62 lines
1.3 KiB
YAML
62 lines
1.3 KiB
YAML
image:
|
|
repository: tccr.io/truecharts/pinry
|
|
tag: v2.1.12@sha256:24640aa246e4b8eea718c291f99672f89bcf46a33c1e99ce0f7e6d949eb03a37
|
|
pullPolicy: IfNotPresent
|
|
|
|
securityContext:
|
|
readOnlyRootFilesystem: false
|
|
runAsNonRoot: false
|
|
|
|
podSecurityContext:
|
|
runAsUser: 0
|
|
runAsGroup: 0
|
|
|
|
env:
|
|
SECRET_KEY:
|
|
secretKeyRef:
|
|
name: pinry-secrets
|
|
key: SECRET_KEY
|
|
|
|
service:
|
|
main:
|
|
ports:
|
|
main:
|
|
port: 10213
|
|
targetPort: 80
|
|
|
|
persistence:
|
|
data:
|
|
enabled: true
|
|
mountPath: "/data"
|
|
|
|
installContainers:
|
|
1-create-key-file:
|
|
image: "{{ .Values.image.repository }}:{{ .Values.image.tag }}"
|
|
volumeMounts:
|
|
- name: data
|
|
mountPath: "/data"
|
|
env:
|
|
- name: SECRET_KEY
|
|
valueFrom:
|
|
secretKeyRef:
|
|
name: pinry-secrets
|
|
key: SECRET_KEY
|
|
command: ["sh", "-c"]
|
|
args:
|
|
- >
|
|
keyfile="/data/production_secret_key.txt";
|
|
if [ ! -f ${keyfile} ];
|
|
then
|
|
echo "No ${keyfile} File...";
|
|
echo "Creating ${keyfile} file...";
|
|
echo "${SECRET_KEY}" > ${keyfile};
|
|
if [ -f ${keyfile} ];
|
|
then
|
|
echo "Success!";
|
|
else
|
|
echo "Failed.";
|
|
fi;
|
|
else
|
|
echo "${keyfile} File exists. Skipping...";
|
|
fi;
|