Skip to content

Commit d1a590b

Browse files
Update secrets.yaml (#10)
On `helm upgrade` on an instance that already has a source configured, generating random values causes decryption of the password to fail, breaking the Database connection. Instead, we should enable using the stable values, if specified, so that the new pod comes up with the same keys.
1 parent 13fa4ed commit d1a590b

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

templates/secrets.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,6 @@ metadata:
1010
{{- end }}
1111
type: Opaque
1212
data:
13-
secret-key-base: {{ randBytes 64 | b64enc | quote }}
14-
vault-key: {{ randBytes 32 | b64enc | quote }}
13+
secret-key-base: {{ .Values.secretKeyBase | default (randBytes 64) | b64enc | quote }}
14+
vault-key: {{ .Values.vaultKey | default (randBytes 32) | b64enc | quote }}
1515
{{- end }}

0 commit comments

Comments
 (0)