Files
charts/bitnami/apisix/templates/tls-secret.yaml
Javier J. Salmerón-García a289c260d4 [bitnami/apisix] feat: 🎉 Add chart (#16851)
* [bitnami/apisix] feat: 🎉 Add chart

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>

* docs: 📝 Update NOTES.txt

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>

* Update README.md with readme-generator-for-helm

Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com>

* docs: 🚨 Fix markdown lint

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>

* chore: 🔧 Update service port to 80

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>

* chore: 🔧 Add missing namespace in runtime-parameters.yaml

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>

* chore: 🔧 Use serial verification mode

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>

* chore: 🐛 Set correct namespace indentation

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>

* chore: 🐛 Set port 443 in runtime-parameters

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>

* fix: 🐛 Apply requested changes

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>

* fix: 🐛 fix incorrect name

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>

* fix: 🐛 Use www.example.com as site

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>

* chore: 🔧 Return to parallel

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>

* fix: 🐛 Resolve requested issues

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>

* chore: 🔧 Update testing parameters

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>

* chore: ✏️ Set correct volume name

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>

* Update README.md with readme-generator-for-helm

Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com>

* docs: 📝 Update schema

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>

* test:  Revert ports

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>

* chore: 🔧 Add to cd-pipeline.yml

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>

---------

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>
Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com>
Co-authored-by: Bitnami Containers <bitnami-bot@vmware.com>
2023-05-23 13:21:30 +02:00

