Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Much better secret handling logic #874

Merged
merged 5 commits into from
Nov 8, 2024
Merged

Conversation

petewall
Copy link
Collaborator

@petewall petewall commented Nov 8, 2024

Much smarter logic for determining whether to include a reference to a secret. This will cut down on the amount of references to credentials that aren't used and will keep the alloy config tighter.

Fixes #872
Fixes #873

Signed-off-by: Pete Wall pete.wall@grafana.com

Signed-off-by: Pete Wall <pete.wall@grafana.com>
Signed-off-by: Pete Wall <pete.wall@grafana.com>
Signed-off-by: Pete Wall <pete.wall@grafana.com>
@petewall petewall self-assigned this Nov 8, 2024
Signed-off-by: Pete Wall <pete.wall@grafana.com>
@petewall petewall requested a review from skl November 8, 2024 03:40
Regenerate examples

Signed-off-by: Pete Wall <pete.wall@grafana.com>
@petewall petewall merged commit 9179b5d into main Nov 8, 2024
24 checks passed
@petewall petewall deleted the fix/inconsistent-secret-template branch November 22, 2024 02:15
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

secrets.usesSecret always returns true usesKubernetesSecret always returns true when external
1 participant