Skip to content

Conversation

cest-pas-faux
Copy link

@cest-pas-faux cest-pas-faux commented Jun 26, 2024

Hi,

This PR adds the ability to specify an existing secret for all the DB configurations (host, port, user, password, coreDatabase).

Tests done with this updated chart :

  • Reference an existing secret and setting existingSecret.enabled: true
  • Hardcode the connection configuration values under external and set existingSecret.enabled: false

Both tests are successful, pull/push images OK.

Signed-off-by: Alexandre DEFRASNE <[email protected]>
Signed-off-by: Alexandre DEFRASNE <[email protected]>
Signed-off-by: Alexandre DEFRASNE <[email protected]>
Signed-off-by: Alexandre DEFRASNE <[email protected]>
Signed-off-by: Alexandre DEFRASNE <[email protected]>
@cest-pas-faux cest-pas-faux marked this pull request as ready for review June 26, 2024 18:54
Signed-off-by: Alexandre DEFRASNE <[email protected]>
@MinerYang
Copy link
Collaborator

Hi @cest-pas-faux ,

I don't think these settings expect password need to be mounted as secret, configmap is enough for them.
And it will better align with our other values conventions

Best,
Miner

@cest-pas-faux
Copy link
Author

cest-pas-faux commented Jul 11, 2024

Hi @MinerYang, thanks for this review

The password stored as secret is the current behavior and has not been introduced by me, see templates below :

I didn't want to create a breaking change by removing this secret which is shared by different components.
How to you want me to proceed ?

@cest-pas-faux
Copy link
Author

Hi @MinerYang , any updates on this ?

Copy link

github-actions bot commented Oct 6, 2024

This PR is being marked stale due to a period of inactivty. If this PR is still relevant, please comment or remove the stale label. Otherwise, this PR will close in 30 days.

@github-actions github-actions bot added the Stale label Oct 6, 2024
@cest-pas-faux
Copy link
Author

Hi @MinerYang , just a heads up :)

@cest-pas-faux
Copy link
Author

/remove-lifecycle stale

@github-actions github-actions bot removed the Stale label Oct 7, 2024
Copy link

github-actions bot commented Dec 6, 2024

This PR is being marked stale due to a period of inactivty. If this PR is still relevant, please comment or remove the stale label. Otherwise, this PR will close in 30 days.

@github-actions github-actions bot added the Stale label Dec 6, 2024
@cest-pas-faux
Copy link
Author

/remove-lifecycle stale

@github-actions github-actions bot removed the Stale label Dec 7, 2024
@cest-pas-faux
Copy link
Author

Hi @MinerYang , did you have any time to look into this PR ?

Copy link

This PR is being marked stale due to a period of inactivty. If this PR is still relevant, please comment or remove the stale label. Otherwise, this PR will close in 30 days.

@github-actions github-actions bot added the Stale label Feb 10, 2025
@cest-pas-faux
Copy link
Author

@MinerYang , how should we proceed ?

@github-actions github-actions bot removed the Stale label Feb 11, 2025
Copy link

This PR is being marked stale due to a period of inactivty. If this PR is still relevant, please comment or remove the stale label. Otherwise, this PR will close in 30 days.

@github-actions github-actions bot added the Stale label Apr 13, 2025
@cest-pas-faux
Copy link
Author

Hi @MinerYang , this feature is still needed.

@github-actions github-actions bot removed the Stale label Apr 14, 2025
Copy link

This PR is being marked stale due to a period of inactivty. If this PR is still relevant, please comment or remove the stale label. Otherwise, this PR will close in 30 days.

@github-actions github-actions bot added the Stale label Jun 14, 2025
@cest-pas-faux
Copy link
Author

Still needed

@github-actions github-actions bot removed the Stale label Jun 15, 2025
Copy link

This PR is being marked stale due to a period of inactivty. If this PR is still relevant, please comment or remove the stale label. Otherwise, this PR will close in 30 days.

@github-actions github-actions bot added the Stale label Aug 14, 2025
@cest-pas-faux
Copy link
Author

Still needed

@github-actions github-actions bot removed the Stale label Aug 15, 2025
@JefeDavis
Copy link

@MinerYang I believe what @cest-pas-faux is trying to accomplish is support a use-case like cloudnative-pg, which generates a secret with all needed information to connect to the database upon creation, this is a pretty popular way of provisioning databases in kubernetes and should be supported by harbor.

@cest-pas-faux it may be easier to get this approved and merged if you remove the breaking change here. people may be using the existingSecret value which currently takes a string, you should be able to check to see if the value is a string or a map and revert to the old logic if it is a string

@cest-pas-faux
Copy link
Author

Hi, @JefeDavis , thanks for your interest and it could be what's blocking us to move forward (even if if think implementing a detection of string/map would be very dirty instead of just having a small breaking change).

However, I'm chasing up since more than a year with no answers, it's hard to guess what's blocking us here, and the only answer I got is unrelated.

@MinerYang , let us know if you want this PR closed or this is something you're willing to implement, and if yes, how ?

@ildoc
Copy link

ildoc commented Oct 2, 2025

interested! I'm waiting to this feature to be merged to deploy harbor with external-secrets!

thank you @cest-pas-faux for the good work, let's hope @MinerYang will merge this pr as soon as possible

@fredericrous
Copy link

fredericrous commented Oct 8, 2025

thanks for the PR. imo this change is definitely needed to use the harbor helm chart in production.
I thumbed up the first message of this PR and issue #2196 I invite you who read this message and is not a maintainer to do the same.
Note for homelab users: you might already be using gitea. Recent versions of gitea come with a docker registry already

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants