this secret generation with a job that is executed by the post-install hook? |
If you don't actually rotate certificates, it looks like Helm might have all you need built-in , e.g. with genCA/genSelfSignedCert/genSignedCert Here are a few examples I could find of using a
|
This creates a generic secret template that can be used to generate secrets for all services. The secret template takes a dict of the scope, the name of the secret, and the data to be stored in the secret. This will be used to prefill any non-predefined secrets that are set in the secretRefs. Fixes #50
Discussion with @ainmosni @Excds @d7oc :
|
This creates a generic secret template that can be used to generate secrets for all services. The secret template takes a dict of the scope, the name of the secret, and the data to be stored in the secret. This will be used to prefill any non-predefined secrets that are set in the secretRefs. Fixes #50
creating secrets for the oCIS chart is a manual process currently. We should aim at making this easier.
The text was updated successfully, but these errors were encountered: