Skip to content

Commit cad8035

Browse files
committed
MK8S-140 - Set default ca namespace in oidc-proxy-rbac
1 parent c3b55f6 commit cad8035

File tree

2 files changed

+5
-21
lines changed

2 files changed

+5
-21
lines changed

salt/metalk8s/addons/prometheus-operator/deployed/oidc-proxy-prometheus.sls

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,8 @@
1212
)
1313
%}
1414
15-
{%- set prometheus_oidc_enabled = prometheus.spec.config.get('enable_oidc_authentication', False) %}
16-
{%- set prometheus_oidc = prometheus.spec.config.get('oidc', {}) %}
15+
{%- set prometheus_oidc_enabled = prometheus.spec.get('config', {}).get('enable_oidc_authentication', False) %}
16+
{%- set prometheus_oidc = prometheus.spec.get('config', {}).get('oidc', {}) %}
1717
1818
{%- set prometheus_oidc_ca = prometheus_oidc.get('caSecret', {}) %}
1919
{%- set ca_namespace = prometheus_oidc_ca.get('namespace', 'metalk8s-ingress') %}

salt/metalk8s/addons/prometheus-operator/deployed/oidc-proxy-rbac.sls

Lines changed: 3 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -20,11 +20,11 @@
2020
)
2121
%}
2222

23-
{%- set prometheus_oidc_enabled = prometheus.spec.config.get('enable_oidc_authentication', False) %}
23+
{%- set prometheus_oidc_enabled = prometheus.spec.get('config', {}).get('enable_oidc_authentication', False) %}
2424
{%- set alertmanager_oidc_enabled = alertmanager.spec.get('config', {}).get('enable_oidc_authentication', False) %}
2525

26-
{%- set prometheus_ca_namespace = prometheus.spec.config.get('oidc', {}).get('caSecret', {}).get('namespace', '') %}
27-
{%- set alertmanager_ca_namespace = alertmanager.spec.get('config', {}).get('oidc', {}).get('caSecret', {}).get('namespace', '') %}
26+
{%- set prometheus_ca_namespace = prometheus.spec.get('config', {}).get('oidc', {}).get('caSecret', {}).get('namespace', 'metalk8s-ingress') %}
27+
{%- set alertmanager_ca_namespace = alertmanager.spec.get('config', {}).get('oidc', {}).get('caSecret', {}).get('namespace', 'metalk8s-ingress') %}
2828

2929
{%- if prometheus_oidc_enabled %}
3030

@@ -37,8 +37,6 @@ Create oidc-proxy-prometheus ServiceAccount:
3737
name: oidc-proxy-prometheus
3838
namespace: metalk8s-monitoring
3939

40-
{%- if prometheus_ca_namespace %}
41-
4240
Create oidc-proxy-prometheus-secret-reader Role in {{ prometheus_ca_namespace }}:
4341
metalk8s_kubernetes.object_present:
4442
- manifest:
@@ -69,8 +67,6 @@ Create oidc-proxy-prometheus-secret-reader-binding RoleBinding in {{ prometheus_
6967
name: oidc-proxy-prometheus-secret-reader
7068
apiGroup: rbac.authorization.k8s.io
7169

72-
{%- endif %}
73-
7470
{%- else %}
7571

7672
Ensure oidc-proxy-prometheus ServiceAccount does not exist:
@@ -80,8 +76,6 @@ Ensure oidc-proxy-prometheus ServiceAccount does not exist:
8076
- kind: ServiceAccount
8177
- apiVersion: v1
8278

83-
{%- if prometheus_ca_namespace %}
84-
8579
Ensure oidc-proxy-prometheus-secret-reader Role does not exist in {{ prometheus_ca_namespace }}:
8680
metalk8s_kubernetes.object_absent:
8781
- name: oidc-proxy-prometheus-secret-reader
@@ -98,8 +92,6 @@ Ensure oidc-proxy-prometheus-secret-reader-binding RoleBinding does not exist in
9892

9993
{%- endif %}
10094

101-
{%- endif %}
102-
10395
{%- if alertmanager_oidc_enabled %}
10496

10597
Create oidc-proxy-alertmanager ServiceAccount:
@@ -111,8 +103,6 @@ Create oidc-proxy-alertmanager ServiceAccount:
111103
name: oidc-proxy-alertmanager
112104
namespace: metalk8s-monitoring
113105

114-
{%- if alertmanager_ca_namespace %}
115-
116106
Create oidc-proxy-alertmanager-secret-reader Role in {{ alertmanager_ca_namespace }}:
117107
metalk8s_kubernetes.object_present:
118108
- manifest:
@@ -143,8 +133,6 @@ Create oidc-proxy-alertmanager-secret-reader-binding RoleBinding in {{ alertmana
143133
name: oidc-proxy-alertmanager-secret-reader
144134
apiGroup: rbac.authorization.k8s.io
145135

146-
{%- endif %}
147-
148136
{%- else %}
149137

150138
Ensure oidc-proxy-alertmanager ServiceAccount does not exist:
@@ -154,8 +142,6 @@ Ensure oidc-proxy-alertmanager ServiceAccount does not exist:
154142
- kind: ServiceAccount
155143
- apiVersion: v1
156144

157-
{%- if alertmanager_ca_namespace %}
158-
159145
Ensure oidc-proxy-alertmanager-secret-reader Role does not exist in {{ alertmanager_ca_namespace }}:
160146
metalk8s_kubernetes.object_absent:
161147
- name: oidc-proxy-alertmanager-secret-reader
@@ -171,5 +157,3 @@ Ensure oidc-proxy-alertmanager-secret-reader-binding RoleBinding does not exist
171157
- apiVersion: rbac.authorization.k8s.io/v1
172158

173159
{%- endif %}
174-
175-
{%- endif %}

0 commit comments

Comments
 (0)