You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Nov 25, 2022. It is now read-only.
Some research is required on how we could circumvent exposing secrets with the custom config file that requires environment variable values since the Python code fetches these values with the os.environ.get() method.
@Abhi94N let's go with your idea and create a PoC of a dumbed-down manifest to manage Postgres ourselves to see if this resolves the issues you were having with passing in passwords and secrets. We can make a decision based on the results of your PoC.
@jgwerner Tests with using manifests instead of the Postgres helm chart dependency led to the same issue where POSTGRES_NBGRADER_PASSWORD fails to be set as an envar in the hub pod when using a kubernetes secret.
@jgwerner Tests with using manifests instead of the Postgres helm chart dependency led to the same issue where POSTGRES_NBGRADER_PASSWORD fails to be set as an envar in the hub pod when using a kubernetes secret.
That makes sense, since the JupyterHub code is managing how the secrets are fetched.
Add Secrets.yaml to the template manifests to manage sensitive information such as passwords and keys.
This feature replaces some settings that are currently in place with string values so this does require some refactoring.
The text was updated successfully, but these errors were encountered: