222 lines
7.4 KiB
Smarty
222 lines
7.4 KiB
Smarty
{{/*
|
|
Copyright Broadcom, Inc. All Rights Reserved.
|
|
SPDX-License-Identifier: APACHE-2.0
|
|
*/}}
|
|
|
|
{{/* vim: set filetype=mustache: */}}
|
|
|
|
{{- define "mariadb.primary.fullname" -}}
|
|
{{- if eq .Values.architecture "replication" }}
|
|
{{- printf "%s-%s" (include "common.names.fullname" .) .Values.primary.name | trunc 63 | trimSuffix "-" -}}
|
|
{{- else -}}
|
|
{{- include "common.names.fullname" . -}}
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{- define "mariadb.secondary.fullname" -}}
|
|
{{- printf "%s-%s" (include "common.names.fullname" .) .Values.secondary.name | trunc 63 | trimSuffix "-" -}}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Return the proper MariaDB image name
|
|
*/}}
|
|
{{- define "mariadb.image" -}}
|
|
{{ include "common.images.image" (dict "imageRoot" .Values.image "global" .Values.global) }}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Return the proper metrics image name
|
|
*/}}
|
|
{{- define "mariadb.metrics.image" -}}
|
|
{{ include "common.images.image" (dict "imageRoot" .Values.metrics.image "global" .Values.global) }}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Return the proper image name (for the init container volume-permissions image)
|
|
*/}}
|
|
{{- define "mariadb.volumePermissions.image" -}}
|
|
{{ include "common.images.image" (dict "imageRoot" .Values.volumePermissions.image "global" .Values.global) }}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Return the proper Docker Image Registry Secret Names
|
|
*/}}
|
|
{{- define "mariadb.imagePullSecrets" -}}
|
|
{{ include "common.images.pullSecrets" (dict "images" (list .Values.image .Values.metrics.image .Values.volumePermissions.image) "global" .Values.global) }}
|
|
{{- end -}}
|
|
|
|
{{ template "mariadb.initdbScriptsCM" . }}
|
|
{{/*
|
|
Get the initialization scripts ConfigMap name.
|
|
*/}}
|
|
{{- define "mariadb.initdbScriptsCM" -}}
|
|
{{- if .Values.initdbScriptsConfigMap -}}
|
|
{{- printf "%s" (tpl .Values.initdbScriptsConfigMap $) -}}
|
|
{{- else -}}
|
|
{{- printf "%s-init-scripts" (include "mariadb.primary.fullname" .) -}}
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Create the name of the service account to use
|
|
*/}}
|
|
{{- define "mariadb.serviceAccountName" -}}
|
|
{{- if .Values.serviceAccount.create -}}
|
|
{{ default (include "common.names.fullname" .) .Values.serviceAccount.name }}
|
|
{{- else -}}
|
|
{{ default "default" .Values.serviceAccount.name }}
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Return the MariaDB TLS credentials secret
|
|
*/}}
|
|
{{- define "mariadb.tlsSecretName" -}}
|
|
{{- if .Values.tls.existingSecret -}}
|
|
{{- print (tpl .Values.tls.existingSecret $) -}}
|
|
{{- else -}}
|
|
{{- printf "%s-crt" (include "common.names.fullname" .) | trunc 63 | trimSuffix "-" -}}
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{- define "mariadb.tlsCACert" -}}
|
|
{{- if or (eq .Values.tls.autoGenerated.engine "helm") (and (not .Values.tls.autoGenerated.enabled) (empty .Values.tls.existingSecret) .Values.tls.ca) -}}
|
|
{{- printf "/opt/bitnami/mariadb/certs/%s" "ca.crt" -}}
|
|
{{- else }}
|
|
{{- ternary "" (printf "/opt/bitnami/mariadb/certs/%s" .Values.tls.certCAFilename) (empty .Values.tls.certCAFilename) }}
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Return the configmap with the MariaDB Primary configuration
|
|
*/}}
|
|
{{- define "mariadb.primary.configmapName" -}}
|
|
{{- if .Values.primary.existingConfigmap -}}
|
|
{{- printf "%s" (tpl .Values.primary.existingConfigmap $) -}}
|
|
{{- else -}}
|
|
{{- printf "%s" (include "mariadb.primary.fullname" .) -}}
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Return true if a configmap object should be created for MariaDB Secondary
|
|
*/}}
|
|
{{- define "mariadb.primary.createConfigmap" -}}
|
|
{{- if and .Values.primary.configuration (not .Values.primary.existingConfigmap) }}
|
|
{{- true -}}
|
|
{{- else -}}
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Return the configmap with the MariaDB Primary configuration
|
|
*/}}
|
|
{{- define "mariadb.secondary.configmapName" -}}
|
|
{{- if .Values.secondary.existingConfigmap -}}
