headlamp icon indicating copy to clipboard operation
headlamp copied to clipboard

Illogical behaviour with oidc

Open gecube opened this issue 10 months ago • 1 comments

Good day Sirs,

I am experimenting with your helm chart extensively. And found the next thing. I can set up oidc settings with the config.oidc.secret.create: false value. It leads to broken deployment as it expects the secret anyway. It is opaque behaviour as in fact as user I want to have three options:

  • put oidc settings and inject them like ENV variables directly from deployment (like for debug purposes)
  • use external secret precreated by means of any possible solution (external-secrets operator, vault, I created the secret in k8s myself etc.) and give me an option to select this secret name
  • create the secret inside of helm chart and pass it to the deployment with the option to reload deployment in case of changing the secret (add sha annotation in labels for the deployment)
  • make the options exclusive to each other. Now I can set up oidc settings and not create the secret, which does not make sense...

I think good example could be bitnami charts for redis/mongo/postgresql, where it is obvious what to put into values.yaml

gecube avatar Apr 09 '24 10:04 gecube

Thank you for the detailed issue @gecube. Fixing this

knrt10 avatar Apr 22 '24 03:04 knrt10