blob: 354b01e884ddbc44842072a8609e2a05adab5e73 [file] [log] [blame]
{{- if .Values.s3.enabled }}
---
apiVersion: "v1"
kind: "Secret"
metadata:
name: "{{ include "common.names.fullname" . }}-s3"
labels:
{{- include "common.labels.standard" . | nindent 4 }}
stringData:
OPENPROJECT_ATTACHMENTS__STORAGE: fog
OPENPROJECT_FOG_CREDENTIALS_PROVIDER: AWS
{{/* Fall back to '_' as secret name if the name is not given. This way `lookup` will return null (since secrets with this name will and cannot exist) which it doesn't with an empty string. */}}
{{ $secret := (lookup "v1" "Secret" .Release.Namespace (default "_" .Values.s3.auth.existingSecret)) | default (dict "data" dict) -}}
OPENPROJECT_FOG_CREDENTIALS_AWS__ACCESS__KEY__ID: {{
default .Values.s3.auth.accessKeyId (get $secret.data .Values.s3.auth.secretKeys.accessKeyId | b64dec) | quote
}}
OPENPROJECT_FOG_CREDENTIALS_AWS__SECRET__ACCESS__KEY: {{
default .Values.s3.auth.secretAccessKey (get $secret.data .Values.s3.auth.secretKeys.secretAccessKey | b64dec) | quote
}}
{{ if .Values.s3.endpoint -}}
OPENPROJECT_FOG_CREDENTIALS_ENDPOINT: {{ .Values.s3.endpoint }}
{{- end }}
{{ if .Values.s3.host -}}
OPENPROJECT_FOG_CREDENTIALS_HOST: {{ .Values.s3.host }}
{{- end }}
{{ if .Values.s3.port -}}
OPENPROJECT_FOG_CREDENTIALS_PORT: "{{ .Values.s3.port }}"
{{- end }}
OPENPROJECT_FOG_DIRECTORY: {{ .Values.s3.bucketName }}
OPENPROJECT_FOG_CREDENTIALS_REGION: {{ .Values.s3.region }}
OPENPROJECT_FOG_CREDENTIALS_PATH__STYLE: "{{ .Values.s3.pathStyle }}"
OPENPROJECT_FOG_CREDENTIALS_AWS__SIGNATURE__VERSION: "{{ .Values.s3.signatureVersion }}"
# remove use_iam_profile fallback after some point
OPENPROJECT_FOG_CREDENTIALS_USE__IAM__PROFILE: {{ if or .Values.s3.use_iam_profile .Values.s3.useIamProfile }}"true"{{else}}"false"{{end}}
OPENPROJECT_FOG_CREDENTIALS_ENABLE__SIGNATURE__V4__STREAMING: {{ if .Values.s3.enableSignatureV4Streaming }}"true"{{else}}"false"{{end}}
OPENPROJECT_DIRECT__UPLOADS: {{ if .Values.s3.directUploads }}"true"{{else}}"false"{{end}}
...
{{- end }}