2020 )
2121 %}
2222
23- {%- set prometheus_oidc_enabled = prometheus.spec.config.get(' enable_oidc_authentication' , False ) %}
23+ {%- set prometheus_oidc_enabled = prometheus.spec.get( ' config' , {}) .get(' enable_oidc_authentication' , False ) %}
2424{%- set alertmanager_oidc_enabled = alertmanager.spec.get(' config' , {}).get(' enable_oidc_authentication' , False ) %}
2525
26- {%- set prometheus_ca_namespace = prometheus.spec.config.get(' oidc' , {}).get(' caSecret' , {}).get(' namespace' , ' ' ) %}
27- {%- set alertmanager_ca_namespace = alertmanager.spec.get(' config' , {}).get(' oidc' , {}).get(' caSecret' , {}).get(' namespace' , ' ' ) %}
26+ {%- set prometheus_ca_namespace = prometheus.spec.get( ' config' , {}) .get(' oidc' , {}).get(' caSecret' , {}).get(' namespace' , ' metalk8s-ingress ' ) %}
27+ {%- set alertmanager_ca_namespace = alertmanager.spec.get(' config' , {}).get(' oidc' , {}).get(' caSecret' , {}).get(' namespace' , ' metalk8s-ingress ' ) %}
2828
2929{%- if prometheus_oidc_enabled %}
3030
@@ -37,8 +37,6 @@ Create oidc-proxy-prometheus ServiceAccount:
3737 name: oidc-proxy-prometheus
3838 namespace: metalk8s-monitoring
3939
40- {%- if prometheus_ca_namespace %}
41-
4240Create oidc-proxy-prometheus-secret-reader Role in {{ prometheus_ca_namespace }} :
4341 metalk8s_kubernetes.object_present :
4442 - manifest:
@@ -69,8 +67,6 @@ Create oidc-proxy-prometheus-secret-reader-binding RoleBinding in {{ prometheus_
6967 name: oidc-proxy-prometheus-secret-reader
7068 apiGroup: rbac.authorization.k8s.io
7169
72- {%- endif %}
73-
7470{%- else %}
7571
7672Ensure oidc-proxy-prometheus ServiceAccount does not exist :
@@ -80,8 +76,6 @@ Ensure oidc-proxy-prometheus ServiceAccount does not exist:
8076 - kind: ServiceAccount
8177 - apiVersion: v1
8278
83- {%- if prometheus_ca_namespace %}
84-
8579Ensure oidc-proxy-prometheus-secret-reader Role does not exist in {{ prometheus_ca_namespace }} :
8680 metalk8s_kubernetes.object_absent :
8781 - name: oidc-proxy-prometheus-secret-reader
@@ -98,8 +92,6 @@ Ensure oidc-proxy-prometheus-secret-reader-binding RoleBinding does not exist in
9892
9993{%- endif %}
10094
101- {%- endif %}
102-
10395{%- if alertmanager_oidc_enabled %}
10496
10597Create oidc-proxy-alertmanager ServiceAccount :
@@ -111,8 +103,6 @@ Create oidc-proxy-alertmanager ServiceAccount:
111103 name: oidc-proxy-alertmanager
112104 namespace: metalk8s-monitoring
113105
114- {%- if alertmanager_ca_namespace %}
115-
116106Create oidc-proxy-alertmanager-secret-reader Role in {{ alertmanager_ca_namespace }} :
117107 metalk8s_kubernetes.object_present :
118108 - manifest:
@@ -143,8 +133,6 @@ Create oidc-proxy-alertmanager-secret-reader-binding RoleBinding in {{ alertmana
143133 name: oidc-proxy-alertmanager-secret-reader
144134 apiGroup: rbac.authorization.k8s.io
145135
146- {%- endif %}
147-
148136{%- else %}
149137
150138Ensure oidc-proxy-alertmanager ServiceAccount does not exist :
@@ -154,8 +142,6 @@ Ensure oidc-proxy-alertmanager ServiceAccount does not exist:
154142 - kind: ServiceAccount
155143 - apiVersion: v1
156144
157- {%- if alertmanager_ca_namespace %}
158-
159145Ensure oidc-proxy-alertmanager-secret-reader Role does not exist in {{ alertmanager_ca_namespace }} :
160146 metalk8s_kubernetes.object_absent :
161147 - name: oidc-proxy-alertmanager-secret-reader
@@ -171,5 +157,3 @@ Ensure oidc-proxy-alertmanager-secret-reader-binding RoleBinding does not exist
171157 - apiVersion: rbac.authorization.k8s.io/v1
172158
173159{%- endif %}
174-
175- {%- endif %}
0 commit comments