From 3ce1e4ab7d6a0cd8e19145cf9d7371a21e573a46 Mon Sep 17 00:00:00 2001 From: Tommy Date: Tue, 19 Dec 2023 17:52:11 +0100 Subject: [PATCH] feat(hasura-engine) add example of how to create an external-secret for chart --- .../hasura-engine/extras/externalsecret.yaml | 32 +++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 charts/hasura-engine/extras/externalsecret.yaml diff --git a/charts/hasura-engine/extras/externalsecret.yaml b/charts/hasura-engine/extras/externalsecret.yaml new file mode 100644 index 0000000..1d83c03 --- /dev/null +++ b/charts/hasura-engine/extras/externalsecret.yaml @@ -0,0 +1,32 @@ +--- +apiVersion: external-secrets.io/v1beta1 +kind: ExternalSecret +metadata: + name: hasura +spec: + secretStoreRef: + kind: ClusterSecretStore + name: onepassword-connect + target: + name: hasura-secret + creationPolicy: Owner + template: + engineVersion: v2 + data: + # Hasura + HASURA_GRAPHQL_ADMIN_SECRET: "{{ .HASURA_GRAPHQL_ADMIN_SECRET }}" + HASURA_GRAPHQL_DATABASE_URL: |- + postgres://hasura:{{ .HASURA_POSTGRES_PASS }}@postgres-rw.databases.svc.cluster.local/hasura + # Postgres Init + INIT_POSTGRES_DBNAME: hasura + INIT_POSTGRES_HOST: postgres-rw.databases.svc.cluster.local + INIT_POSTGRES_USER: hasura + INIT_POSTGRES_PASS: "{{ .HASURA_POSTGRES_PASS }}" + INIT_POSTGRES_SUPER_PASS: "{{ .POSTGRES_SUPER_PASS }}" + # Vars + PUBLIC_DOMAIN: ${PUBLIC_DOMAIN} + dataFrom: + - extract: + key: hasura + - extract: + key: postgres