fix: with environment secrets (#556)
Since tillerless support we unintentionally broke this, and there isn't a real fix to this. We must accept a limitation that helmfile needs a tiller installed on your cluster just for decrypting environment secrets. Fixes #550
This commit is contained in:
		
							parent
							
								
									04a9ea1d2a
								
							
						
					
					
						commit
						d93ec77ea3
					
				|  | @ -158,7 +158,15 @@ func (st *HelmState) loadEnv(name string, readFile func(string) ([]byte, error)) | ||||||
| 				if _, err := os.Stat(path); os.IsNotExist(err) { | 				if _, err := os.Stat(path); os.IsNotExist(err) { | ||||||
| 					return nil, err | 					return nil, err | ||||||
| 				} | 				} | ||||||
| 				release := &st.Releases[0] | 				// Work-around to allow decrypting environment secrets
 | ||||||
|  | 				//
 | ||||||
|  | 				// We don't have releases loaded yet and therefore unable to decide whether
 | ||||||
|  | 				// helmfile should use helm-tiller to call helm-secrets or not.
 | ||||||
|  | 				//
 | ||||||
|  | 				// This means that, when you use environment secrets + tillerless setup, you still need a tiller
 | ||||||
|  | 				// installed on the cluster, just for decrypting secrets!
 | ||||||
|  | 				// Related: https://github.com/futuresimple/helm-secrets/issues/83
 | ||||||
|  | 				release := &ReleaseSpec{} | ||||||
| 				flags := st.appendTillerFlags([]string{}, release) | 				flags := st.appendTillerFlags([]string{}, release) | ||||||
| 				decFile, err := helm.DecryptSecret(st.createHelmContext(release, 0), path, flags...) | 				decFile, err := helm.DecryptSecret(st.createHelmContext(release, 0), path, flags...) | ||||||
| 				if err != nil { | 				if err != nil { | ||||||
|  |  | ||||||
		Loading…
	
		Reference in New Issue