Skip to content

Use Secret for sensitive data and allow to use ExistingSecret #14

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 7 commits into
base: main
Choose a base branch
from

Conversation

AlePini
Copy link

@AlePini AlePini commented Mar 28, 2025

Fix #9

A lot of sensitive data is currently set in a configMap, which is not ideal. Credentials should be placed in a Secret.
Also, there are situation where values.yaml should not contain any credentials (ex. in a flux env) and an existingSecret comes in handy.

@JakobStadlhuber
Copy link

+1

@JakobStadlhuber
Copy link

please add this as well: sim500#1

@g3Bg2
Copy link
Collaborator

g3Bg2 commented Apr 11, 2025

@AlePini

Can you add these changes on SHE as well?

Charts > SHE

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Support existingSecrets and httproute
3 participants