_helpers.tpl 9.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274
  1. {{/*
  2. Expand the name of the chart.
  3. */}}
  4. {{- define "external-secrets.name" -}}
  5. {{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" }}
  6. {{- end }}
  7. {{/*
  8. Create a default fully qualified app name.
  9. We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec).
  10. If release name contains chart name it will be used as a full name.
  11. */}}
  12. {{- define "external-secrets.fullname" -}}
  13. {{- if .Values.fullnameOverride }}
  14. {{- .Values.fullnameOverride | trunc 63 | trimSuffix "-" }}
  15. {{- else }}
  16. {{- $name := default .Chart.Name .Values.nameOverride }}
  17. {{- if contains $name .Release.Name }}
  18. {{- .Release.Name | trunc 63 | trimSuffix "-" }}
  19. {{- else }}
  20. {{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" }}
  21. {{- end }}
  22. {{- end }}
  23. {{- end }}
  24. {{/*
  25. Define namespace of chart, useful for multi-namespace deployments
  26. */}}
  27. {{- define "external-secrets.namespace" -}}
  28. {{- if .Values.namespaceOverride }}
  29. {{- .Values.namespaceOverride }}
  30. {{- else }}
  31. {{- .Release.Namespace }}
  32. {{- end }}
  33. {{- end }}
  34. {{/*
  35. Create chart name and version as used by the chart label.
  36. */}}
  37. {{- define "external-secrets.chart" -}}
  38. {{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" }}
  39. {{- end }}
  40. {{/*
  41. Common labels
  42. */}}
  43. {{- define "external-secrets.labels" -}}
  44. helm.sh/chart: {{ include "external-secrets.chart" . }}
  45. {{ include "external-secrets.selectorLabels" . }}
  46. {{- if .Chart.AppVersion }}
  47. app.kubernetes.io/version: {{ .Chart.AppVersion | quote }}
  48. {{- end }}
  49. app.kubernetes.io/managed-by: {{ .Release.Service }}
  50. {{- with .Values.commonLabels }}
  51. {{ toYaml . }}
  52. {{- end }}
  53. {{- end }}
  54. {{- define "external-secrets-webhook.labels" -}}
  55. {{- $shouldRenderStr := include "external-secrets.shouldRenderServiceMonitor" . | trim }}
  56. helm.sh/chart: {{ include "external-secrets.chart" . }}
  57. {{ include "external-secrets-webhook.selectorLabels" . }}
  58. {{- if .Chart.AppVersion }}
  59. app.kubernetes.io/version: {{ .Chart.AppVersion | quote }}
  60. {{- end }}
  61. app.kubernetes.io/managed-by: {{ .Release.Service }}
  62. {{- with .Values.commonLabels }}
  63. {{ toYaml . }}
  64. {{- end }}
  65. {{- if and .Values.serviceMonitor.enabled (eq $shouldRenderStr "true") }}
  66. app.kubernetes.io/metrics: "webhook"
  67. {{- with .Values.webhook.service.labels }}
  68. {{ toYaml . }}
  69. {{- end }}
  70. {{- end }}
  71. {{- end }}
  72. {{- define "external-secrets-webhook.annotations" -}}
  73. {{- if or .Values.webhook.service.annotations (and .Values.webhook.metrics.service.enabled .Values.webhook.metrics.service.annotations) -}}
  74. annotations:
  75. {{- with .Values.webhook.service.annotations }}
  76. {{- toYaml . | nindent 2 }}
  77. {{- end }}
  78. {{- if .Values.webhook.metrics.service.enabled }}
  79. {{- with .Values.webhook.metrics.service.annotations }}
  80. {{- toYaml . | nindent 2 }}
  81. {{- end }}
  82. {{- end }}
  83. {{- end }}
  84. {{- end }}
  85. {{- define "external-secrets-webhook-metrics.labels" -}}
  86. {{ include "external-secrets-webhook.selectorLabels" . }}
  87. app.kubernetes.io/metrics: "webhook"
