-
Notifications
You must be signed in to change notification settings - Fork 38
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow/document setup of sql database via Secret #142
Comments
I think this is already on the roadmap for the operator (not sure if it's tracked in another GH issue or not), but @jsenko would know better. |
Thank you. Yes, it's a feature we plan to add in a next release. It's referenced here #20 , but it's good to have it as a separate issue. |
Had the same issue with sealed secrets ;) looking forward for the fix in the next release. |
Any news on this, is there a workaround? I can't commit secrets into my git repo, the only way I can pass secrets around is a sealed secret. |
I saw you already implemented the feature When will 1.1.x be released? |
its not implemented |
@jsenko any workaround avalible? can I just mount secretfiles and toss them via env variables to apicurio registry? |
hi, at the moment the suggested approach is to use environment variables, as you said, via |
Version |
Yup but there is no DB_PASSWORD_FILE env variable like in keycloack. And pod that handles CRD ApicurioRegistry resource don't handle secretref. Any plans for apicurio to handle db credentials via files like keycloack for example do?:) @jsenko |
Are you sure this does not work?
Are you using the latest version? |
Can you also try to set |
Oh i forgot it just create deployment manifest which handle such things just fine. I'll try that. Do i need to specifically set image in specs with that approach or it will understand that i want to use sql image? |
If you set Let me know if it worked! |
trying to deploy for testing but run on other problem. we are storing secrets by using CSI driver for AWS secrets |
The name must be |
I have a Postgres DB set up and have the name+cedentials in a secret.
The operator should allow to configure a registry from that secret.
Basically allow to set the properties in a "valueFrom: secretKeyRef" way.
As an example for what I mean: For a (different) quarkus project that uses JPA, I am setting the DC like this:
The text was updated successfully, but these errors were encountered: