Signed-off-by: kaldorn <nate.kaldor@outreach.io>
@@ -1,4 +1,4 @@
-{{- if .Values.certController.create }}
+{{- if and .Values.certController.create (not .Values.webhook.certManager.enable) }}
apiVersion: apps/v1
kind: Deployment
metadata:
-{{- if and .Values.certController.create .Values.certController.podDisruptionBudget.enabled }}
+{{- if and .Values.certController.create .Values.certController.podDisruptionBudget.enabled (not .Values.webhook.certManager.enabled) }}
apiVersion: policy/v1
kind: PodDisruptionBudget
@@ -16,4 +16,4 @@ spec:
selector:
matchLabels:
{{- include "external-secrets-cert-controller.selectorLabels" . | nindent 6 }}
-{{- end }}
+{{- end }}
-{{- if and .Values.certController.create .Values.certController.rbac.create -}}
+{{- if and .Values.certController.create .Values.certController.rbac.create (not .Values.webhook.certManager.enabled) -}}
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
-{{- if and .Values.certController.create .Values.certController.metrics.service.enabled }}
+{{- if and .Values.certController.create .Values.certController.metrics.service.enabled (not .Values.webhook.certManager.enabled) }}
apiVersion: v1
kind: Service
-{{- if and .Values.certController.create .Values.certController.serviceAccount.create -}}
+{{- if and .Values.certController.create .Values.certController.serviceAccount.create (not .Values.webhook.certManager.enabled) -}}
kind: ServiceAccount