trino-gateway helm chart unconditionally generates secret.yaml.
k8s secrets are not secure and in our deployments we do not allow for applications to rely on k8s sercets.
Instead we:
- store secrets in vault
- pass these to applications using environment variables
This issue requests:
- make generation os k8s secret optional
- allow for the secrets to be passed to trino-gateway via environment variables
trino-gateway helm chart unconditionally generates secret.yaml.
k8s secrets are not secure and in our deployments we do not allow for applications to rely on k8s sercets.
Instead we:
This issue requests: