Add app for clustersecretstore and set External secret for woodpecker harbor
This commit is contained in:
parent
ac0c66b90b
commit
7cd142ff15
22
argocd-apps/cluster-secret-store-creator.yaml
Normal file
22
argocd-apps/cluster-secret-store-creator.yaml
Normal file
@ -0,0 +1,22 @@
|
|||||||
|
apiVersion: argoproj.io/v1alpha1
|
||||||
|
kind: Application
|
||||||
|
metadata:
|
||||||
|
name: cluster-secret-store-creator
|
||||||
|
namespace: argocd
|
||||||
|
spec:
|
||||||
|
project: dev-tools
|
||||||
|
source:
|
||||||
|
repoURL: https://git.dvirlabs.com/dvirlabs/dev-tools.git
|
||||||
|
targetRevision: HEAD
|
||||||
|
path: manifests/cluster-secret-store
|
||||||
|
directory:
|
||||||
|
recurse: true
|
||||||
|
destination:
|
||||||
|
server: https://kubernetes.default.svc
|
||||||
|
namespace: dev-tools
|
||||||
|
syncPolicy:
|
||||||
|
automated:
|
||||||
|
prune: true
|
||||||
|
selfHeal: true
|
||||||
|
syncOptions:
|
||||||
|
- CreateNamespace=true
|
||||||
15
manifests/cluster-secret-store/vault-cicd.yaml
Normal file
15
manifests/cluster-secret-store/vault-cicd.yaml
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
apiVersion: external-secrets.io/v1beta1
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
metadata:
|
||||||
|
name: vault-cicd
|
||||||
|
spec:
|
||||||
|
provider:
|
||||||
|
vault:
|
||||||
|
auth:
|
||||||
|
tokenSecretRef:
|
||||||
|
key: token
|
||||||
|
name: vault-eso-token
|
||||||
|
namespace: dev-tools
|
||||||
|
path: cicd
|
||||||
|
server: http://vault.dev-tools.svc.cluster.local:8200
|
||||||
|
version: v2
|
||||||
15
manifests/cluster-secret-store/vault-general-secrets.yaml
Normal file
15
manifests/cluster-secret-store/vault-general-secrets.yaml
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
apiVersion: external-secrets.io/v1beta1
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
metadata:
|
||||||
|
name: vault-general-secrets
|
||||||
|
spec:
|
||||||
|
provider:
|
||||||
|
vault:
|
||||||
|
auth:
|
||||||
|
tokenSecretRef:
|
||||||
|
key: token
|
||||||
|
name: vault-eso-token
|
||||||
|
namespace: dev-tools
|
||||||
|
path: general-secrets
|
||||||
|
server: http://vault.dev-tools.svc.cluster.local:8200
|
||||||
|
version: v2
|
||||||
15
manifests/cluster-secret-store/vault-internal-users.yaml
Normal file
15
manifests/cluster-secret-store/vault-internal-users.yaml
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
apiVersion: external-secrets.io/v1beta1
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
metadata:
|
||||||
|
name: vault-internal-users
|
||||||
|
spec:
|
||||||
|
provider:
|
||||||
|
vault:
|
||||||
|
auth:
|
||||||
|
tokenSecretRef:
|
||||||
|
key: token
|
||||||
|
name: vault-eso-token
|
||||||
|
namespace: dev-tools
|
||||||
|
path: internal-users
|
||||||
|
server: http://vault.dev-tools.svc.cluster.local:8200
|
||||||
|
version: v2
|
||||||
15
manifests/cluster-secret-store/vault-oidc-secrets.yaml
Normal file
15
manifests/cluster-secret-store/vault-oidc-secrets.yaml
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
apiVersion: external-secrets.io/v1beta1
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
metadata:
|
||||||
|
name: vault-oidc-secrets
|
||||||
|
spec:
|
||||||
|
provider:
|
||||||
|
vault:
|
||||||
|
auth:
|
||||||
|
tokenSecretRef:
|
||||||
|
key: token
|
||||||
|
name: vault-eso-token
|
||||||
|
namespace: dev-tools
