30 lines
1.7 KiB
YAML
30 lines
1.7 KiB
YAML
{{- if (include "postgresql.createSecret" .) }}
|
|
apiVersion: v1
|
|
kind: Secret
|
|
metadata:
|
|
name: {{ include "common.names.fullname" . }}
|
|
namespace: {{ .Release.Namespace | quote }}
|
|
labels: {{- include "common.labels.standard" . | nindent 4 }}
|
|
{{- if .Values.commonLabels }}
|
|
{{- include "common.tplvalues.render" ( dict "value" .Values.commonLabels "context" $ ) | nindent 4 }}
|
|
{{- end }}
|
|
{{- if .Values.commonAnnotations }}
|
|
annotations: {{- include "common.tplvalues.render" ( dict "value" .Values.commonAnnotations "context" $ ) | nindent 4 }}
|
|
{{- end }}
|
|
type: Opaque
|
|
data:
|
|
{{- if .Values.auth.enablePostgresUser }}
|
|
postgres-password: {{ include "common.secrets.passwords.manage" (dict "secret" (include "common.names.fullname" .) "key" "postgres-password" "providedValues" (list "global.postgresql.auth.postgresPassword" "auth.postgresPassword") "context" $) }}
|
|
{{- end }}
|
|
{{- if not (empty (include "postgresql.username" .)) }}
|
|
password: {{ include "common.secrets.passwords.manage" (dict "secret" (include "common.names.fullname" .) "key" "password" "providedValues" (list "global.postgresql.auth.password" "auth.password") "context" $) }}
|
|
{{- end }}
|
|
{{- if eq .Values.architecture "replication" }}
|
|
replication-password: {{ include "common.secrets.passwords.manage" (dict "secret" (include "common.names.fullname" .) "key" "replication-password" "providedValues" (list "auth.replicationPassword") "context" $) }}
|
|
{{- end }}
|
|
# We don't auto-generate LDAP password when it's not provided as we do for other passwords
|
|
{{- if and .Values.ldap.enabled .Values.ldap.bind_password }}
|
|
ldap-password: {{ .Values.ldap.bind_password | b64enc | quote }}
|
|
{{- end }}
|
|
{{- end -}}
|