[ 
https://issues.apache.org/jira/browse/AIRFLOW-3381?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jarek Potiuk closed AIRFLOW-3381.
---------------------------------
    Resolution: Duplicate

> KubernetesPodOperator: Use secretKeyRef or configMapKeyRef in env_vars
> ----------------------------------------------------------------------
>
>                 Key: AIRFLOW-3381
>                 URL: https://issues.apache.org/jira/browse/AIRFLOW-3381
>             Project: Apache Airflow
>          Issue Type: Improvement
>          Components: operators
>    Affects Versions: 1.10.0
>            Reporter: Arthur Brenaut
>            Priority: Major
>              Labels: gsoc, gsoc2020, kubernetes, mentor
>
> The env_vars attribute of the KubernetesPodOperator allows to pass 
> environment variables as string but it doesn't allows to pass a value from a 
> configmap or a secret.
> I'd like to be able to do
> {code:java}
> modeling = KubernetesPodOperator(
>  ...
>  env_vars={
>   'MY_ENV_VAR': {
>    'valueFrom': {
>     'secretKeyRef': {
>      'name': 'an-already-existing-secret',
>      'key': 'key',
>    }
>   }
>  },
>  ...
> )
> {code}
> Right now if I do that, Airflow generates the following config
> {code:java}
> - name: MY_ENV_VAR
>   value:
>    valueFrom:
>     configMapKeyRef:
>      name: an-already-existing-secret
>      key: key
> {code}
> instead of 
> {code:java}
> - name: MY_ENV_VAR
>   valueFrom:
>    configMapKeyRef:
>     name: an-already-existing-secret
>     key: key
> {code}
> The _extract_env_and_secrets_ method of the _KubernetesRequestFactory_ could 
> check if the value is a dictionary and use it directly.
>  



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to