-
Notifications
You must be signed in to change notification settings - Fork 24
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support the configuration of sensitive data using existing Kubernetes secrets #90
Comments
Hey @rszamszur! Thanks for the proposal - would specifying our config options as environment variables work for your use-case? https://www.buildbuddy.io/docs/config#environment-variables You can specify environment variables in your BuildBuddy config.yaml (which maps to the For example a bring-your-own-runners values.yaml might look like this:
And then you can populate the |
I must have overlooked that bit of documentation. At the first glance, seems like it could be sufficient. I'll test it tomorrow and update you on the results. |
Great, let us know if you run into any issues. We're happy to help! |
Feel free to re-open if you run into any issues with this approach! |
Hello BuildBuddy Team,
I am reaching out to discuss an enhancement proposal for the Helm charts. Currently, these charts require secrets to be provided within the
values.yaml
file. This approach, while functional, it adds an extra layer of complexity and maintenance overhead. This complexity becomes particularly evident in situations such as:I would like to propose a feature request to enhance the Helm charts to support the use of existing Kubernetes secrets. The ideal implementation of this feature would cater to any sensitive information that can currently be configured through value files.
I am keen to contribute to the development of this feature if it aligns with your project's goals. Could you please share any specific guidelines or requirements for such contributions? I would greatly appreciate any feedback or direction you could provide to help me proceed with this implementation.
For reference, I have included links to example open-source charts that support using existing k8s secrets to some extent:
Have a good one!
The text was updated successfully, but these errors were encountered: