62 lines
1.3 KiB
YAML
62 lines
1.3 KiB
YAML
|
image:
|
||
|
repository: tccr.io/truecharts/pinry
|
||
|
tag: v2.1.12@sha256:24640aa246e4b8eea718c291f99672f89bcf46a33c1e99ce0f7e6d949eb03a37
|
||
|
pullPolicy: IfNotPresent
|
||
|
|
||
|
securityContext:
|
||
|
readOnlyRootFilesystem: false
|
||
|
runAsNonRoot: false
|
||
|
|
||
|
podSecurityContext:
|
||
|
runAsUser: 0
|
||
|
runAsGroup: 0
|
||
|
|
||
|
env:
|
||
|
SECRET_KEY:
|
||
|
secretKeyRef:
|
||
|
name: pinry-secrets
|
||
|
key: SECRET_KEY
|
||
|
|
||
|
service:
|
||
|
main:
|
||
|
ports:
|
||
|
main:
|
||
|
port: 10213
|
||
|
targetPort: 80
|
||
|
|
||
|
persistence:
|
||
|
data:
|
||
|
enabled: true
|
||
|
mountPath: "/data"
|
||
|
|
||
|
installContainers:
|
||
|
1-create-key-file:
|
||
|
image: "{{ .Values.image.repository }}:{{ .Values.image.tag }}"
|
||
|
volumeMounts:
|
||
|
- name: data
|
||
|
mountPath: "/data"
|
||
|
env:
|
||
|
- name: SECRET_KEY
|
||
|
valueFrom:
|
||
|
secretKeyRef:
|
||
|
name: pinry-secrets
|
||
|
key: SECRET_KEY
|
||
|
command: ["sh", "-c"]
|
||
|
args:
|
||
|
- >
|
||
|
keyfile="/data/production_secret_key.txt";
|
||
|
if [ ! -f ${keyfile} ];
|
||
|
then
|
||
|
echo "No ${keyfile} File...";
|
||
|
echo "Creating ${keyfile} file...";
|
||
|
echo "${SECRET_KEY}" > ${keyfile};
|
||
|
if [ -f ${keyfile} ];
|
||
|
then
|
||
|
echo "Success!";
|
||
|
else
|
||
|
echo "Failed.";
|
||
|
fi;
|
||
|
else
|
||
|
echo "${keyfile} File exists. Skipping...";
|
||
|
fi;
|