vals
vals copied to clipboard
Helm-like configuration values loader with support for various sources
Hi, I have an issue where when I try to reference secret from gcpsecrets additional fields get concatenated to the URI. To be more precise, here is what happened: ```yaml...
When using the EnvSubst provider, if an environment variable doesn't exist, it will just pass a blank string to the evaluated file and not error. To replicate the issue: ```bash...
Please refer to jkroepke/helm-secrets#445 When I use `secretref+k8s` to fetch secrets from Kubernetes Secret object within same namespace argo while creating app in ArgoCD, it throws an error. ``` Unable...
Hello, I'm trying to fetch **integer** values from AWS SECRET MANAGER json document, but with vals seems not possibile. Is there a supported solution out of the box ? Example...
Bitwarden Vault is a popular e2ee opensource password manager, with very good ability to share passwords between teams! It also provides command line interface, description is here https://bitwarden.com/help/article/cli/ So will...
## Issue When integrating vals with helm using the `--post-renderer` approach, for some reason, while specifying `-decode-kubernetes-secrets`, helm fails to find the specified release. i.e ``` helm upgrade --post-renderer vals...
## Context https://github.com/helmfile/vals?tab=readme-ov-file#echo > ref+echo://foo/bar/baz#/foo/bar generates baz. This works by the host and the path part foo/bar/baz generating an object {"foo":{"bar":"baz"}} and the fragment part #/foo/bar results in digging the...
### Current Behavior When I have the following template: ```yaml apiVersion: v1 kind: Secret metadata: name: test stringData: ref+awsssm://test ``` With a value in Parameter Store in YAML format: ```yaml...
Add support for https://github.com/passbolt API: https://help.passbolt.com/api
*There's no discussion tab in this project ## Question **What does vals devs think about Teller?** ## About GitHub: https://github.com/tellerops/teller Cloud native secrets management for developers - never leave your...