Kubernetes use env var based secrets
parent
eb4f968f43
commit
c89c5c275a
|
|
@ -2061,8 +2061,7 @@ class KubernetesSecret {
|
|||
};
|
||||
secret.data = {};
|
||||
for (const buildSecret of secrets) {
|
||||
secret.data[buildSecret.EnvironmentVariable] = base64.encode(buildSecret.ParameterValue);
|
||||
secret.data[`${buildSecret.EnvironmentVariable}_NAME`] = base64.encode(buildSecret.ParameterKey);
|
||||
secret.data[buildSecret.ParameterKey] = base64.encode(buildSecret.ParameterValue);
|
||||
}
|
||||
try {
|
||||
yield kubeClient.createNamespacedSecret(namespace, secret);
|
||||
|
|
|
|||
File diff suppressed because one or more lines are too long
|
|
@ -19,8 +19,7 @@ class KubernetesSecret {
|
|||
};
|
||||
secret.data = {};
|
||||
for (const buildSecret of secrets) {
|
||||
secret.data[buildSecret.EnvironmentVariable] = base64.encode(buildSecret.ParameterValue);
|
||||
secret.data[`${buildSecret.EnvironmentVariable}_NAME`] = base64.encode(buildSecret.ParameterKey);
|
||||
secret.data[buildSecret.ParameterKey] = base64.encode(buildSecret.ParameterValue);
|
||||
}
|
||||
try {
|
||||
await kubeClient.createNamespacedSecret(namespace, secret);
|
||||
|
|
|
|||
Loading…
Reference in New Issue