Added possibility to have a Custom Secretname for the certificate (#16021)

* made secretname customizeable

Signed-off-by: Maik Brauer <maik.brauer@vodafone.com>

* Update bitnami/oauth2-proxy/templates/tls-secrets.yaml

Co-authored-by: Ibone González Mauraza <gibone@vmware.com>
Signed-off-by: Maik <38863280+VF-mbrauer@users.noreply.github.com>

* Update bitnami/oauth2-proxy/Chart.yaml

Co-authored-by: Ibone González Mauraza <gibone@vmware.com>
Signed-off-by: Maik <38863280+VF-mbrauer@users.noreply.github.com>

* Update bitnami/oauth2-proxy/templates/tls-secrets.yaml

Co-authored-by: Ibone González Mauraza <gibone@vmware.com>
Signed-off-by: Maik <38863280+VF-mbrauer@users.noreply.github.com>

---------

Signed-off-by: Maik Brauer <maik.brauer@vodafone.com>
Signed-off-by: Maik <38863280+VF-mbrauer@users.noreply.github.com>
Signed-off-by: Ibone González Mauraza <gibone@vmware.com>
Co-authored-by: Ibone González Mauraza <gibone@vmware.com>
This commit is contained in:
Maik
2023-04-12 16:41:55 +02:00
committed by GitHub
parent a51b4438f6
commit c01a7fb866
5 changed files with 7 additions and 3 deletions

View File

@@ -30,4 +30,4 @@ name: oauth2-proxy
sources:
- https://github.com/bitnami/containers/tree/main/bitnami/oauth2-proxy
- https://github.com/oauth2-proxy/oauth2-proxy
version: 3.4.10
version: 3.5.0

View File

@@ -107,6 +107,7 @@ The command removes all the Kubernetes components associated with the chart and
| `ingress.certManager` | Add the corresponding annotations for cert-manager integration | `false` |
| `ingress.selfSigned` | Create a TLS secret for this ingress record using self-signed certificates generated by Helm | `false` |
| `ingress.secrets` | Custom TLS certificates as secrets | `[]` |
| `ingress.existingSecretName` | If you're providing your own certificate and want to manage the secret yourself | `""` |
| `ingress.extraRules` | Additional rules to be covered with this ingress record | `[]` |
### OAuth2 Proxy Image parameters

View File

@@ -55,7 +55,7 @@ spec:
{{- if and .Values.ingress.tls (or .Values.ingress.certManager .Values.ingress.selfSigned) }}
- hosts:
- {{ .Values.ingress.hostname | quote }}
secretName: {{ printf "%s-tls" .Values.ingress.hostname }}
secretName: {{ .Values.ingress.existingSecretName | default (printf "%s-tls" .Values.ingress.hostname) }}
{{- end }}
{{- if .Values.ingress.extraTls }}
{{- include "common.tplvalues.render" ( dict "value" .Values.ingress.extraTls "context" $ ) | nindent 4 }}

View File

@@ -1,4 +1,4 @@
{{- if .Values.ingress.enabled }}
{{- if and .Values.ingress.enabled (not .Values.ingress.existingSecretName) }}
{{- if .Values.ingress.secrets }}
{{- range .Values.ingress.secrets }}
apiVersion: v1

View File

@@ -212,6 +212,9 @@ ingress:
## -----END CERTIFICATE-----
##
secrets: []
## @param ingress.existingSecretName If you're providing your own certificate and want to manage the secret yourself
##
existingSecretName: ""
## @param ingress.extraRules Additional rules to be covered with this ingress record
## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#ingress-rules
## e.g: