Yves Galante
Yves Galante
I deleted the secret but that not help, the secret is re-created but the job still fail without any log error `$ kubeclt logs kube-prometheus-stack-admission-create-t48kf W0801 14:15:55.854314 1 client_config.go:615] Neither...
@181192 @toreandreb It's possible to review this pr ?
Should fixed by this [PR](https://github.com/argoproj-labs/argocd-vault-plugin/pull/548)
@rquinio1A Why not allowing to generate JDK without any password ?
@msglueck From the Kubernetes doc => _spec.securityContext.runAsNonRoot_ => Containers must be required to run as non-root users. https://kubernetes.io/docs/concepts/security/pod-security-standards/ The documentation that you referring don't talk about the flag _runAsNonRoot_. ....
Duplicate of https://github.com/argoproj-labs/argocd-vault-plugin/issues/421
Should work without any code change when azure-identity library will be updated to 1.9.2 https://github.com/Azure/azure-sdk-for-java/blob/main/sdk/identity/azure-identity/CHANGELOG.md Then => Use existing type: _AVP_TYPE: azurekeyvault_ On the service account argocd-repo-server, add the azure...
> Should work without any code change when azure-identity library will be updated to 1.9.2 https://github.com/Azure/azure-sdk-for-java/blob/main/sdk/identity/azure-identity/CHANGELOG.md Sorry that was wrong .... Actually _argocd-vault-plugin_ use the mod _autorest/azure/auth_ that is [**out...
@genisd Thanks to share your setup, it's help me to fix same issue. It's not better to use an host volume for your dind-scratch volume as a memroy volume to...
It's was not really a good idea to update major dependency version on a patch version :-(