Skip to content

Commit

Permalink
fix(portal): fix escaping of secret values
Browse files Browse the repository at this point in the history
  • Loading branch information
evegufy committed Sep 26, 2023
1 parent 5d445be commit f73875c
Show file tree
Hide file tree
Showing 5 changed files with 18 additions and 18 deletions.
4 changes: 2 additions & 2 deletions charts/portal/templates/secret-backend-external-db.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ data:
{{ else -}}
stringData:
# if secret doesn't exist, use provided value from values file or generate a random one
portal-password: {{ ( .Values.externalDatabase.portalPassword | quote ) | default ( randAlphaNum 32 | quote ) }}
provisioning-password: {{ ( .Values.externalDatabase.provisioningPassword | quote ) | default ( randAlphaNum 32 | quote ) }}
portal-password: {{ .Values.externalDatabase.portalPassword | default ( randAlphaNum 32 ) | quote }}
provisioning-password: {{ .Values.externalDatabase.provisioningPassword | default ( randAlphaNum 32) | quote }}
{{ end }}
{{- end -}}
14 changes: 7 additions & 7 deletions charts/portal/templates/secret-backend-interfaces.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -40,11 +40,11 @@ data:
{{ else -}}
stringData:
# if secret doesn't exist, use provided value from values file or generate a random one
bpdm-client-secret: {{ ( .Values.backend.processesworker.bpdm.clientSecret | quote ) | default ( randAlphaNum 32 | quote ) }}
clearinghouse-client-secret: {{ ( .Values.backend.processesworker.clearinghouse.clientSecret | quote ) | default ( randAlphaNum 32 | quote ) }}
custodian-client-secret: {{ ( .Values.backend.processesworker.custodian.clientSecret | quote ) | default ( randAlphaNum 32 | quote ) }}
sdfactory-client-secret: {{ ( .Values.backend.processesworker.sdfactory.clientSecret | quote ) | default ( randAlphaNum 32 | quote ) }}
offerprovider-client-secret: {{ ( .Values.backend.processesworker.offerprovider.clientSecret | quote ) | default ( randAlphaNum 32 | quote ) }}
onboardingserviceprovider-encryption-key: {{ .Values.backend.administration.onboardingServiceProvider.encryptionKey | quote | default ( randAlphaNum 32 | quote ) }}
process-onboardingserviceprovider-encryption-key: {{ .Values.backend.processesworker.onboardingServiceProvider.encryptionKey | quote | default ( randAlphaNum 32 | quote ) }}
bpdm-client-secret: {{ .Values.backend.processesworker.bpdm.clientSecret | default ( randAlphaNum 32 ) | quote }}
clearinghouse-client-secret: {{ .Values.backend.processesworker.clearinghouse.clientSecret | default ( randAlphaNum 32 ) | quote }}
custodian-client-secret: {{ .Values.backend.processesworker.custodian.clientSecret | default ( randAlphaNum 32 ) | quote }}
sdfactory-client-secret: {{ .Values.backend.processesworker.sdfactory.clientSecret | default ( randAlphaNum 32 ) | quote }}
offerprovider-client-secret: {{ .Values.backend.processesworker.offerprovider.clientSecret | default ( randAlphaNum 32 ) | quote }}
onboardingserviceprovider-encryption-key: {{ .Values.backend.administration.onboardingServiceProvider.encryptionKey | default ( randAlphaNum 32 ) | quote }}
process-onboardingserviceprovider-encryption-key: {{ .Values.backend.processesworker.onboardingServiceProvider.encryptionKey | default ( randAlphaNum 32 ) | quote }}
{{ end }}
6 changes: 3 additions & 3 deletions charts/portal/templates/secret-backend-keycloak.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ data:
{{ else -}}
stringData:
# if secret doesn't exist, use provided value from values file or generate a random one
central-db-password: {{ ( .Values.backend.keycloak.central.dbConnection.password | quote ) | default ( randAlphaNum 32 | quote ) }}
central-client-secret: {{ ( .Values.backend.keycloak.central.clientSecret | quote ) | default ( randAlphaNum 32 | quote ) }}
shared-client-secret: {{ ( .Values.backend.keycloak.shared.clientSecret | quote ) | default ( randAlphaNum 32 | quote ) }}
central-db-password: {{ .Values.backend.keycloak.central.dbConnection.password | default ( randAlphaNum 32 ) | quote }}
central-client-secret: {{ .Values.backend.keycloak.central.clientSecret | default ( randAlphaNum 32 ) | quote }}
shared-client-secret: {{ .Values.backend.keycloak.shared.clientSecret | default ( randAlphaNum 32 ) | quote }}
{{ end }}
4 changes: 2 additions & 2 deletions charts/portal/templates/secret-backend-mailing.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -35,6 +35,6 @@ data:
{{ else -}}
stringData:
# if secret doesn't exist, use provided value from values file or generate a random one
password: {{ ( .Values.backend.mailing.password | quote ) | default ( randAlphaNum 32 | quote ) }}
provisioning-sharedrealm-password: {{ ( .Values.backend.provisioning.sharedRealm.smtpServer.password | quote ) | default ( randAlphaNum 32 | quote ) }}
password: {{ .Values.backend.mailing.password | default ( randAlphaNum 32 ) | quote }}
provisioning-sharedrealm-password: {{ .Values.backend.provisioning.sharedRealm.smtpServer.password | default ( randAlphaNum 32 ) | quote }}
{{ end }}
8 changes: 4 additions & 4 deletions charts/portal/templates/secret-backend-postgres-init.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -38,9 +38,9 @@ data:
{{ else -}}
stringData:
# if secret doesn't exist, use provided value from values file or generate a random one
postgres-password: {{ .Values.postgresql.auth.password | default ( randAlphaNum 32 | quote ) }}
replication-password: {{ .Values.postgresql.auth.replicationPassword | default ( randAlphaNum 32 | quote ) }}
portal-password: {{ .Values.postgresql.auth.portalPassword | default ( randAlphaNum 32 | quote ) }}
provisioning-password: {{ .Values.postgresql.auth.provisioningPassword | default ( randAlphaNum 32 | quote ) }}
postgres-password: {{ .Values.postgresql.auth.password | default ( randAlphaNum 32 ) | quote }}
replication-password: {{ .Values.postgresql.auth.replicationPassword | default ( randAlphaNum 32 ) | quote }}
portal-password: {{ .Values.postgresql.auth.portalPassword | default ( randAlphaNum 32 ) | quote }}
provisioning-password: {{ .Values.postgresql.auth.provisioningPassword | default ( randAlphaNum 32 ) | quote }}
{{ end }}
{{- end -}}

0 comments on commit f73875c

Please sign in to comment.