summaryrefslogtreecommitdiffstats
path: root/setup/projects/adei/templates
diff options
context:
space:
mode:
authorSuren A. Chilingaryan <csa@suren.me>2020-03-21 05:13:02 +0100
committerSuren A. Chilingaryan <csa@suren.me>2020-03-21 05:13:02 +0100
commit5de35a8ae4e76f283abf159f84bfa9c9b17efddb (patch)
treea0028adb00ef8ae86bd1adc8ff8089c3f905bfee /setup/projects/adei/templates
parentff3cbb6ee9aeac44a329c8eee505f60144d44b48 (diff)
downloadands-5de35a8ae4e76f283abf159f84bfa9c9b17efddb.tar.gz
ands-5de35a8ae4e76f283abf159f84bfa9c9b17efddb.tar.bz2
ands-5de35a8ae4e76f283abf159f84bfa9c9b17efddb.tar.xz
ands-5de35a8ae4e76f283abf159f84bfa9c9b17efddb.zip
Add ASEC database to ADEI namespace
Diffstat (limited to 'setup/projects/adei/templates')
-rw-r--r--setup/projects/adei/templates/01-asec-secret.yml.j240
1 files changed, 40 insertions, 0 deletions
diff --git a/setup/projects/adei/templates/01-asec-secret.yml.j2 b/setup/projects/adei/templates/01-asec-secret.yml.j2
new file mode 100644
index 0000000..17272aa
--- /dev/null
+++ b/setup/projects/adei/templates/01-asec-secret.yml.j2
@@ -0,0 +1,40 @@
+apiVersion: v1
+kind: Template
+metadata:
+ name: asec-secret
+ labels:
+ app: asec
+ annotations:
+ descriptions: "ASEC Secrets"
+objects:
+- apiVersion: v1
+ kind: Secret
+ metadata:
+ annotations:
+ template.openshift.io/expose-asec_password: '{.data[''asec-password'']}'
+ template.openshift.io/expose-root_password: '{.data[''root-password'']}'
+ template.openshift.io/expose-service_password: '{.data[''service-password'']}'
+ name: asec
+ stringData:
+ asec-password: "${ASEC_PASSWORD}"
+ root-password: "${ROOT_PASSWORD}"
+ service-password: "${SERVICE_PASSWORD}"
+parameters:
+- description: Password for the service users
+ displayName: Service Connection Password
+ from: '[a-zA-Z0-9]{16}'
+ generate: expression
+ name: SERVICE_PASSWORD
+ required: true
+- description: Password for the asec user
+ displayName: ASEC password
+ from: '[a-zA-Z0-9]{16}'
+ generate: expression
+ name: ASEC_PASSWORD
+ required: true
+- description: Password for the root users
+ displayName: DB Admin Password
+ from: '[a-zA-Z0-9]{16}'
+ generate: expression
+ name: ROOT_PASSWORD
+ required: true