Hi everyone, I have a question regarding enabling ...
# all-things-deployment
a
Hi everyone, I have a question regarding enabling the Google OIDC auth in a Kubernetes cluster. The deployment template for datahub-frontend assumes you will put the plain text value of the client secret in our custom values.yaml file. However, we want to commit our custom values.yaml file into our git repo and therefore cannot put the client secret there. If we want to store the the client secret in Kubernetes's secret store, then it seems that we need to modify the deployment template to something like below. And we probably want to do it in a backward compatible way so that it doesn't break existing setup that has the client secret in the values.yaml file.
Copy code
valueFrom:
  secretKeyRef:
    name: {{ .Values.oidcAuthentication.clientSecret.secretRef }}
    key: {{ .Values.oidcAuthentication.clientSecret.secretKey }}
I am new to Helm, could someone experienced confirm that this is the right direction or there is some alternative that doesn't require changing the deployment template?
a
Thank you @bumpy-needle-3184! I got a 404 when clicking on the first link. Could you please check?
Also I know that I can set
oidcAuthentication.clientSecret
in my
values.yaml
file. But since we commit our
values.yaml
file into github, we don't want to put any secret in it. How can we pass in the client secret as a reference to the Kubernetes secret store? It seems that I would have to modify the
deployment.yaml
template.
b
yes it would require modification like you mentioned earlier to pass k8s secret name instead of its value
Copy code
valueFrom:
  secretKeyRef:
    name: {{ .Values.oidcAuthentication.clientSecret.secretRef }}
    key: {{ .Values.oidcAuthentication.clientSecret.secretKey }}
a
Ok, thank you!