-
Notifications
You must be signed in to change notification settings - Fork 564
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Secrets under environments #255
Comments
mumoshu
changed the title
feat: Add secrets under environments
feat: Secrets under environments
Aug 30, 2018
mumoshu
added a commit
to mumoshu/helmfile
that referenced
this issue
Aug 31, 2018
Resolves roboll#255
mumoshu
added a commit
to mumoshu/helmfile
that referenced
this issue
Sep 2, 2018
Resolves roboll#255
@mumoshu If this is applied - will the secrets coming from HashiCorp Vault be suppressed too? |
This feature is not about suppressing secrets from being printed. But yes, --suppress-secrets should prevent any k8s secret from being printed regardless of where the source is(vault, ssm, etc |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Extracted from #59 (comment)
Enhance #253 to accept
secrets:
under each environment:So that contents of
values.yaml
and decryptedsecrets.yaml
are merged and then can be referenced from withinvalues.yaml.gotmpl
.The text was updated successfully, but these errors were encountered: