Supporting secretName without secretEnabled

This commit is contained in:
Laszlo Fogas
2021-08-02 08:46:16 +02:00
parent ade37a82c7
commit ae6c219132
2 changed files with 7 additions and 10 deletions
+6 -2
View File
@@ -61,7 +61,7 @@ spec:
- -c
- {{ .Values.command | quote }}
{{- end }}
{{- if or (or (.Values.vars) (.Values.secretEnabled)) .Values.sealedSecrets }}
{{- if or (or (or (.Values.vars) (.Values.secretEnabled)) .Values.sealedSecrets) .Values.secretName }}
envFrom: &envFrom
{{- if .Values.vars }}
- configMapRef:
@@ -69,7 +69,11 @@ spec:
{{- end }}
{{- if .Values.secretEnabled }}
- secretRef:
name: {{ .Values.secretName | default (include "robustName" $.Release.Name) }}
name: {{ include "robustName" $.Release.Name }}
{{- end }}
{{- if .Values.secretName }}
- secretRef:
name: {{ .Values.secretName }}
{{- end }}
{{- if .Values.sealedSecrets }}
- secretRef:
@@ -12,15 +12,8 @@ tests:
content:
secretRef:
name: release-name
- it: Should not reference secret if secret is disabled
- it: Should reference secret by name
set:
secretEnabled: false
asserts:
- isNull:
path: spec.template.spec.containers[0].envFrom
- it: Should not reference secret if secret is disabled
set:
secretEnabled: true
secretName: my-custom-secret
asserts:
- contains: