Read secret from arbitrary namespace?

Hi - the docs (https://concourse-ci.org/kubernetes-credential-manager.html) specify quite clearly that secrets are always read from a prefix - dash - team-name namespace, which works as described, I am wondering if there is a way to instruct the pipeline to read an arbitrary secret from a completely different namespace (assuming of course RBAC allows it via a ClusterRole)

@evanchaoli has a PR to add per-pipeline credential managers which would likely make this possible once we enable the K8s provider to be used per-pipeline: https://github.com/concourse/concourse/pull/4600

1 Like