  88. {{- with .Values.commonLabels }}
  89. {{ toYaml . }}
  90. {{- end }}
  91. {{- end }}
  92. {{- define "external-secrets-cert-controller.labels" -}}
  93. {{- $shouldRenderStr := include "external-secrets.shouldRenderServiceMonitor" . | trim }}
  94. helm.sh/chart: {{ include "external-secrets.chart" . }}
  95. {{ include "external-secrets-cert-controller.selectorLabels" . }}
  96. {{- if .Chart.AppVersion }}
  97. app.kubernetes.io/version: {{ .Chart.AppVersion | quote }}
  98. {{- end }}
  99. app.kubernetes.io/managed-by: {{ .Release.Service }}
  100. {{- with .Values.commonLabels }}
  101. {{ toYaml . }}
  102. {{- end }}
  103. {{- if and .Values.serviceMonitor.enabled (eq $shouldRenderStr "true") }}
  104. app.kubernetes.io/metrics: "cert-controller"
  105. {{- end }}
  106. {{- end }}
  107. {{- define "external-secrets-cert-controller-metrics.labels" -}}
  108. {{ include "external-secrets-cert-controller.selectorLabels" . }}
  109. app.kubernetes.io/metrics: "cert-controller"
  110. {{- with .Values.commonLabels }}
  111. {{ toYaml . }}
  112. {{- end }}
  113. {{- end }}
  114. {{/*
  115. Selector labels
  116. */}}
  117. {{- define "external-secrets.selectorLabels" -}}
  118. app.kubernetes.io/name: {{ include "external-secrets.name" . }}
  119. app.kubernetes.io/instance: {{ .Release.Name }}
  120. {{- end }}
  121. {{- define "external-secrets-webhook.selectorLabels" -}}
  122. app.kubernetes.io/name: {{ include "external-secrets.name" . }}-webhook
  123. app.kubernetes.io/instance: {{ .Release.Name }}
  124. {{- end }}
  125. {{- define "external-secrets-cert-controller.selectorLabels" -}}
  126. app.kubernetes.io/name: {{ include "external-secrets.name" . }}-cert-controller
  127. app.kubernetes.io/instance: {{ .Release.Name }}
  128. {{- end }}
  129. {{/*
  130. Create the name of the service account to use
  131. */}}
  132. {{- define "external-secrets.serviceAccountName" -}}
  133. {{- if .Values.serviceAccount.create }}
  134. {{- default (include "external-secrets.fullname" .) .Values.serviceAccount.name }}
  135. {{- else }}
  136. {{- default "default" .Values.serviceAccount.name }}
  137. {{- end }}
  138. {{- end }}
  139. {{/*
  140. Create the name of the service account to use
  141. */}}
  142. {{- define "external-secrets-webhook.serviceAccountName" -}}
  143. {{- if .Values.webhook.serviceAccount.create }}
  144. {{- default "external-secrets-webhook" .Values.webhook.serviceAccount.name }}
  145. {{- else }}
  146. {{- default "default" .Values.webhook.serviceAccount.name }}
  147. {{- end }}
  148. {{- end }}
  149. {{/*
  150. Create the name of the service account to use
  151. */}}
  152. {{- define "external-secrets-cert-controller.serviceAccountName" -}}
  153. {{- if .Values.certController.serviceAccount.create }}
  154. {{- default "external-secrets-cert-controller" .Values.certController.serviceAccount.name }}
  155. {{- else }}
  156. {{- default "default" .Values.certController.serviceAccount.name }}
  157. {{- end }}
  158. {{- end }}
  159. {{/*
  160. Determine the image to use, including if using a flavour.
  161. */}}
  162. {{- define "external-secrets.image" -}}
  163. {{- if .image.flavour -}}
  164. {{ printf "%s:%s-%s" .image.repository (.image.tag | default .chartAppVersion) .image.flavour }}
  165. {{- else }}
  166. {{ printf "%s:%s" .image.repository (.image.tag | default .chartAppVersion) }}
