summaryrefslogtreecommitdiffstats
path: root/kubernetes/so/charts/so-mariadb/values.yaml
diff options
context:
space:
mode:
authorKrzysztof Opasiak <k.opasiak@samsung.com>2020-03-25 23:22:46 +0100
committerKrzysztof Opasiak <k.opasiak@samsung.com>2020-03-27 22:22:33 +0100
commitf68b72895b2fe13a50d7a059b25b42ba37469091 (patch)
tree5b45d73fccaf0a69a7bc552c721df5fa8f087768 /kubernetes/so/charts/so-mariadb/values.yaml
parent032e4e3909f1bc504d23cda2c6e90b59b08d6d2c (diff)
[SO] Use common secret template in so-mariadb
When porting so-mariadb component I've not noticed a few DB credentials hardcoded in shell scripts... Let's fix this and move all of them to common secret template Issue-ID: OOM-2328 Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com> Change-Id: I8b42b22b1eb67ee8f15aebf0f4fccaa62cf6fde5
Diffstat (limited to 'kubernetes/so/charts/so-mariadb/values.yaml')
-rwxr-xr-xkubernetes/so/charts/so-mariadb/values.yaml46
1 files changed, 46 insertions, 0 deletions
diff --git a/kubernetes/so/charts/so-mariadb/values.yaml b/kubernetes/so/charts/so-mariadb/values.yaml
index a5586c6665..d1f3f8061d 100755
--- a/kubernetes/so/charts/so-mariadb/values.yaml
+++ b/kubernetes/so/charts/so-mariadb/values.yaml
@@ -46,6 +46,33 @@ secrets:
helm.sh/hook: pre-upgrade,pre-install
helm.sh/hook-weight: "0"
helm.sh/hook-delete-policy: before-hook-creation
+ - uid: db-user-creds
+ type: basicAuth
+ externalSecret: '{{ .Values.db.userCredsExternalSecret }}'
+ login: '{{ .Values.db.userName }}'
+ password: '{{ .Values.db.userPassword }}'
+ - uid: db-admin-creds
+ type: basicAuth
+ externalSecret: '{{ .Values.db.adminCredsExternalSecret }}'
+ login: '{{ .Values.db.adminName }}'
+ password: '{{ .Values.db.adminPassword }}'
+ - uid: camunda-db-creds
+ type: basicAuth
+ externalSecret: '{{ .Values.db.camunda.dbCredsExternalSecret }}'
+ login: '{{ .Values.db.camunda.userName }}'
+ password: '{{ .Values.db.camunda.password }}'
+ - uid: request-db-creds
+ type: basicAuth
+ externalSecret: '{{ .Values.db.request.dbCredsExternalSecret }}'
+ login: '{{ .Values.db.request.userName }}'
+ password: '{{ .Values.db.request.password }}'
+ - uid: catalog-db-creds
+ type: basicAuth
+ externalSecret: '{{ .Values.db.catalog.dbCredsExternalSecret }}'
+ login: '{{ .Values.db.catalog.userName }}'
+ password: '{{ .Values.db.catalog.password }}'
+
+
#################################################################
# Application configuration defaults.
@@ -63,6 +90,25 @@ db:
backupPassword: secretpassword
backupUser: root
# backupCredsExternalSecret: some secret
+ userName: so_user
+ userPassword: so_User123
+ # userCredsExternalSecret: some secret
+ adminName: so_admin
+ adminPassword: so_Admin123
+ # adminCredsExternalSecret: some secret
+ camunda:
+ userName: camundauser
+ password: camunda123
+ # dbCredsExternalSecret: some secret
+ request:
+ userName: requestuser
+ password: request123
+ # dbCredsExternalSecret: some secret
+ catalog:
+ userName: cataloguser
+ password: catalog123
+ # dbCredsExternalSecret: some secret
+
# application configuration
config:
# gerrit branch where the latest heat code is checked in