-
Notifications
You must be signed in to change notification settings - Fork 566
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
loop over release with secrets and values. #986
Comments
Hey! I'd suggest trying something like this. Firstly, choose one of supported vals providers listed in https://github.com/variantdev/vals#suported-backends and store the passwords in it. Let's say you've chosen HashiCorp Vault and stored passwords like
|
ok, I am using helm secrets but I am getting this weird error now:
I am using; https://hub.helm.sh/charts/gabibbo97/imagepullsecrets/2.0.0 |
I just realised that one is a user issue. set is
|
Also note that you have to use
I've updated my example above |
ok, final setup:
the weird part is the release is not showing to be installed by
no diff and it doesn't get installed |
Perhaps something is going wrong in helm-diff..? Could you kindly verify that the vanilla |
Maybe a bug in helm 3 + helm-diff? |
no, its a problem with the chart. I downloaded it:
firstly, I have and now I have
|
@jurgenweber Wow, isn't this a regression in Helm v3? I thought Helm v3 is intended to not break charts with only a few exceptions |
/me shrugs. no idea, didn't use this in helm2. :) Even running it manually:
and trying to install:
should I raise a ticket with helm? |
No, user issue again! :) lol. I got it working:
v2.0.0 is broken, too many I would like to add this loop to the |
Glad to see it worked 🎉
Ah interesting. So this might be an issue in the chart, that
That would be great! |
I have a new variant I am trying to get working, I am using this in the values.yaml.gotmpl for a incubator/raw release.
I am unable to build the path to the user/path secret using the externalName as a key, thoughts? |
I thought it might be |
yeah, I found a solution:
|
How can I do something like this?
Ideally I would want the password in environments secrets.
The text was updated successfully, but these errors were encountered: