From e0a1940e7d7eeb04d4fbc039cbe4c197914a0b91 Mon Sep 17 00:00:00 2001 From: titver968 Date: Fri, 14 Nov 2025 23:17:29 +0100 Subject: [PATCH] plane new --- argocd/apps/plane/plane-secret-patcher.yaml | 61 +++++++++++++++++++++ 1 file changed, 61 insertions(+) create mode 100644 argocd/apps/plane/plane-secret-patcher.yaml diff --git a/argocd/apps/plane/plane-secret-patcher.yaml b/argocd/apps/plane/plane-secret-patcher.yaml new file mode 100644 index 0000000..9016b3b --- /dev/null +++ b/argocd/apps/plane/plane-secret-patcher.yaml @@ -0,0 +1,61 @@ +apiVersion: batch/v1 +kind: Job +metadata: + name: plane-secret-patcher + namespace: plane + annotations: + argocd.argoproj.io/hook: PostSync + argocd.argoproj.io/hook-delete-policy: BeforeHookCreation +spec: + template: + spec: + serviceAccountName: plane-secret-patcher + restartPolicy: Never + containers: + - name: patcher + image: bitnami/kubectl:latest + command: + - /bin/sh + - -c + - | + kubectl patch secret plane-app-secrets -n plane --type='json' -p='[ + {"op": "replace", "path": "/data/DATABASE_URL", "value": "'$(echo -n "postgresql://plane:plane@plane-pgdb:5432/plane" | base64)'"}, + {"op": "replace", "path": "/data/REDIS_URL", "value": "'$(echo -n "redis://plane-redis:6379/" | base64)'"}, + {"op": "replace", "path": "/data/AMQP_URL", "value": "'$(echo -n "amqp://plane:plane@plane-rabbitmq/" | base64)'"} + ]' + + kubectl patch secret plane-live-secrets -n plane --type='json' -p='[ + {"op": "replace", "path": "/data/REDIS_URL", "value": "'$(echo -n "redis://plane-redis:6379/" | base64)'"} + ]' + + echo "Secrets patched successfully" +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: plane-secret-patcher + namespace: plane +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: plane-secret-patcher + namespace: plane +rules: +- apiGroups: [""] + resources: ["secrets"] + verbs: ["get", "patch"] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: plane-secret-patcher + namespace: plane +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: plane-secret-patcher +subjects: +- kind: ServiceAccount + name: plane-secret-patcher + namespace: plane