Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Shared helmexec for Environment Secrets #804

Merged
merged 1 commit into from
Aug 15, 2019

Conversation

travisgroth
Copy link
Contributor

@travisgroth travisgroth commented Aug 12, 2019

Closes #444 and #782

This is the final PR to fully cache and parallelize helm secret decryption. It threads the shared helmexec.Interface into the StateCreator and HelmState structs to be used during environment secret decryption. This should effectively cache secrets for the duration of a helmfile run, regardless of where they are first decrypted.

This is based on the work in #800, so it is draft until that PR is final.

@mumoshu
Copy link
Collaborator

mumoshu commented Aug 13, 2019

@travisgroth Thanks again for your efforts. #800 has been just merged so please feel free to make this a non-draft PR once this is ready to be reviewed 👍

@travisgroth travisgroth marked this pull request as ready for review August 14, 2019 02:54
Copy link
Collaborator

@mumoshu mumoshu left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM. Thanks a lot for your efforts and contributions, @travisgroth 👍 💯

@mumoshu mumoshu merged commit a584aea into roboll:master Aug 15, 2019
@travisgroth
Copy link
Contributor Author

Any time. Glad to help out @mumoshu!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[feature] cache environment secret decryption
2 participants