{{- if and .Values.certController.create (not .Values.webhook.certManager.enabled) }} apiVersion: apps/v1 kind: Deployment metadata: name: {{ include "external-secrets.fullname" . }}-cert-controller namespace: {{ template "external-secrets.namespace" . }} labels: {{- include "external-secrets-cert-controller.labels" . | nindent 4 }} {{- with .Values.certController.deploymentAnnotations }} annotations: {{- toYaml . | nindent 4 }} {{- end }} spec: replicas: {{ .Values.certController.replicaCount }} revisionHistoryLimit: {{ .Values.certController.revisionHistoryLimit }} selector: matchLabels: {{- include "external-secrets-cert-controller.selectorLabels" . | nindent 6 }} template: metadata: {{- with .Values.certController.podAnnotations }} annotations: {{- toYaml . | nindent 8 }} {{- end }} labels: {{- include "external-secrets-cert-controller.labels" . | nindent 8 }} {{- with .Values.certController.podLabels }} {{- toYaml . | nindent 8 }} {{- end }} spec: {{- with .Values.certController.imagePullSecrets }} imagePullSecrets: {{- toYaml . | nindent 8 }} {{- end }} serviceAccountName: {{ include "external-secrets-cert-controller.serviceAccountName" . }} automountServiceAccountToken: {{ .Values.certController.serviceAccount.automount }} {{- with .Values.certController.podSecurityContext }} {{- if and (.enabled) (gt (keys . | len) 1) }} securityContext: {{- include "external-secrets.renderSecurityContext" (dict "securityContext" . "context" $) | nindent 8 }} {{- end }} {{- end }} hostNetwork: {{ .Values.certController.hostNetwork }} containers: - name: cert-controller {{- with .Values.certController.securityContext }} {{- if and (.enabled) (gt (keys . | len) 1) }} securityContext: {{- include "external-secrets.renderSecurityContext" (dict "securityContext" . "context" $) | nindent 12 }} {{- end }} {{- end }} image: {{ include "external-secrets.image" (dict "chartAppVersion" .Chart.AppVersion "image" .Values.certController.image) | trim }} imagePullPolicy: {{ .Values.certController.image.pullPolicy }} args: - certcontroller - --crd-requeue-interval={{ .Values.certController.requeueInterval }} - --service-name={{ include "external-secrets.fullname" . }}-webhook - --service-namespace={{ template "external-secrets.namespace" . }} - --secret-name={{ include "external-secrets.fullname" . }}-webhook - --secret-namespace={{ template "external-secrets.namespace" . }} - --metrics-addr=:{{ .Values.certController.metrics.listen.port }} - --healthz-addr={{ .Values.certController.readinessProbe.address }}:{{ .Values.certController.readinessProbe.port }} - --loglevel={{ .Values.certController.log.level }} - --zap-time-encoding={{ .Values.certController.log.timeEncoding }} {{- if not .Values.crds.createClusterSecretStore }} - --crd-names=externalsecrets.external-secrets.io - --crd-names=secretstores.external-secrets.io {{- end }} {{- if .Values.installCRDs }} - --enable-partial-cache=true {{- end }} {{- range $key, $value := .Values.certController.extraArgs }} {{- if $value }} - --{{ $key }}={{ $value }} {{- else }} - --{{ $key }} {{- end }} {{- end }} ports: - containerPort: {{ .Values.certController.metrics.listen.port }} protocol: TCP name: metrics readinessProbe: httpGet: port: {{ .Values.certController.readinessProbe.port }} path: /readyz initialDelaySeconds: 20 periodSeconds: 5 {{- with .Values.certController.extraEnv }} env: {{- toYaml . | nindent 12 }} {{- end }} {{- with .Values.certController.resources }} resources: {{- toYaml . | nindent 12 }} {{- end }} {{- if .Values.certController.extraVolumeMounts }} volumeMounts: {{- toYaml .Values.certController.extraVolumeMounts | nindent 12 }} {{- end }} {{- if .Values.certController.extraVolumes }} volumes: {{- toYaml .Values.certController.extraVolumes | nindent 8 }} {{- end }} {{- with .Values.certController.nodeSelector | default .Values.global.nodeSelector }} nodeSelector: {{- toYaml . | nindent 8 }} {{- end }} {{- with .Values.certController.affinity | default .Values.global.affinity }} affinity: {{- toYaml . | nindent 8 }} {{- end }} {{- with .Values.certController.tolerations | default .Values.global.tolerations }} tolerations: {{- toYaml . | nindent 8 }} {{- end }} {{- with .Values.certController.topologySpreadConstraints | default .Values.global.topologySpreadConstraints }} topologySpreadConstraints: {{- toYaml . | nindent 8 }} {{- end }} {{- if .Values.certController.priorityClassName }} priorityClassName: {{ .Values.certController.priorityClassName }} {{- end }} {{- end }}