Disable init con

This commit is contained in:
dvirlabs 2025-05-09 19:03:57 +03:00
parent 1633cd8a24
commit a3182459c8

View File

@ -23,42 +23,42 @@ server:
extraEnvironmentVars:
VAULT_ADDR: http://127.0.0.1:8200
extraInitContainers:
- name: configure-oidc
image: hashicorp/vault:1.15.5
command:
- /bin/sh
- -c
- |
echo "Waiting for Vault to initialize..."
until curl -s http://vault:8200/v1/sys/health | grep '"initialized":true'; do
sleep 2
done
# extraInitContainers:
# - name: configure-oidc
# image: hashicorp/vault:1.15.5
# command:
# - /bin/sh
# - -c
# - |
# echo "Waiting for Vault to initialize..."
# until curl -s http://vault:8200/v1/sys/health | grep '"initialized":true'; do
# sleep 2
# done
export VAULT_ADDR=http://vault:8200
vault auth enable oidc || true
# export VAULT_ADDR=http://vault:8200
# vault auth enable oidc || true
vault write auth/oidc/config \
oidc_discovery_url="https://keycloack.dvirlabs.com/realms/lab" \
oidc_client_id="vault" \
oidc_client_secret="8GWiUqwUZimb4xXHqFNTYCrTkKyc9hrY" \
default_role="vault-role"
# vault write auth/oidc/config \
# oidc_discovery_url="https://keycloack.dvirlabs.com/realms/lab" \
# oidc_client_id="vault" \
# oidc_client_secret="8GWiUqwUZimb4xXHqFNTYCrTkKyc9hrY" \
# default_role="vault-role"
vault policy write oidc-ui-access - <<EOF
path "auth/oidc/role/vault-role" {
capabilities = ["read"]
}
EOF
# vault policy write oidc-ui-access - <<EOF
# path "auth/oidc/role/vault-role" {
# capabilities = ["read"]
# }
# EOF
vault write auth/oidc/role/vault-role \
bound_audiences="vault" \
allowed_redirect_uris="https://vault.dvirlabs.com/ui/vault/auth/oidc/oidc/callback" \
user_claim="preferred_username" \
groups_claim="groups" \
oidc_scopes="profile email groups" \
policies="default" \
token_policies="oidc-ui-access" \
ttl="1h"
# vault write auth/oidc/role/vault-role \
# bound_audiences="vault" \
# allowed_redirect_uris="https://vault.dvirlabs.com/ui/vault/auth/oidc/oidc/callback" \
# user_claim="preferred_username" \
# groups_claim="groups" \
# oidc_scopes="profile email groups" \
# policies="default" \
# token_policies="oidc-ui-access" \
# ttl="1h"
env: