69
69
- mountPath: /tmp/secrets/ca-certs
70
70
name: ca-certs
71
71
env:
72
- { {- range (include " sonarqube.combined_env" . | fromJsonArray) } }
73
- - name: { { .name } }
74
- value: { { .value | quote } }
75
- { {- end } }
72
+ { {- (include " sonarqube.combined_env" . | fromJsonArray) | toYaml | trim | nindent 8 } }
76
73
{ {- end } }
77
74
{ {- if or .Values.initSysctl.enabled .Values.elasticsearch.configureNode } }
78
75
- name: init-sysctl
89
86
- name: init-sysctl
90
87
mountPath: /tmp/scripts/
91
88
env:
92
- { {- range (include " sonarqube.combined_env" . | fromJsonArray) } }
93
- - name: { { .name } }
94
- value: { { .value | quote } }
95
- { {- end } }
89
+ { {- (include " sonarqube.combined_env" . | fromJsonArray) | toYaml | trim | nindent 8 } }
96
90
{ {- end } }
97
91
{ {- if or .Values.sonarProperties .Values.sonarSecretProperties .Values.sonarSecretKey (not .Values.elasticsearch.bootstrapChecks) } }
98
92
- name: concat-properties
@@ -132,10 +126,7 @@ spec:
132
126
resources: { {- toYaml . | nindent 8 } }
133
127
{ {- end } }
134
128
env:
135
- { {- range (include " sonarqube.combined_env" . | fromJsonArray) } }
136
- - name: { { .name } }
137
- value: { { .value | quote } }
138
- { {- end } }
129
+ { {- (include " sonarqube.combined_env" . | fromJsonArray) | toYaml | trim | nindent 8 } }
139
130
{ {- end } }
140
131
{ {- if .Values.prometheusExporter.enabled } }
141
132
- name: inject-prometheus-exporter
@@ -160,10 +151,7 @@ spec:
160
151
value: { { default " " .Values.prometheusExporter.httpsProxy } }
161
152
- name: no_proxy
162
153
value: { { default " " .Values.prometheusExporter.noProxy } }
163
- { {- range (include " sonarqube.combined_env" . | fromJsonArray) } }
164
- - name: { { .name } }
165
- value: { { .value | quote } }
166
- { {- end } }
154
+ { {- (include " sonarqube.combined_env" . | fromJsonArray) | toYaml | trim | nindent 8 } }
167
155
{ {- end } }
168
156
{ {- if and .Values.persistence.enabled .Values.initFs.enabled } }
169
157
- name: init-fs
@@ -236,10 +224,7 @@ spec:
236
224
value: { { default " " .Values.plugins.httpsProxy } }
237
225
- name: no_proxy
238
226
value: { { default " " .Values.plugins.noProxy } }
239
- { {- range (include " sonarqube.combined_env" . | fromJsonArray) } }
240
- - name: { { .name } }
241
- value: { { .value | quote } }
242
- { {- end } }
227
+ { {- (include " sonarqube.combined_env" . | fromJsonArray) | toYaml | trim | nindent 8 } }
243
228
{ {- end } }
244
229
containers:
245
230
{ {- with .Values.extraContainers } }
@@ -279,10 +264,7 @@ spec:
279
264
name: { { include " sonarqube.fullname" . } }-monitoring-passcode
280
265
key: SONAR_WEB_SYSTEMPASSCODE
281
266
{ {- end } }
282
- { {- range (include " sonarqube.combined_env" . | fromJsonArray) } }
283
- - name: { { .name } }
284
- value: { { .value | quote } }
285
- { {- end } }
267
+ { {- (include " sonarqube.combined_env" . | fromJsonArray) | toYaml | trim | nindent 8 } }
286
268
envFrom:
287
269
- configMapRef:
288
270
name: { { include " sonarqube.fullname" . } }-jdbc-config
0 commit comments