  167. {{- end }}
  168. {{- end }}
  169. {{/*
  170. Renders a complete tree, even values that contains template.
  171. */}}
  172. {{- define "external-secrets.render" -}}
  173. {{- if typeIs "string" .value }}
  174. {{- tpl .value .context }}
  175. {{ else }}
  176. {{- tpl (.value | toYaml) .context }}
  177. {{- end }}
  178. {{- end -}}
  179. {{/*
  180. Return true if the OpenShift is the detected platform
  181. Usage:
  182. {{- include "external-secrets.isOpenShift" . -}}
  183. */}}
  184. {{- define "external-secrets.isOpenShift" -}}
  185. {{- if .Capabilities.APIVersions.Has "security.openshift.io/v1" -}}
  186. {{- true -}}
  187. {{- end -}}
  188. {{- end -}}
  189. {{/*
  190. Render the securityContext based on the provided securityContext
  191. {{- include "external-secrets.renderSecurityContext" (dict "securityContext" .Values.securityContext "context" $) -}}
  192. */}}
  193. {{- define "external-secrets.renderSecurityContext" -}}
  194. {{- $adaptedContext := .securityContext -}}
  195. {{- if .context.Values.global.compatibility -}}
  196. {{- if .context.Values.global.compatibility.openshift -}}
  197. {{- if or (eq .context.Values.global.compatibility.openshift.adaptSecurityContext "force") (and (eq .context.Values.global.compatibility.openshift.adaptSecurityContext "auto") (include "external-secrets.isOpenShift" .context)) -}}
  198. {{/* Remove OpenShift managed fields */}}
  199. {{- $adaptedContext = omit $adaptedContext "fsGroup" "runAsUser" "runAsGroup" -}}
  200. {{- if not .securityContext.seLinuxOptions -}}
  201. {{- $adaptedContext = omit $adaptedContext "seLinuxOptions" -}}
  202. {{- end -}}
  203. {{- end -}}
  204. {{- end -}}
  205. {{- end -}}
  206. {{- omit $adaptedContext "enabled" | toYaml -}}
  207. {{- end -}}
  208. {{/*
  209. Create the name of the pod disruption budget to use
  210. */}}
  211. {{- define "external-secrets.pdbName" -}}
  212. {{- .Values.podDisruptionBudget.nameOverride | default (printf "%s-pdb" (include "external-secrets.fullname" .)) }}
  213. {{- end }}
  214. {{/*
  215. Create the name of the pod disruption budget to use in the cert controller
  216. */}}
  217. {{- define "external-secrets.certControllerPdbName" -}}
  218. {{- .Values.certController.podDisruptionBudget.nameOverride | default (printf "%s-cert-controller-pdb" (include "external-secrets.fullname" .)) }}
  219. {{- end }}
  220. {{/*
  221. Create the name of the pod disruption budget to use in the webhook
  222. */}}
  223. {{- define "external-secrets.webhookPdbName" -}}
  224. {{- .Values.webhook.podDisruptionBudget.nameOverride | default (printf "%s-webhook-pdb" (include "external-secrets.fullname" .)) }}
  225. {{- end }}
  226. Fail the install if a cluster scoped reconciler is enabled while its namespace scoped counterpart is disabled
  227. */}}
  228. {{- define "external-secrets.reconciler-sanity-test" -}}
  229. {{- if and (not .Values.processPushSecret) .Values.processClusterPushSecret -}}
  230. {{- fail "You have disabled processing of PushSecrets but not ClusterPushSecrets. This is an invalid configuration. ClusterPushSecret processing depends on processing of PushSecrets. Please either enable processing of PushSecrets, or disable processing of ClusterPushSecrets." }}
  231. {{- end -}}
  232. {{- end -}}
  233. {{/*
  234. Decide whether to render the ServiceMonitor resource.
  235. */}}
  236. {{- define "external-secrets.shouldRenderServiceMonitor" -}}
  237. {{- $mode := .Values.serviceMonitor.renderMode | default "skipIfMissing" -}}
  238. {{- if eq $mode "alwaysRender" -}}
  239. true
  240. {{- else if eq $mode "skipIfMissing" -}}
  241. {{- if has "monitoring.coreos.com/v1/ServiceMonitor" .Capabilities.APIVersions -}}
  242. true
  243. {{- else -}}
  244. false
  245. {{- end -}}
  246. {{- else if eq $mode "failIfMissing" -}}
  247. {{- if not (has "monitoring.coreos.com/v1/ServiceMonitor" .Capabilities.APIVersions) -}}
  248. {{- fail "ServiceMonitor CRD is required but not present in the cluster. See https://github.com/prometheus-operator/prometheus-operator/blob/main/example/prometheus-operator-crd/monitoring.coreos.com_servicemonitors.yaml or the settings for .Values.serviceMonitor.renderMode to suppress this error." -}}
  249. {{- end -}}
  250. true
  251. {{- else -}}
  252. {{- fail (printf "Invalid renderMode '%s'. Must be one of: skipIfMissing, failIfMissing, alwaysRender." $mode) -}}
  253. {{- end -}}
  254. {{- end -}}