mirror of
https://github.com/bitnami/charts.git
synced 2026-04-02 07:17:26 +08:00
* [bitnami/apisix] feat: 🎉 Add chart Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com> * docs: 📝 Update NOTES.txt Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com> * Update README.md with readme-generator-for-helm Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com> * docs: 🚨 Fix markdown lint Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com> * chore: 🔧 Update service port to 80 Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com> * chore: 🔧 Add missing namespace in runtime-parameters.yaml Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com> * chore: 🔧 Use serial verification mode Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com> * chore: 🐛 Set correct namespace indentation Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com> * chore: 🐛 Set port 443 in runtime-parameters Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com> * fix: 🐛 Apply requested changes Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com> * fix: 🐛 fix incorrect name Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com> * fix: 🐛 Use www.example.com as site Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com> * chore: 🔧 Return to parallel Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com> * fix: 🐛 Resolve requested issues Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com> * chore: 🔧 Update testing parameters Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com> * chore: ✏️ Set correct volume name Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com> * Update README.md with readme-generator-for-helm Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com> * docs: 📝 Update schema Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com> * test: ⏪ Revert ports Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com> * chore: 🔧 Add to cd-pipeline.yml Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com> --------- Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com> Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com> Co-authored-by: Bitnami Containers <bitnami-bot@vmware.com>
143 lines
10 KiB
YAML
143 lines
10 KiB
YAML
{{- $ca := genCA "apisix-ca" 365 }}
|
|
{{- if and .Values.controlPlane.enabled (not .Values.controlPlane.tls.existingSecret) }}
|
|
{{/* For the control plane, it is mandatory to have TLS for the config server */}}
|
|
apiVersion: v1
|
|
kind: Secret
|
|
metadata:
|
|
name: {{ printf "%s-tls" (include "apisix.control-plane.fullname" .) }}
|
|
namespace: {{ include "common.names.namespace" . | quote }}
|
|
labels: {{- include "common.labels.standard" . | nindent 4 }}
|
|
app.kubernetes.io/part-of: apisix
|
|
app.kubernetes.io/component: control-plane
|
|
{{- if .Values.commonLabels }}
|
|
{{- include "common.tplvalues.render" ( dict "value" .Values.commonLabels "context" $ ) | nindent 4 }}
|
|
{{- end }}
|
|
{{- if .Values.commonAnnotations }}
|
|
annotations: {{- include "common.tplvalues.render" ( dict "value" .Values.commonAnnotations "context" $ ) | nindent 4 }}
|
|
{{- end }}
|
|
type: kubernetes.io/tls
|
|
data:
|
|
{{- if .Values.controlPlane.tls.autoGenerated }}
|
|
{{- $cert := genSignedCert (include "apisix.control-plane.fullname" .) nil (list (include "apisix.control-plane.fullname" .) (printf "%s.%s" (include "apisix.control-plane.fullname" .) (include "common.names.namespace" .)) (printf "%s.%s.svc" (include "apisix.control-plane.fullname" .) (include "common.names.namespace" .)) (printf "%s.%s.svc.%s" (include "apisix.control-plane.fullname" .) (include "common.names.namespace" .) .Values.clusterDomain)) 365 $ca }}
|
|
{{ .Values.controlPlane.tls.certFilename }}: {{ include "common.secrets.lookup" (dict "secret" (printf "%s-tls" (include "apisix.control-plane.fullname" .)) "key" .Values.controlPlane.tls.certFilename "defaultValue" $cert.Cert "context" $) }}
|
|
{{ .Values.controlPlane.tls.certKeyFilename }}: {{ include "common.secrets.lookup" (dict "secret" (printf "%s-tls" (include "apisix.control-plane.fullname" .)) "key" .Values.controlPlane.tls.certKeyFilename "defaultValue" $cert.Key "context" $) }}
|
|
{{ .Values.controlPlane.tls.certCAFilename }}: {{ include "common.secrets.lookup" (dict "secret" (printf "%s-tls" (include "apisix.control-plane.fullname" .)) "key" .Values.controlPlane.tls.certCAFilename "defaultValue" $ca.Cert "context" $) }}
|
|
{{- else }}
|
|
{{- if .Values.controlPlane.tls.cert }}
|
|
{{ .Values.controlPlane.tls.certFilename }}: {{ .Values.controlPlane.tls.cert | b64enc }}
|
|
{{- end }}
|
|
{{- if .Values.controlPlane.tls.key }}
|
|
{{ .Values.controlPlane.tls.certKeyFilename }}: {{ .Values.controlPlane.tls.key | b64enc }}
|
|
{{- end }}
|
|
{{- if .Values.controlPlane.tls.ca }}
|
|
{{ .Values.controlPlane.tls.certCAFilename }}: {{ .Values.controlPlane.tls.ca | b64enc }}
|
|
{{- end }}
|
|
{{- end }}
|
|
---
|
|
{{- end }}
|
|
{{- if and .Values.dataPlane.enabled .Values.dataPlane.tls.enabled (not .Values.dataPlane.tls.existingSecret) }}
|
|
apiVersion: v1
|
|
kind: Secret
|
|
metadata:
|
|
name: {{ printf "%s-tls" (include "apisix.data-plane.fullname" .) }}
|
|
namespace: {{ include "common.names.namespace" . | quote }}
|
|
labels: {{- include "common.labels.standard" . | nindent 4 }}
|
|
app.kubernetes.io/part-of: apisix
|
|
app.kubernetes.io/component: data-plane
|
|
{{- if .Values.commonLabels }}
|
|
{{- include "common.tplvalues.render" ( dict "value" .Values.commonLabels "context" $ ) | nindent 4 }}
|
|
{{- end }}
|
|
{{- if .Values.commonAnnotations }}
|
|
annotations: {{- include "common.tplvalues.render" ( dict "value" .Values.commonAnnotations "context" $ ) | nindent 4 }}
|
|
{{- end }}
|
|
type: kubernetes.io/tls
|
|
data:
|
|
{{- if .Values.dataPlane.tls.autoGenerated }}
|
|
{{- $cert := genSignedCert (include "apisix.data-plane.fullname" .) nil (list (include "apisix.data-plane.fullname" .) (printf "%s.%s" (include "apisix.data-plane.fullname" .) (include "common.names.namespace" .)) (printf "%s.%s.svc" (include "apisix.data-plane.fullname" .) (include "common.names.namespace" .)) (printf "%s.%s.svc.%s" (include "apisix.data-plane.fullname" .) (include "common.names.namespace" .) .Values.clusterDomain)) 365 $ca }}
|
|
{{ .Values.dataPlane.tls.certFilename }}: {{ include "common.secrets.lookup" (dict "secret" (printf "%s-tls" (include "apisix.data-plane.fullname" .)) "key" .Values.dataPlane.tls.certFilename "defaultValue" $cert.Cert "context" $) }}
|
|
{{ .Values.dataPlane.tls.certKeyFilename }}: {{ include "common.secrets.lookup" (dict "secret" (printf "%s-tls" (include "apisix.data-plane.fullname" .)) "key" .Values.dataPlane.tls.certKeyFilename "defaultValue" $cert.Key "context" $) }}
|
|
{{ .Values.dataPlane.tls.certCAFilename }}: {{ include "common.secrets.lookup" (dict "secret" (printf "%s-tls" (include "apisix.data-plane.fullname" .)) "key" .Values.dataPlane.tls.certCAFilename "defaultValue" $ca.Cert "context" $) }}
|
|
{{- else }}
|
|
{{- if .Values.dataPlane.tls.cert }}
|
|
{{ .Values.dataPlane.tls.certFilename }}: {{ .Values.dataPlane.tls.cert | b64enc }}
|
|
{{- end }}
|
|
{{- if .Values.dataPlane.tls.key }}
|
|
{{ .Values.dataPlane.tls.certKeyFilename }}: {{ .Values.dataPlane.tls.key | b64enc }}
|
|
{{- end }}
|
|
{{- if .Values.dataPlane.tls.ca }}
|
|
{{ .Values.dataPlane.tls.certCAFilename }}: {{ .Values.dataPlane.tls.ca | b64enc }}
|
|
{{- end }}
|
|
{{- end }}
|
|
---
|
|
{{- end }}
|
|
{{- if and .Values.ingressController.enabled .Values.ingressController.tls.enabled (not .Values.ingressController.tls.existingSecret) }}
|
|
apiVersion: v1
|
|
kind: Secret
|
|
metadata:
|
|
name: {{ printf "%s-tls" (include "apisix.ingress-controller.fullname" .) }}
|
|
namespace: {{ include "common.names.namespace" . | quote }}
|
|
labels: {{- include "common.labels.standard" . | nindent 4 }}
|
|
app.kubernetes.io/part-of: apisix
|
|
app.kubernetes.io/component: ingress-controller
|
|
{{- if .Values.commonLabels }}
|
|
{{- include "common.tplvalues.render" ( dict "value" .Values.commonLabels "context" $ ) | nindent 4 }}
|
|
{{- end }}
|
|
{{- if .Values.commonAnnotations }}
|
|
annotations: {{- include "common.tplvalues.render" ( dict "value" .Values.commonAnnotations "context" $ ) | nindent 4 }}
|
|
{{- end }}
|
|
type: kubernetes.io/tls
|
|
data:
|
|
{{- if .Values.ingressController.tls.autoGenerated }}
|
|
{{- $cert := genSignedCert (include "apisix.ingress-controller.fullname" .) nil (list (include "apisix.ingress-controller.fullname" .) (printf "%s.%s" (include "apisix.ingress-controller.fullname" .) (include "common.names.namespace" .)) (printf "%s.%s.svc" (include "apisix.ingress-controller.fullname" .) (include "common.names.namespace" .)) (printf "%s.%s.svc.%s" (include "apisix.ingress-controller.fullname" .) (include "common.names.namespace" .) .Values.clusterDomain)) 365 $ca }}
|
|
{{ .Values.ingressController.tls.certFilename }}: {{ include "common.secrets.lookup" (dict "secret" (printf "%s-tls" (include "apisix.ingress-controller.fullname" .)) "key" .Values.ingressController.tls.certFilename "defaultValue" $cert.Cert "context" $) }}
|
|
{{ .Values.ingressController.tls.certKeyFilename }}: {{ include "common.secrets.lookup" (dict "secret" (printf "%s-tls" (include "apisix.ingress-controller.fullname" .)) "key" .Values.ingressController.tls.certKeyFilename "defaultValue" $cert.Key "context" $) }}
|
|
{{ .Values.ingressController.tls.certCAFilename }}: {{ include "common.secrets.lookup" (dict "secret" (printf "%s-tls" (include "apisix.ingress-controller.fullname" .)) "key" .Values.ingressController.tls.certCAFilename "defaultValue" $ca.Cert "context" $) }}
|
|
{{- else }}
|
|
{{- if .Values.ingressController.tls.cert }}
|
|
{{ .Values.ingressController.tls.certFilename }}: {{ .Values.ingressController.tls.cert | b64enc }}
|
|
{{- end }}
|
|
{{- if .Values.ingressController.tls.key }}
|
|
{{ .Values.ingressController.tls.certKeyFilename }}: {{ .Values.ingressController.tls.key | b64enc }}
|
|
{{- end }}
|
|
{{- if .Values.ingressController.tls.ca }}
|
|
{{ .Values.ingressController.tls.certCAFilename }}: {{ .Values.ingressController.tls.ca | b64enc }}
|
|
{{- end }}
|
|
{{- end }}
|
|
---
|
|
{{- end }}
|
|
{{- if and .Values.dashboard.enabled .Values.dashboard.tls.enabled (not .Values.dashboard.tls.existingSecret) }}
|
|
apiVersion: v1
|
|
kind: Secret
|
|
metadata:
|
|
name: {{ printf "%s-tls" (include "apisix.dashboard.fullname" .) }}
|
|
namespace: {{ include "common.names.namespace" . | quote }}
|
|
labels: {{- include "common.labels.standard" . | nindent 4 }}
|
|
app.kubernetes.io/part-of: apisix
|
|
app.kubernetes.io/component: dashboard
|
|
{{- if .Values.commonLabels }}
|
|
{{- include "common.tplvalues.render" ( dict "value" .Values.commonLabels "context" $ ) | nindent 4 }}
|
|
{{- end }}
|
|
{{- if .Values.commonAnnotations }}
|
|
annotations: {{- include "common.tplvalues.render" ( dict "value" .Values.commonAnnotations "context" $ ) | nindent 4 }}
|
|
{{- end }}
|
|
type: kubernetes.io/tls
|
|
data:
|
|
{{- if .Values.dashboard.tls.autoGenerated }}
|
|
{{- $cert := genSignedCert (include "apisix.dashboard.fullname" .) nil (list (include "apisix.dashboard.fullname" .) (printf "%s.%s" (include "apisix.dashboard.fullname" .) (include "common.names.namespace" .)) (printf "%s.%s.svc" (include "apisix.dashboard.fullname" .) (include "common.names.namespace" .)) (printf "%s.%s.svc.%s" (include "apisix.dashboard.fullname" .) (include "common.names.namespace" .) .Values.clusterDomain)) 365 $ca }}
|
|
{{ .Values.dashboard.tls.certFilename }}: {{ include "common.secrets.lookup" (dict "secret" (printf "%s-tls" (include "apisix.dashboard.fullname" .)) "key" .Values.dashboard.tls.certFilename "defaultValue" $cert.Cert "context" $) }}
|
|
{{ .Values.dashboard.tls.certKeyFilename }}: {{ include "common.secrets.lookup" (dict "secret" (printf "%s-tls" (include "apisix.dashboard.fullname" .)) "key" .Values.dashboard.tls.certKeyFilename "defaultValue" $cert.Key "context" $) }}
|
|
{{ .Values.dashboard.tls.certCAFilename }}: {{ include "common.secrets.lookup" (dict "secret" (printf "%s-tls" (include "apisix.dashboard.fullname" .)) "key" .Values.dashboard.tls.certCAFilename "defaultValue" $ca.Cert "context" $) }}
|
|
{{- else }}
|
|
{{- if .Values.dashboard.tls.cert }}
|
|
{{ .Values.dashboard.tls.certFilename }}: {{ .Values.dashboard.tls.cert | b64enc }}
|
|
{{- end }}
|
|
{{- if .Values.dashboard.tls.key }}
|
|
{{ .Values.dashboard.tls.certKeyFilename }}: {{ .Values.dashboard.tls.key | b64enc }}
|
|
{{- end }}
|
|
{{- if .Values.dashboard.tls.ca }}
|
|
{{ .Values.dashboard.tls.certCAFilename }}: {{ .Values.dashboard.tls.ca | b64enc }}
|
|
{{- end }}
|
|
{{- end }}
|
|
---
|
|
{{- end }}
|