143 lines
10 KiB
YAML

{{- $ca := genCA "apisix-ca" 365 }}
{{- if and .Values.controlPlane.enabled (not .Values.controlPlane.tls.existingSecret) }}
{{/* For the control plane, it is mandatory to have TLS for the config server */}}
apiVersion: v1
kind: Secret
metadata:
name: {{ printf "%s-tls" (include "apisix.control-plane.fullname" .) }}
namespace: {{ include "common.names.namespace" . | quote }}
labels: {{- include "common.labels.standard" . | nindent 4 }}
app.kubernetes.io/part-of: apisix
app.kubernetes.io/component: control-plane
{{- if .Values.commonLabels }}
{{- include "common.tplvalues.render" ( dict "value" .Values.commonLabels "context" $ ) | nindent 4 }}
{{- end }}
{{- if .Values.commonAnnotations }}
annotations: {{- include "common.tplvalues.render" ( dict "value" .Values.commonAnnotations "context" $ ) | nindent 4 }}
{{- end }}
type: kubernetes.io/tls
data:
{{- if .Values.controlPlane.tls.autoGenerated }}
{{- $cert := genSignedCert (include "apisix.control-plane.fullname" .) nil (list (include "apisix.control-plane.fullname" .) (printf "%s.%s" (include "apisix.control-plane.fullname" .) (include "common.names.namespace" .)) (printf "%s.%s.svc" (include "apisix.control-plane.fullname" .) (include "common.names.namespace" .)) (printf "%s.%s.svc.%s" (include "apisix.control-plane.fullname" .) (include "common.names.namespace" .) .Values.clusterDomain)) 365 $ca }}
{{ .Values.controlPlane.tls.certFilename }}: {{ include "common.secrets.lookup" (dict "secret" (printf "%s-tls" (include "apisix.control-plane.fullname" .)) "key" .Values.controlPlane.tls.certFilename "defaultValue" $cert.Cert "context" $) }}
{{ .Values.controlPlane.tls.certKeyFilename }}: {{ include "common.secrets.lookup" (dict "secret" (printf "%s-tls" (include "apisix.control-plane.fullname" .)) "key" .Values.controlPlane.tls.certKeyFilename "defaultValue" $cert.Key "context" $) }}
{{ .Values.controlPlane.tls.certCAFilename }}: {{ include "common.secrets.lookup" (dict "secret" (printf "%s-tls" (include "apisix.control-plane.fullname" .)) "key" .Values.controlPlane.tls.certCAFilename "defaultValue" $ca.Cert "context" $) }}
{{- else }}
{{- if .Values.controlPlane.tls.cert }}
{{ .Values.controlPlane.tls.certFilename }}: {{ .Values.controlPlane.tls.cert | b64enc }}
{{- end }}
{{- if .Values.controlPlane.tls.key }}
{{ .Values.controlPlane.tls.certKeyFilename }}: {{ .Values.controlPlane.tls.key | b64enc }}
{{- end }}
{{- if .Values.controlPlane.tls.ca }}
{{ .Values.controlPlane.tls.certCAFilename }}: {{ .Values.controlPlane.tls.ca | b64enc }}
{{- end }}
{{- end }}
---
{{- end }}
{{- if and .Values.dataPlane.enabled .Values.dataPlane.tls.enabled (not .Values.dataPlane.tls.existingSecret) }}
apiVersion: v1
kind: Secret
metadata:
name: {{ printf "%s-tls" (include "apisix.data-plane.fullname" .) }}
namespace: {{ include "common.names.namespace" . | quote }}
labels: {{- include "common.labels.standard" . | nindent 4 }}
app.kubernetes.io/part-of: apisix
app.kubernetes.io/component: data-plane
{{- if .Values.commonLabels }}
{{- include "common.tplvalues.render" ( dict "value" .Values.commonLabels "context" $ ) | nindent 4 }}
{{- end }}
{{- if .Values.commonAnnotations }}
annotations: {{- include "common.tplvalues.render" ( dict "value" .Values.commonAnnotations "context" $ ) | nindent 4 }}
{{- end }}
type: kubernetes.io/tls
data:
{{- if .Values.dataPlane.tls.autoGenerated }}
{{- $cert := genSignedCert (include "apisix.data-plane.fullname" .) nil (list (include "apisix.data-plane.fullname" .) (printf "%s.%s" (include "apisix.data-plane.fullname" .) (include "common.names.namespace" .)) (printf "%s.%s.svc" (include "apisix.data-plane.fullname" .) (include "common.names.namespace" .)) (printf "%s.%s.svc.%s" (include "apisix.data-plane.fullname" .) (include "common.names.namespace" .) .Values.clusterDomain)) 365 $ca }}
{{ .Values.dataPlane.tls.certFilename }}: {{ include "common.secrets.lookup" (dict "secret" (printf "%s-tls" (include "apisix.data-plane.fullname" .)) "key" .Values.dataPlane.tls.certFilename "defaultValue" $cert.Cert "context" $) }}
{{ .Values.dataPlane.tls.certKeyFilename }}: {{ include "common.secrets.lookup" (dict "secret" (printf "%s-tls" (include "apisix.data-plane.fullname" .)) "key" .Values.dataPlane.tls.certKeyFilename "defaultValue" $cert.Key "context" $) }}
{{ .Values.dataPlane.tls.certCAFilename }}: {{ include "common.secrets.lookup" (dict "secret" (printf "%s-tls" (include "apisix.data-plane.fullname" .)) "key" .Values.dataPlane.tls.certCAFilename "defaultValue" $ca.Cert "context" $) }}
{{- else }}
{{- if .Values.dataPlane.tls.cert }}
{{ .Values.dataPlane.tls.certFilename }}: {{ .Values.dataPlane.tls.cert | b64enc }}
{{- end }}
{{- if .Values.dataPlane.tls.key }}
{{ .Values.dataPlane.tls.certKeyFilename }}: {{ .Values.dataPlane.tls.key | b64enc }}
{{- end }}
{{- if .Values.dataPlane.tls.ca }}
{{ .Values.dataPlane.tls.certCAFilename }}: {{ .Values.dataPlane.tls.ca | b64enc }}
{{- end }}
{{- end }}
---
{{- end }}
{{- if and .Values.ingressController.enabled .Values.ingressController.tls.enabled (not .Values.ingressController.tls.existingSecret) }}
apiVersion: v1
kind: Secret
metadata:
name: {{ printf "%s-tls" (include "apisix.ingress-controller.fullname" .) }}
namespace: {{ include "common.names.namespace" . | quote }}
labels: {{- include "common.labels.standard" . | nindent 4 }}
app.kubernetes.io/part-of: apisix
app.kubernetes.io/component: ingress-controller
{{- if .Values.commonLabels }}
{{- include "common.tplvalues.render" ( dict "value" .Values.commonLabels "context" $ ) | nindent 4 }}
{{- end }}
{{- if .Values.commonAnnotations }}
annotations: {{- include "common.tplvalues.render" ( dict "value" .Values.commonAnnotations "context" $ ) | nindent 4 }}
{{- end }}
type: kubernetes.io/tls
data:
{{- if .Values.ingressController.tls.autoGenerated }}
{{- $cert := genSignedCert (include "apisix.ingress-controller.fullname" .) nil (list (include "apisix.ingress-controller.fullname" .) (printf "%s.%s" (include "apisix.ingress-controller.fullname" .) (include "common.names.namespace" .)) (printf "%s.%s.svc" (include "apisix.ingress-controller.fullname" .) (include "common.names.namespace" .)) (printf "%s.%s.svc.%s" (include "apisix.ingress-controller.fullname" .) (include "common.names.namespace" .) .Values.clusterDomain)) 365 $ca }}
{{ .Values.ingressController.tls.certFilename }}: {{ include "common.secrets.lookup" (dict "secret" (printf "%s-tls" (include "apisix.ingress-controller.fullname" .)) "key" .Values.ingressController.tls.certFilename "defaultValue" $cert.Cert "context" $) }}
{{ .Values.ingressController.tls.certKeyFilename }}: {{ include "common.secrets.lookup" (dict "secret" (printf "%s-tls" (include "apisix.ingress-controller.fullname" .)) "key" .Values.ingressController.tls.certKeyFilename "defaultValue" $cert.Key "context" $) }}
{{ .Values.ingressController.tls.certCAFilename }}: {{ include "common.secrets.lookup" (dict "secret" (printf "%s-tls" (include "apisix.ingress-controller.fullname" .)) "key" .Values.ingressController.tls.certCAFilename "defaultValue" $ca.Cert "context" $) }}
{{- else }}
{{- if .Values.ingressController.tls.cert }}
{{ .Values.ingressController.tls.certFilename }}: {{ .Values.ingressController.tls.cert | b64enc }}
{{- end }}
{{- if .Values.ingressController.tls.key }}
{{ .Values.ingressController.tls.certKeyFilename }}: {{ .Values.ingressController.tls.key | b64enc }}
{{- end }}
{{- if .Values.ingressController.tls.ca }}
{{ .Values.ingressController.tls.certCAFilename }}: {{ .Values.ingressController.tls.ca | b64enc }}
{{- end }}
{{- end }}
---
{{- end }}
{{- if and .Values.dashboard.enabled .Values.dashboard.tls.enabled (not .Values.dashboard.tls.existingSecret) }}
apiVersion: v1
kind: Secret
metadata:
name: {{ printf "%s-tls" (include "apisix.dashboard.fullname" .) }}
namespace: {{ include "common.names.namespace" . | quote }}
labels: {{- include "common.labels.standard" . | nindent 4 }}
app.kubernetes.io/part-of: apisix
app.kubernetes.io/component: dashboard
{{- if .Values.commonLabels }}
{{- include "common.tplvalues.render" ( dict "value" .Values.commonLabels "context" $ ) | nindent 4 }}
{{- end }}
{{- if .Values.commonAnnotations }}
annotations: {{- include "common.tplvalues.render" ( dict "value" .Values.commonAnnotations "context" $ ) | nindent 4 }}
{{- end }}
type: kubernetes.io/tls
data:
{{- if .Values.dashboard.tls.autoGenerated }}
{{- $cert := genSignedCert (include "apisix.dashboard.fullname" .) nil (list (include "apisix.dashboard.fullname" .) (printf "%s.%s" (include "apisix.dashboard.fullname" .) (include "common.names.namespace" .)) (printf "%s.%s.svc" (include "apisix.dashboard.fullname" .) (include "common.names.namespace" .)) (printf "%s.%s.svc.%s" (include "apisix.dashboard.fullname" .) (include "common.names.namespace" .) .Values.clusterDomain)) 365 $ca }}
{{ .Values.dashboard.tls.certFilename }}: {{ include "common.secrets.lookup" (dict "secret" (printf "%s-tls" (include "apisix.dashboard.fullname" .)) "key" .Values.dashboard.tls.certFilename "defaultValue" $cert.Cert "context" $) }}
{{ .Values.dashboard.tls.certKeyFilename }}: {{ include "common.secrets.lookup" (dict "secret" (printf "%s-tls" (include "apisix.dashboard.fullname" .)) "key" .Values.dashboard.tls.certKeyFilename "defaultValue" $cert.Key "context" $) }}
{{ .Values.dashboard.tls.certCAFilename }}: {{ include "common.secrets.lookup" (dict "secret" (printf "%s-tls" (include "apisix.dashboard.fullname" .)) "key" .Values.dashboard.tls.certCAFilename "defaultValue" $ca.Cert "context" $) }}
{{- else }}
{{- if .Values.dashboard.tls.cert }}
{{ .Values.dashboard.tls.certFilename }}: {{ .Values.dashboard.tls.cert | b64enc }}
{{- end }}
{{- if .Values.dashboard.tls.key }}
{{ .Values.dashboard.tls.certKeyFilename }}: {{ .Values.dashboard.tls.key | b64enc }}
{{- end }}
{{- if .Values.dashboard.tls.ca }}
{{ .Values.dashboard.tls.certCAFilename }}: {{ .Values.dashboard.tls.ca | b64enc }}
{{- end }}
{{- end }}
---
{{- end }}