@@ -371,11 +371,11 @@ additionalContainerEnv: {}
371371# configMaps is a map that specifies the ConfigMap resources that should be exposed to the main application container. Each
372372# entry in the map represents a ConfigMap resource. The key refers to the name of the ConfigMap that should be exposed,
373373# with the value specifying how to expose the ConfigMap. The value is also a map and has the following attributes:
374- # - as (enum[volume,environment,none]) (required)
374+ # - as (enum[volume,environment,envFrom, none]) (required)
375375# : ConfigMaps can be exposed to Pods as a volume mount, or as environment variables. This attribute is a string
376- # enum that is expected to be either "volume" or "environment ", specifying that the ConfigMap should be exposed as a
377- # mounted volume or via environment variables respectively. This attribute can also be set to "none", which
378- # disables the `ConfigMap` on the container.
376+ # enum that is expected to be either "volume", "environment", or "envFrom ", specifying that the ConfigMap should
377+ # be exposed as a mounted volume, via environment variables, or loaded as environment variables respectively.
378+ # This attribute can also be set to "none", which disables the `ConfigMap` on the container.
379379# - mountPath (string)
380380# : For ConfigMaps mounted as a volume, specify the mount path on the container file system where the config values
381381# will be available. Required when the ConfigMap is exposed as a volume. Ignored when the ConfigMap is exposed as
@@ -400,7 +400,8 @@ additionalContainerEnv: {}
400400# https://kubernetes.io/docs/tasks/configure-pod-container/configure-pod-configmap/
401401#
402402# The following example exposes the ConfigMap `myconfig` as a volume mounted to `/etc/myconfig`, while it exposes the
403- # ConfigMap `myotherconfig` as an environment variable.
403+ # ConfigMap `myotherconfig` as an environment variable. Additionally, it automatically mounts all of the keys
404+ # `anotherconfig` as environment variables using the `envFrom` keyword.
404405#
405406# EXAMPLE:
406407#
@@ -413,9 +414,11 @@ additionalContainerEnv: {}
413414# items:
414415# foo:
415416# envVarName: CONFIG_FOO
417+ # anotherconfig:
418+ # as: envFrom
416419configMaps : {}
417420
418- # persistentVolumes is a map that specifies PeristantVolumes that should be mounted on the pod. Each entry represents a
421+ # persistentVolumes is a map that specifies PersistentVolumes that should be mounted on the pod. Each entry represents a
419422# persistent volume which should already exist within your cluster. They Key is the name of the persistent volume.
420423# The value is also a map and has the following attributes:
421424# - mountPath (string) (required)
@@ -447,11 +450,11 @@ scratchPaths: {}
447450# secrets is a map that specifies the Secret resources that should be exposed to the main application container. Each entry in
448451# the map represents a Secret resource. The key refers to the name of the Secret that should be exposed, with the value
449452# specifying how to expose the Secret. The value is also a map and has the following attributes:
450- # - as (enum[volume,environment,none]) (required)
453+ # - as (enum[volume,environment,envFrom, none]) (required)
451454# : Secrets can be exposed to Pods as a volume mount, or as environment variables. This attribute is a string enum
452- # that is expected to be either "volume" or "environment ", specifying that the Secret should be exposed as a mounted
453- # volume or via environment variables respectively. This attribute can also be set to "none", which disables the
454- # `Secret` on the container.
455+ # that is expected to be either "volume", "environment", or "envFrom ", specifying that the Secret should be
456+ # exposed as a mounted volume, via environment variables, or loaded in its entirety as environment variables
457+ # respectively. This attribute can also be set to "none", which disables the `Secret` on the container.
455458# - mountPath (string)
456459# : For Secrets mounted as a volume, specify the mount path on the container file system where the secrets will be
457460# available. Required when the Secret is exposed as a volume. Ignored when the Secret is exposed as environment
@@ -476,7 +479,8 @@ scratchPaths: {}
476479# https://kubernetes.io/docs/concepts/configuration/secret/#using-secrets
477480#
478481# The following example exposes the Secret `mysecret` as a volume mounted to `/etc/mysecret`, while it exposes the
479- # Secret `myothersecret` as an environment variable.
482+ # Secret `myothersecret` as an environment variable. Additionally, it automatically mounts all of the keys
483+ # `anothersecret` as environment variables using the `envFrom` keyword.
480484#
481485# EXAMPLE:
482486#
@@ -489,9 +493,10 @@ scratchPaths: {}
489493# items:
490494# foo:
491495# envVarName: SECRET_FOO
496+ # anothersecret:
497+ # as: envFrom
492498secrets : {}
493499
494-
495500# containerResources specifies the amount of resources the application container will require. Only specify if you have
496501# specific resource needs.
497502# NOTE: This variable is injected directly into the pod spec. See the official documentation for what this might look
0 commit comments