From 1b822533c277a4acf1b35fa28ba242d2b7280a49 Mon Sep 17 00:00:00 2001 From: Julius de Jeu Date: Mon, 23 May 2022 00:31:39 +0200 Subject: [PATCH] _actually_ add the creds --- flux/cluster/apps/test/kustomization.yaml | 1 + .../cluster/apps/test/vault-secret-store.yaml | 26 +++++++++++++++++++ 2 files changed, 27 insertions(+) create mode 100644 flux/cluster/apps/test/vault-secret-store.yaml diff --git a/flux/cluster/apps/test/kustomization.yaml b/flux/cluster/apps/test/kustomization.yaml index ef7dbba..09b864b 100644 --- a/flux/cluster/apps/test/kustomization.yaml +++ b/flux/cluster/apps/test/kustomization.yaml @@ -4,3 +4,4 @@ resources: - deployment.yaml - ingress.yaml - service.yaml + - vault-secret-store.yaml diff --git a/flux/cluster/apps/test/vault-secret-store.yaml b/flux/cluster/apps/test/vault-secret-store.yaml new file mode 100644 index 0000000..a52d141 --- /dev/null +++ b/flux/cluster/apps/test/vault-secret-store.yaml @@ -0,0 +1,26 @@ +apiVersion: external-secrets.io/v1beta1 +kind: ClusterSecretStore +metadata: + name: vault + namespace: test +spec: + provider: + vault: + server: "https://vault.asraphiel.dev" + path: "k8s" + version: "v2" + auth: + # VaultAppRole authenticates with Vault using the + # App Role auth mechanism + # https://www.vaultproject.io/docs/auth/approle + appRole: + # Path where the App Role authentication backend is mounted + path: "approle" + # RoleID configured in the App Role authentication backend + roleId: "48a0e39d-e7e8-4ac2-529c-db99ffa1f6b0" + # Reference to a key in a K8 Secret that contains the App Role SecretId + # (not commited in git) + secretRef: + name: "vault-secret-id" + namespace: "external-secrets" + key: "secret-id"