|
|
{{- printf "%s" (tpl .Values.secondary.existingConfigmap $) -}}
|
|
{{- else -}}
|
|
{{- printf "%s" (include "mariadb.secondary.fullname" .) -}}
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Return true if a configmap object should be created for MariaDB Secondary
|
|
*/}}
|
|
{{- define "mariadb.secondary.createConfigmap" -}}
|
|
{{- if and (eq .Values.architecture "replication") .Values.secondary.configuration (not .Values.secondary.existingConfigmap) }}
|
|
{{- true -}}
|
|
{{- else -}}
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Return the secret with MariaDB credentials
|
|
*/}}
|
|
{{- define "mariadb.secretName" -}}
|
|
{{- if .Values.auth.existingSecret -}}
|
|
{{- printf "%s" (tpl .Values.auth.existingSecret $) -}}
|
|
{{- else -}}
|
|
{{- include "common.names.fullname" . -}}
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Return the secret with previous MariaDB credentials
|
|
*/}}
|
|
{{- define "mariadb.update-job.previousSecretName" -}}
|
|
{{- if .Values.passwordUpdateJob.previousPasswords.existingSecret -}}
|
|
{{- /* The secret with the new password is managed externally */ -}}
|
|
{{- tpl .Values.passwordUpdateJob.previousPasswords.existingSecret $ -}}
|
|
{{- else if .Values.passwordUpdateJob.previousPasswords.rootPassword -}}
|
|
{{- /* The secret with the new password is managed externally */ -}}
|
|
{{- printf "%s-previous-secret" (include "common.names.fullname" .) | trunc 63 | trimSuffix "-" -}}
|
|
{{- else -}}
|
|
{{- /* The secret with the new password is managed by the helm chart. We use the current secret name as it has the old password */ -}}
|
|
{{- include "common.names.fullname" . -}}
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Return the secret with new MariaDB credentials
|
|
*/}}
|
|
{{- define "mariadb.update-job.newSecretName" -}}
|
|
{{- if and (not .Values.passwordUpdateJob.previousPasswords.existingSecret) (not .Values.passwordUpdateJob.previousPasswords.rootPassword) -}}
|
|
{{- /* The secret with the new password is managed by the helm chart. We create a new secret as the current one has the old password */ -}}
|
|
{{- printf "%s-new-secret" (include "common.names.fullname" .) | trunc 63 | trimSuffix "-" -}}
|
|
{{- else -}}
|
|
{{- /* The secret with the new password is managed externally */ -}}
|
|
{{- include "mariadb.secretName" . -}}
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Return true if a secret object should be created for MariaDB
|
|
*/}}
|
|
{{- define "mariadb.createSecret" -}}
|
|
{{- if not (or .Values.auth.existingSecret .Values.auth.customPasswordFiles) }}
|
|
{{- true -}}
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Return true if a secret object should be created for MariaDB
|
|
*/}}
|
|
{{- define "mariadb.createPreviousSecret" -}}
|
|
{{- if and .Values.passwordUpdateJob.previousPasswords.rootPassword (not .Values.passwordUpdateJob.previousPasswords.existingSecret) }}
|
|
{{- true -}}
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Compile all warnings into a single message, and call fail.
|
|
*/}}
|
|
{{- define "mariadb.validateValues" -}}
|
|
{{- $messages := list -}}
|
|
{{- $messages := append $messages (include "mariadb.validateValues.architecture" .) -}}
|
|
{{- $messages := without $messages "" -}}
|
|
{{- $message := join "\n" $messages -}}
|
|
|
|
{{- if $message -}}
|
|
{{- printf "\nVALUES VALIDATION:\n%s" $message | fail -}}
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{/* Validate values of MariaDB - must provide a valid architecture */}}
|
|
{{- define "mariadb.validateValues.architecture" -}}
|
|
{{- if and (ne .Values.architecture "standalone") (ne .Values.architecture "replication") -}}
|
|
mariadb: architecture
|
|
Invalid architecture selected. Valid values are "standalone" and
|
|
"replication". Please set a valid architecture (--set architecture="xxxx")
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Get existing password to access MariaDB
|
|
*/}}
|
|
{{- define "mariadb.secret.existPassword" -}}
|
|
{{- $secret := (lookup "v1" "Secret" .Release.Namespace (include "mariadb.secretName" .)).data -}}
|
|
{{- if hasKey $secret "mariadb-password" }}
|
|
{{- true -}}
|
|
{{- end -}}
|
|
{{- end -}}
|