Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support AMBASSADOR_NO_SECRETS to prevent Ambassador from reading secrets objects #1365

Merged
merged 1 commit into from
Mar 26, 2019

Conversation

esmet
Copy link
Contributor

@esmet esmet commented Mar 22, 2019

Description

Add AMBASSADOR_NO_SECRETS to entrypoint.sh. When set, Ambassador will only read Services.

This helps organizations adopt ambassador when running on infrastructure that tightly access controls secrets.

Related Issues

#1293

Testing

Manually tested. We are using a similar patch for our Ambassador evaluation and it works as expected.

Todos

  • Tests
  • Documentation

Other

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants