UNCLASSIFIED - NO CUI

Skip to content
Snippets Groups Projects
Commit 662b13db authored by runyontr's avatar runyontr Committed by Michael McLeroy
Browse files

Breakout secrets into individual files

parent 9c11f547
No related branches found
No related tags found
1 merge request!451Breakout secrets into individual files
Showing
with 217 additions and 221 deletions
{{- if .Values.addons.anchore.enabled }}
{{- if ( include "imagePullSecret" . ) }}
apiVersion: v1
kind: Secret
metadata:
name: private-registry
namespace: anchore
type: kubernetes.io/dockerconfigjson
data:
.dockerconfigjson: {{ template "imagePullSecret" . }}
{{- end }}
{{- end }}
\ No newline at end of file
...@@ -5,16 +5,4 @@ metadata: ...@@ -5,16 +5,4 @@ metadata:
labels: labels:
app: {{ .Release.Name }}-anchore app: {{ .Release.Name }}-anchore
name: anchore name: anchore
---
{{- if ( include "imagePullSecret" . ) }}
apiVersion: v1
kind: Secret
metadata:
name: private-registry
namespace: anchore
type: kubernetes.io/dockerconfigjson
data:
.dockerconfigjson: {{ template "imagePullSecret" . }}
{{- end }}
{{- end }} {{- end }}
\ No newline at end of file
{{- if .Values.addons.argocd.enabled }}
{{- if ( include "imagePullSecret" . ) }}
apiVersion: v1
kind: Secret
metadata:
name: private-registry
namespace: argocd
type: kubernetes.io/dockerconfigjson
data:
.dockerconfigjson: {{ template "imagePullSecret" . }}
{{- end }}
{{- end }}
...@@ -7,16 +7,4 @@ metadata: ...@@ -7,16 +7,4 @@ metadata:
app.kubernetes.io/component: "core" app.kubernetes.io/component: "core"
{{- include "commonLabels" . | nindent 4}} {{- include "commonLabels" . | nindent 4}}
name: argocd name: argocd
---
{{- if ( include "imagePullSecret" . ) }}
apiVersion: v1
kind: Secret
metadata:
name: private-registry
namespace: argocd
type: kubernetes.io/dockerconfigjson
data:
.dockerconfigjson: {{ template "imagePullSecret" . }}
{{- end }}
{{- end }} {{- end }}
{{- if and .Values.istio.enabled ( or .Values.addons.authservice.enabled .Values.monitoring.sso.enabled .Values.jaeger.sso.enabled ) }}
{{- if ( include "imagePullSecret" . ) }}
apiVersion: v1
kind: Secret
metadata:
name: private-registry
namespace: authservice
type: kubernetes.io/dockerconfigjson
data:
.dockerconfigjson: {{ template "imagePullSecret" . }}
{{- end }}
{{- end }}
\ No newline at end of file
...@@ -7,17 +7,4 @@ metadata: ...@@ -7,17 +7,4 @@ metadata:
labels: labels:
istio-injection: enabled istio-injection: enabled
{{- end }} {{- end }}
{{- if ( include "imagePullSecret" . ) }}
---
apiVersion: v1
kind: Secret
metadata:
name: private-registry
namespace: authservice
type: kubernetes.io/dockerconfigjson
data:
.dockerconfigjson: {{ template "imagePullSecret" . }}
{{- end }}
{{- end }} {{- end }}
\ No newline at end of file
{{- if or .Values.gatekeeper.enabled .Values.clusterAuditor.enabled }}
{{- if ( include "imagePullSecret" . ) }}
apiVersion: v1
kind: Secret
metadata:
name: private-registry
namespace: gatekeeper-system
labels:
app.kubernetes.io/name: gatekeeper
app.kubernetes.io/component: "core"
{{- include "commonLabels" . | nindent 4}}
type: kubernetes.io/dockerconfigjson
data:
.dockerconfigjson: {{ template "imagePullSecret" . }}
{{- end }}
{{- end }}
\ No newline at end of file
...@@ -10,20 +10,4 @@ metadata: ...@@ -10,20 +10,4 @@ metadata:
app.kubernetes.io/component: "core" app.kubernetes.io/component: "core"
{{- include "commonLabels" . | nindent 4}} {{- include "commonLabels" . | nindent 4}}
name: gatekeeper-system name: gatekeeper-system
---
{{- if ( include "imagePullSecret" . ) }}
apiVersion: v1
kind: Secret
metadata:
name: private-registry
namespace: gatekeeper-system
labels:
app.kubernetes.io/name: gatekeeper
app.kubernetes.io/component: "core"
{{- include "commonLabels" . | nindent 4}}
type: kubernetes.io/dockerconfigjson
data:
.dockerconfigjson: {{ template "imagePullSecret" . }}
{{- end }}
{{- end }} {{- end }}
\ No newline at end of file
{{- if or .Values.addons.gitlab.enabled .Values.addons.gitlabRunner.enabled }}
{{- if ( include "imagePullSecret" . ) }}
apiVersion: v1
kind: Secret
metadata:
name: private-registry
namespace: gitlab
labels:
app.kubernetes.io/name: gitlab
app.kubernetes.io/component: "developer-tools"
{{- include "commonLabels" . | nindent 4}}
type: kubernetes.io/dockerconfigjson
data:
.dockerconfigjson: {{ template "imagePullSecret" . }}
{{- end }}
{{- end }}
\ No newline at end of file
...@@ -7,114 +7,4 @@ metadata: ...@@ -7,114 +7,4 @@ metadata:
app.kubernetes.io/component: "developer-tools" app.kubernetes.io/component: "developer-tools"
{{- include "commonLabels" . | nindent 4}} {{- include "commonLabels" . | nindent 4}}
name: gitlab name: gitlab
---
{{- if ( include "imagePullSecret" . ) }}
apiVersion: v1
kind: Secret
metadata:
name: private-registry
namespace: gitlab
labels:
app.kubernetes.io/name: gitlab
app.kubernetes.io/component: "developer-tools"
{{- include "commonLabels" . | nindent 4}}
type: kubernetes.io/dockerconfigjson
data:
.dockerconfigjson: {{ template "imagePullSecret" . }}
{{- end }}
---
{{- end }}
{{- if .Values.addons.gitlab.enabled }}
# create sso secret. The assumption is OIDC
{{- if .Values.addons.gitlab.sso.enabled }}
apiVersion: v1
kind: Secret
metadata:
name: gitlab-sso-provider
namespace: gitlab
type: kubernetes.io/opaque
stringData:
gitlab-sso.json: |-
{
"name": "openid_connect",
"label": "{{ .Values.addons.gitlab.sso.label }}",
"args": {
"name": "openid_connect",
"scope": [
"Gitlab"
],
"response_type": "code",
"issuer": "https://{{ .Values.sso.oidc.host }}/auth/realms/{{ .Values.sso.oidc.realm }}",
"client_auth_method": "query",
"discovery": true,
"uid_field": "preferred_username",
"client_options": {
"identifier": "{{ .Values.addons.gitlab.sso.client_id | default .Values.sso.client_id }}",
"secret": "{{ .Values.addons.gitlab.sso.client_secret | default .Values.sso.client_secret }}",
"redirect_uri": "https://{{ .Values.addons.gitlab.hostnames.gitlab }}/users/auth/openid_connect/callback",
"end_session_endpoint": "https://{{ .Values.sso.oidc.host }}/auth/realms/{{ .Values.sso.oidc.realm }}/protocol/openid-connect/logout"
}
}
}
{{- end }}
---
# create database secret
{{- if .Values.addons.gitlab.database.host }}
apiVersion: v1
kind: Secret
metadata:
name: gitlab-database
namespace: gitlab
type: kubernetes.io/opaque
stringData:
PGPASSWORD: {{ .Values.addons.gitlab.database.password }}
{{- end }}
---
# create object storage secret
{{- if .Values.addons.gitlab.objectStorage.endpoint }}
apiVersion: v1
kind: Secret
metadata:
name: gitlab-object-storage
namespace: gitlab
type: kubernetes.io/opaque
stringData:
rails: |-
provider: AWS
region: {{ .Values.addons.gitlab.objectStorage.region }}
aws_access_key_id: {{ .Values.addons.gitlab.objectStorage.accessKey }}
aws_secret_access_key: {{ .Values.addons.gitlab.objectStorage.accessSecret }}
{{- if eq .Values.addons.gitlab.objectStorage.type "minio" }}
aws_signature_version: 4
host: {{ regexReplaceAll "http(s{0,1})://(.*):(\\d+)" .Values.addons.gitlab.objectStorage.endpoint "${2}" }}
endpoint: "{{ .Values.addons.gitlab.objectStorage.endpoint }}"
path_style: true
{{- end }}
registry: |-
s3:
{{- if .Values.addons.gitlab.objectStorage.bucketPrefix }}
bucket: {{ .Values.addons.gitlab.objectStorage.bucketPrefix }}-gitlab-registry
{{- else }}
bucket: gitlab-registry
{{- end }}
accesskey: {{ .Values.addons.gitlab.objectStorage.accessKey }}
secretkey: {{ .Values.addons.gitlab.objectStorage.accessSecret }}
region: {{ .Values.addons.gitlab.objectStorage.region }}
{{- if eq .Values.addons.gitlab.objectStorage.type "s3" }}
v4auth: true
{{- end }}
{{- if eq .Values.addons.gitlab.objectStorage.type "minio" }}
aws_signature_version: 4
host: {{ regexReplaceAll "http(s{0,1})://(.*):(\\d+)" .Values.addons.gitlab.objectStorage.endpoint "${2}" }}
regionendpoint: "{{ .Values.addons.gitlab.objectStorage.endpoint }}"
path_style: true
{{- end }}
backups: |-
[default]
access_key = {{ .Values.addons.gitlab.objectStorage.accessKey }}
secret_key = {{ .Values.addons.gitlab.objectStorage.accessSecret }}
bucket_location = {{ .Values.addons.gitlab.objectStorage.region }}
host_bucket = %(bucket)s.{{ regexReplaceAll "http(s*)://" .Values.addons.gitlab.objectStorage.endpoint "" }}
{{- end }}
{{- end }} {{- end }}
\ No newline at end of file
{{- if or .Values.addons.gitlab.enabled .Values.addons.gitlabRunner.enabled }}
{{- if .Values.addons.gitlab.database.host }}
apiVersion: v1
kind: Secret
metadata:
name: gitlab-database
namespace: gitlab
type: kubernetes.io/opaque
stringData:
PGPASSWORD: {{ .Values.addons.gitlab.database.password }}
{{- end }}
{{- end }}
\ No newline at end of file
{{- if or .Values.addons.gitlab.enabled .Values.addons.gitlabRunner.enabled }}
{{- if .Values.addons.gitlab.objectStorage.endpoint }}
apiVersion: v1
kind: Secret
metadata:
name: gitlab-object-storage
namespace: gitlab
type: kubernetes.io/opaque
stringData:
rails: |-
provider: AWS
region: {{ .Values.addons.gitlab.objectStorage.region }}
aws_access_key_id: {{ .Values.addons.gitlab.objectStorage.accessKey }}
aws_secret_access_key: {{ .Values.addons.gitlab.objectStorage.accessSecret }}
{{- if eq .Values.addons.gitlab.objectStorage.type "minio" }}
aws_signature_version: 4
host: {{ regexReplaceAll "http(s{0,1})://(.*):(\\d+)" .Values.addons.gitlab.objectStorage.endpoint "${2}" }}
endpoint: "{{ .Values.addons.gitlab.objectStorage.endpoint }}"
path_style: true
{{- end }}
registry: |-
s3:
{{- if .Values.addons.gitlab.objectStorage.bucketPrefix }}
bucket: {{ .Values.addons.gitlab.objectStorage.bucketPrefix }}-gitlab-registry
{{- else }}
bucket: gitlab-registry
{{- end }}
accesskey: {{ .Values.addons.gitlab.objectStorage.accessKey }}
secretkey: {{ .Values.addons.gitlab.objectStorage.accessSecret }}
region: {{ .Values.addons.gitlab.objectStorage.region }}
{{- if eq .Values.addons.gitlab.objectStorage.type "s3" }}
v4auth: true
{{- end }}
{{- if eq .Values.addons.gitlab.objectStorage.type "minio" }}
aws_signature_version: 4
host: {{ regexReplaceAll "http(s{0,1})://(.*):(\\d+)" .Values.addons.gitlab.objectStorage.endpoint "${2}" }}
regionendpoint: "{{ .Values.addons.gitlab.objectStorage.endpoint }}"
path_style: true
{{- end }}
backups: |-
[default]
access_key = {{ .Values.addons.gitlab.objectStorage.accessKey }}
secret_key = {{ .Values.addons.gitlab.objectStorage.accessSecret }}
bucket_location = {{ .Values.addons.gitlab.objectStorage.region }}
host_bucket = %(bucket)s.{{ regexReplaceAll "http(s*)://" .Values.addons.gitlab.objectStorage.endpoint "" }}
{{- end }}
{{- end }}
\ No newline at end of file
{{- if or .Values.addons.gitlab.enabled .Values.addons.gitlabRunner.enabled }}
{{- if .Values.addons.gitlab.sso.enabled }}
apiVersion: v1
kind: Secret
metadata:
name: gitlab-sso-provider
namespace: gitlab
type: kubernetes.io/opaque
stringData:
gitlab-sso.json: |-
{
"name": "openid_connect",
"label": "{{ .Values.addons.gitlab.sso.label }}",
"args": {
"name": "openid_connect",
"scope": [
"Gitlab"
],
"response_type": "code",
"issuer": "https://{{ .Values.sso.oidc.host }}/auth/realms/{{ .Values.sso.oidc.realm }}",
"client_auth_method": "query",
"discovery": true,
"uid_field": "preferred_username",
"client_options": {
"identifier": "{{ .Values.addons.gitlab.sso.client_id | default .Values.sso.client_id }}",
"secret": "{{ .Values.addons.gitlab.sso.client_secret | default .Values.sso.client_secret }}",
"redirect_uri": "https://{{ .Values.addons.gitlab.hostnames.gitlab }}/users/auth/openid_connect/callback",
"end_session_endpoint": "https://{{ .Values.sso.oidc.host }}/auth/realms/{{ .Values.sso.oidc.realm }}/protocol/openid-connect/logout"
}
}
}
{{- end }}
{{- end}}
\ No newline at end of file
{{- if .Values.istio.enabled }}
{{- if and .Values.openshift ( include "imagePullSecret" . ) }}
apiVersion: v1
kind: Secret
metadata:
name: private-registry
namespace: kube-system
type: kubernetes.io/dockerconfigjson
data:
.dockerconfigjson: {{ template "imagePullSecret" . }}
{{- end }}
{{- end }}
\ No newline at end of file
{{- if .Values.istio.enabled }}
{{- if ( include "imagePullSecret" . ) }}
apiVersion: v1
kind: Secret
metadata:
name: private-registry
namespace: istio-system
labels:
app.kubernetes.io/name: istio-controlplane
app.kubernetes.io/component: "core"
{{- include "commonLabels" . | nindent 4}}
type: kubernetes.io/dockerconfigjson
data:
.dockerconfigjson: {{ template "imagePullSecret" . }}
{{- end }}
{{- end }}
\ No newline at end of file
...@@ -7,46 +7,4 @@ metadata: ...@@ -7,46 +7,4 @@ metadata:
app.kubernetes.io/name: istio-controlplane app.kubernetes.io/name: istio-controlplane
