|
|
|
@ -1,25 +1,16 @@
|
|
|
|
|
|
|
|
# store the secret-name as var
|
|
|
|
|
|
|
|
# in my case, the name was very long and containing a lot of fields
|
|
|
|
|
|
|
|
# so it helps me a lot
|
|
|
|
|
|
|
|
{{- $secret_name := "connect-secrets" -}}
|
|
|
|
---
|
|
|
|
---
|
|
|
|
apiVersion: v1
|
|
|
|
apiVersion: v1
|
|
|
|
kind: Secret
|
|
|
|
kind: Secret
|
|
|
|
metadata:
|
|
|
|
metadata:
|
|
|
|
name: "connect-secrets"
|
|
|
|
name: "{{ $secret_name }}"
|
|
|
|
annotations:
|
|
|
|
annotations:
|
|
|
|
"helm.sh/resource-policy": "keep"
|
|
|
|
"helm.sh/resource-policy": "keep"
|
|
|
|
{{- $previous := lookup "v1" "Secret" .Release.Namespace "connect-secrets" }}
|
|
|
|
{{- $previous := lookup "v1" "Secret" .Release.Namespace $secret_name }}
|
|
|
|
data:
|
|
|
|
data:
|
|
|
|
{{- if $previous }}
|
|
|
|
|
|
|
|
{{- $previousSecret := index $previous "data" "SOME_SECRET" }}
|
|
|
|
|
|
|
|
{{- if $previousSecret }}
|
|
|
|
|
|
|
|
SOME_SECRET_OLD: {{ $previousSecret }}
|
|
|
|
|
|
|
|
SOME_SECRET_OLD1: {{ $previousSecret }}
|
|
|
|
|
|
|
|
{{- end }}
|
|
|
|
|
|
|
|
SOME_SECRET: {{ $previous.data.SOME_SECRET }}
|
|
|
|
|
|
|
|
{{- else if .Values.connect.jwt.secret }}
|
|
|
|
|
|
|
|
SOME_SECRET: {{ .Values.connect.jwt.secret | b64enc | quote }}
|
|
|
|
|
|
|
|
{{- else }}
|
|
|
|
|
|
|
|
SOME_SECRET: {{ randAlphaNum 32 | b64enc | quote }}
|
|
|
|
|
|
|
|
{{- end }}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
JWT_SECRET: "{{ .Values.connect.jwt.secret | b64enc }}"
|
|
|
|
JWT_SECRET: "{{ .Values.connect.jwt.secret | b64enc }}"
|
|
|
|
ADMIN_PASSWORD: "{{ .Values.connect.database.password | b64enc }}"
|
|
|
|
ADMIN_PASSWORD: "{{ .Values.connect.database.password | b64enc }}"
|
|
|
|
DATASOURCE_USERNAME: "{{ .Values.connect.database.username | b64enc }}"
|
|
|
|
DATASOURCE_USERNAME: "{{ .Values.connect.database.username | b64enc }}"
|
|
|
|
|