feat: Add htpasswd generator using helm.#69
Conversation
pshanoop
commented
Jul 1, 2021
- Added support to have htpasswd credentails in helm values. So, a htpasswd file generated.
|
Kind failed to create a node. Is the lint script broken or should I increase timeout for helm ? |
|
Fails on install, you might check the error |
I have already installed this on my cluster, Anyway, I will add small change to retrigger this. |
charts/verdaccio/values.yaml
Outdated
| htpasswd: | ||
| file: /verdaccio/storage/htpasswd | ||
| # Do not change this path if secrets htpasswd is used. | ||
| file: /verdaccio/auth/htpasswd |
There was a problem hiding this comment.
I thought, It makes sense to use auth for authentication and storage only for package storage.
Besides, it would conflict with storage PVC.
I see this, I also triggered #70 and all is green. |
On this, it skipped creating cluster and install. This https://github.com/verdaccio/charts/runs/2654454267 good reference. Here I see install going through. |
Yeah, something is broken, I do not why, we should wait until is green, maybe is just a hickup. |
| metadata: | ||
| annotations: | ||
| checksum/config: {{ include (print $.Template.BasePath "/configmap.yaml") . | sha256sum }} | ||
| checksum/htpasswd-secret: {{ include (print $.Template.BasePath "/htpasswd-secret.yaml") . | sha256sum }} |
There was a problem hiding this comment.
It may be better to hash .Values.secrets.htpasswd than the secret because the htpasswd function returns different output every time you run helm upgrade even though the actual users/passwords didn't change.
checksum/htpasswd: {{ sha256sum .Values.secrets.htpasswd }}
There was a problem hiding this comment.
This way the checksum will only change when the actual user/passwords change and not because htpasswd returned different output for the same input for every helm upgrade
|
I've fixed the pipeline here #70 please approve and you can rebase on top of it. |
|
Finally went through, |
|
Just a suggestion, I am learning helm and kubernettes, maybe you can expand your PR will an example configuration so :) I can try myself locally. |
Added an example section. |
|
Just a friendly reminder, I have updated everything mentioned. |
juanpicado
left a comment
There was a problem hiding this comment.
LGTM :) waiting @verdaccio/kubernetes experts to approve
|
@rblaine95 Can I merge? |
rblaine95
left a comment
There was a problem hiding this comment.
I'm just thinking there must be a clean way to make the secret mount and config dynamic...
However, I think that can be done in a different PR.
This PR LGTM 👍
|
Thanks, @juanpicado, @marekaf and @rblaine95 . |
|
Thank all of you for keep improving the chart! |
I also feel the same, If you have some thoughts. Please put ideas on discussion thread. :) |