blob: 03a16a8e2d72147f12ccd203590fbee4566ca520 [file] [log] [blame]
gioc9161872024-04-21 10:46:35 +04001{{- if .Values.openproject.oidc.enabled }}
2---
3apiVersion: "v1"
4kind: "Secret"
5metadata:
6 name: "{{ include "common.names.fullname" . }}-oidc"
7 labels:
8 {{- include "common.labels.standard" . | nindent 4 }}
9stringData:
10 # OpenID Connect settings
11 {{ $oidc_prefix := printf "OPENPROJECT_OPENID__CONNECT_%s" (upper .Values.openproject.oidc.provider) }}
12 {{ $oidc_prefix }}_DISPLAY__NAME: {{ .Values.openproject.oidc.displayName | quote }}
13 {{ $oidc_prefix }}_HOST: {{ .Values.openproject.oidc.host | quote }}
14 {{/* Fall back to '_' as secret name if the name is not given. This way `lookup` will return null (since secrets with this name will and cannot exist) which it doesn't with an empty string. */}}
15 {{ $secret := (lookup "v1" "Secret" .Release.Namespace (default "_" .Values.openproject.oidc.existingSecret)) | default (dict "data" dict) -}}
16 {{ $oidc_prefix }}_IDENTIFIER: {{
17 default .Values.openproject.oidc.identifier (get $secret.data .Values.openproject.oidc.secretKeys.identifier | b64dec) | quote
18 }}
19 {{ $oidc_prefix }}_SECRET: {{
20 default .Values.openproject.oidc.secret (get $secret.data .Values.openproject.oidc.secretKeys.secret | b64dec) | quote
21 }}
22 {{ $oidc_prefix }}_AUTHORIZATION__ENDPOINT: {{ .Values.openproject.oidc.authorizationEndpoint | quote }}
23 {{ $oidc_prefix }}_TOKEN__ENDPOINT: {{ .Values.openproject.oidc.tokenEndpoint | quote }}
24 {{ $oidc_prefix }}_USERINFO__ENDPOINT: {{ .Values.openproject.oidc.userinfoEndpoint | quote }}
25 {{ $oidc_prefix }}_END__SESSION__ENDPOINT: {{ .Values.openproject.oidc.endSessionEndpoint | quote }}
26 {{ $oidc_prefix }}_SCOPE: {{ .Values.openproject.oidc.scope | quote }}
27 {{- range $key, $value := .Values.openproject.oidc.attribute_map }}
28 {{ $mapping_key := printf "%s_ATTRIBUTE__MAP_%s" $oidc_prefix (upper $key) }}
29 {{ $mapping_key }}: {{ $value | quote }}
30 {{- end }}
31...
32{{- end }}