app.kubernetes.io/component: "core" app.kubernetes.io/component: "core"
{{- include "commonLabels" . | nindent 4}} {{- include "commonLabels" . | nindent 4}}
{{- if ( include "imagePullSecret" . ) }}
---
apiVersion: v1
kind: Secret
metadata:
name: private-registry
namespace: istio-system
labels:
app.kubernetes.io/name: istio-controlplane
app.kubernetes.io/component: "core"
{{- include "commonLabels" . | nindent 4}}
type: kubernetes.io/dockerconfigjson
data:
.dockerconfigjson: {{ template "imagePullSecret" . }}
{{- if .Values.openshift }}
---
apiVersion: v1
kind: Secret
metadata:
name: private-registry
namespace: kube-system
type: kubernetes.io/dockerconfigjson
data:
.dockerconfigjson: {{ template "imagePullSecret" . }}
{{- end }}
{{- end }}
---
{{- if and .Values.istio.ingress.key .Values.istio.ingress.cert }}
apiVersion: v1
kind: Secret
metadata:
name: wildcard-cert
namespace: istio-system
labels:
app.kubernetes.io/name: istio-controlplane
app.kubernetes.io/component: "core"
{{- include "commonLabels" . | nindent 4}}
type: kubernetes.io/tls
data:
tls.crt: {{ .Values.istio.ingress.cert | b64enc }}
tls.key: {{ .Values.istio.ingress.key | b64enc}}
{{- end }}
{{- end }} {{- end }}
\ No newline at end of file
{{- if and .Values.istio.enabled (and .Values.istio.ingress.key .Values.istio.ingress.cert ) }}
apiVersion: v1
kind: Secret
metadata:
name: wildcard-cert
namespace: istio-system
labels:
app.kubernetes.io/name: istio-controlplane
app.kubernetes.io/component: "core"
{{- include "commonLabels" . | nindent 4}}
type: kubernetes.io/tls
data:
tls.crt: {{ .Values.istio.ingress.cert | b64enc }}
tls.key: {{ .Values.istio.ingress.key | b64enc}}
{{- end }}
\ No newline at end of file
...@@ -12,5 +12,4 @@ imagePullSecrets: ...@@ -12,5 +12,4 @@ imagePullSecrets:
- private-registry - private-registry
openshift: {{ .Values.openshift }} openshift: {{ .Values.openshift }}
{{- end -}} {{- end -}}
{{- if and .Values.istiooperator.enabled ( include "imagePullSecret" . ) }}
apiVersion: v1
kind: Secret
metadata:
name: private-registry
namespace: istio-operator
labels:
app.kubernetes.io/name: istio-operator
app.kubernetes.io/component: "core"
{{- include "commonLabels" . | nindent 4}}
type: kubernetes.io/dockerconfigjson
data:
.dockerconfigjson: {{ template "imagePullSecret" . }}
{{- end }}
\ No newline at end of file
...@@ -9,19 +9,4 @@ metadata: ...@@ -9,19 +9,4 @@ metadata:
app.kubernetes.io/name: istio-operator app.kubernetes.io/name: istio-operator
app.kubernetes.io/component: "core" app.kubernetes.io/component: "core"
{{- include "commonLabels" . | nindent 4}} {{- include "commonLabels" . | nindent 4}}
{{- if ( include "imagePullSecret" . ) }}
---
apiVersion: v1
kind: Secret
metadata:
name: private-registry
namespace: istio-operator
labels:
app.kubernetes.io/name: istio-operator
app.kubernetes.io/component: "core"
{{- include "commonLabels" . | nindent 4}}
type: kubernetes.io/dockerconfigjson
data:
.dockerconfigjson: {{ template "imagePullSecret" . }}
{{- end }}
{{- end }} {{- end }}
\ No newline at end of file
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment