feat: secrets

main
Sven Ketelsen 4 years ago
parent 0ceceb4eb0
commit ded88fa82e

@ -1,10 +1,26 @@
--- ---
# store the secret-name as var
# in my case, the name was very long and containing a lot of fields
# so it helps me a lot
{{- $secret_name := "your-secret-name" -}}
apiVersion: v1 apiVersion: v1
kind: Secret kind: Secret
metadata: metadata:
name: connect-secrets name: "{{ $secret_name }}"
data: data:
JWT_SECRET: "{{ .Values.connect.jwt.secret | b64enc }}" # try to get the old secret
# keep in mind, that a dry-run only returns an empty map
{{- $old_sec := lookup "v1" "Secret" .Release.Namespace $secret_name }}
# check, if a secret is already set
{{- if or (not $old_sec) (not $old_sec.data) (not index $old_sec.data "JWT_SECRET") }}
# if not set, then generate a new password
JWT_SECRET: {{ # 20 | b64enc }}
{{ else }}
# if set, then use the old value
JWT_SECRET: {{ index $old_sec.data "JWT_SECRET" }}
{{ end }}
ADMIN_PASSWORD: "{{ .Values.connect.database.password | b64enc}}" ADMIN_PASSWORD: "{{ .Values.connect.database.password | b64enc}}"
DATASOURCE_USERNAME: "{{ .Values.connect.database.username | b64enc }}" DATASOURCE_USERNAME: "{{ .Values.connect.database.username | b64enc }}"
DATASOURCE_PASSWORD: "{{ .Values.connect.database.password | b64enc }}" DATASOURCE_PASSWORD: "{{ .Values.connect.database.password | b64enc }}"

Loading…
Cancel
Save