|
||||||
|
path: oidc-secrets
|
||||||
|
server: http://vault.dev-tools.svc.cluster.local:8200
|
||||||
|
version: v2
|
||||||
@ -1,18 +0,0 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
|
||||||
kind: ExternalSecret
|
|
||||||
metadata:
|
|
||||||
name: grafana-oidc
|
|
||||||
namespace: dev-tools
|
|
||||||
spec:
|
|
||||||
refreshInterval: 1h
|
|
||||||
secretStoreRef:
|
|
||||||
name: vault-oidc-clients
|
|
||||||
kind: ClusterSecretStore
|
|
||||||
target:
|
|
||||||
name: grafana-oidc-secret
|
|
||||||
creationPolicy: Owner
|
|
||||||
data:
|
|
||||||
- secretKey: client_secret
|
|
||||||
remoteRef:
|
|
||||||
key: oidc-clients/gitea-oidc
|
|
||||||
property: client_secret
|
|
||||||
@ -1,18 +0,0 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
|
||||||
kind: ExternalSecret
|
|
||||||
metadata:
|
|
||||||
name: wikijs-db-secret
|
|
||||||
namespace: dev-tools
|
|
||||||
spec:
|
|
||||||
refreshInterval: 1h
|
|
||||||
secretStoreRef:
|
|
||||||
name: vault-general-secrets
|
|
||||||
kind: ClusterSecretStore
|
|
||||||
target:
|
|
||||||
name: wikijs-db-secret
|
|
||||||
creationPolicy: Owner
|
|
||||||
data:
|
|
||||||
- secretKey: password
|
|
||||||
remoteRef:
|
|
||||||
key: wikijs-db
|
|
||||||
property: password
|
|
||||||
@ -1,18 +0,0 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
|
||||||
kind: ExternalSecret
|
|
||||||
metadata:
|
|
||||||
name: kaniko-docker-config
|
|
||||||
namespace: dev-tools
|
|
||||||
spec:
|
|
||||||
refreshInterval: 1h
|
|
||||||
secretStoreRef:
|
|
||||||
name: vault-general-secrets
|
|
||||||
kind: ClusterSecretStore
|
|
||||||
target:
|
|
||||||
name: kaniko-docker-config
|
|
||||||
creationPolicy: Owner
|
|
||||||
data:
|
|
||||||
- secretKey: config.json
|
|
||||||
remoteRef:
|
|
||||||
key: general-secrets/woodpecker-kaniko
|
|
||||||
property: config.json
|
|
||||||
@ -0,0 +1,18 @@
|
|||||||
|
# apiVersion: external-secrets.io/v1beta1
|
||||||
|
# kind: ExternalSecret
|
||||||
|
# metadata:
|
||||||
|
# name: kaniko-docker-config
|
||||||
|
# namespace: dev-tools
|
||||||
|
# spec:
|
||||||
|
# refreshInterval: 1h
|
||||||
|
# secretStoreRef:
|
||||||
|
# name: vault-general-secrets
|
||||||
|
# kind: ClusterSecretStore
|
||||||
|
# target:
|
||||||
|
# name: kaniko-docker-config
|
||||||
|
# creationPolicy: Owner
|
||||||
|
# data:
|
||||||
|
# - secretKey: config.json
|
||||||
|
# remoteRef:
|
||||||
|
# key: general-secrets/woodpecker-kaniko
|
||||||
|
# property: config.json
|
||||||
@ -0,0 +1,22 @@
|
|||||||
|
apiVersion: external-secrets.io/v1beta1
|
||||||
|
kind: ExternalSecret
|
||||||
|
metadata:
|
||||||
|
name: woodpecker-harbor-creds
|
||||||
|
namespace: dev-tools
|
||||||
|
spec:
|
||||||
|
refreshInterval: 1h
|
||||||
|
secretStoreRef:
|
||||||
|
name: vault-cicd # ClusterSecretStore for CICD secrets
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
target:
|
||||||
|
name: woodpecker-harbor-secret # K8s Secret that will be created
|
||||||
|
creationPolicy: Owner
|
||||||
|
data:
|
||||||
|
- secretKey: docker_username
|
||||||
|
remoteRef:
|
||||||
|
key: harbor # relative to ClusterSecretStore's path (cicd)
|
||||||
|
property: docker_username
|
||||||
|
- secretKey: docker_password
|
||||||
|
remoteRef:
|
||||||
|
key: harbor
|
||||||
|
property: docker_password
|
||||||
Loading…
x
Reference in New Issue
Block a user