Added ability to refrence an env from an existing configMaps and secrets

This commit is contained in:
Youcef Guichi
2023-10-19 11:33:48 +02:00
parent 775bd4b50c
commit 8720c33db4
6 changed files with 55 additions and 4 deletions
+20 -1
View File
@@ -1,21 +1,40 @@
{{- define "common.envFromRef.tpl" -}}
{{- if or (or (or (.Values.vars) (.Values.secretEnabled)) .Values.sealedSecrets) .Values.secretName -}}
{{- if or (or (or (.Values.vars) (.Values.secretEnabled) (.Values.envFrom)) .Values.sealedSecrets) .Values.secretName -}}
envFrom: &envFrom
{{- if .Values.vars }}
- configMapRef:
name: {{ template "common.robustName" .Release.Name }}
{{- end }}
{{- if .Values.envFrom }}
{{- range .Values.envFrom.existingSecrets }}
- secretRef:
name: {{ .name }}
optional: {{ .optional }}
{{- end }}
{{- range .Values.envFrom.existingConfigMaps }}
- configMapRef:
name: {{ .name }}
optional: {{ .optional }}
{{- end }}
{{- end }}
{{- if .Values.secretEnabled }}
- secretRef:
name: {{ include "common.robustName" $.Release.Name }}
{{- end }}
{{- if .Values.secretName }}
- secretRef:
name: {{ .Values.secretName }}
{{- end }}
{{- if .Values.sealedSecrets }}
- secretRef:
name: {{ template "common.robustName" .Release.Name }}
{{- end }}
{{- end }}
{{- end }}
Binary file not shown.
Binary file not shown.
+1 -1
View File
@@ -138,7 +138,7 @@ spec:
- -c
- {{ .Values.sidecar.command | quote }}
{{- end }}
{{- if or (or (.Values.vars) (.Values.secretEnabled)) .Values.sealedSecrets }}
{{- if or (or (.Values.vars) (.Values.secretEnabled) (.Values.envFrom)) .Values.sealedSecrets }}
envFrom: *envFrom
{{- end }}
{{- if or (or (.Values.volumes) (.Values.sealedFileSecrets)) .Values.fileSecrets }}
@@ -14,7 +14,21 @@ tests:
content:
configMapRef:
name: release-name
- it: Should not reference configmap if vars are not set
- it: Should reference to existing configmaps
set:
envFrom:
existingConfigMaps:
- name: firstcm
optional: true
- name: secondcm
optional: true
asserts:
- isNull:
- contains:
path: spec.template.spec.containers[0].envFrom
content:
configMapRef:
name: firstcm
optional: true
configMapRef:
name: secondcm
optional: true
@@ -31,3 +31,21 @@ tests:
content:
secretRef:
name: release-name
- it: Should reference to existing secrets
set:
envFrom:
existingSecrets:
- name: firstsecret
optional: true
- name: secondsecret
optional: true
asserts:
- contains:
path: spec.template.spec.containers[0].envFrom
content:
secretRef:
name: firstsecret
optional: true
secretRef:
name: secondsecret
optional: true