diff --git a/manifests/vault/values.yaml b/manifests/vault/values.yaml index 7372d5e..66da8f7 100644 --- a/manifests/vault/values.yaml +++ b/manifests/vault/values.yaml @@ -23,42 +23,42 @@ server: extraEnvironmentVars: VAULT_ADDR: http://127.0.0.1:8200 - extraInitContainers: - - name: configure-oidc - image: hashicorp/vault:1.15.5 - command: - - /bin/sh - - -c - - | - echo "Waiting for Vault to initialize..." - until curl -s http://vault:8200/v1/sys/health | grep '"initialized":true'; do - sleep 2 - done + # extraInitContainers: + # - name: configure-oidc + # image: hashicorp/vault:1.15.5 + # command: + # - /bin/sh + # - -c + # - | + # echo "Waiting for Vault to initialize..." + # until curl -s http://vault:8200/v1/sys/health | grep '"initialized":true'; do + # sleep 2 + # done - export VAULT_ADDR=http://vault:8200 - vault auth enable oidc || true + # export VAULT_ADDR=http://vault:8200 + # vault auth enable oidc || true - vault write auth/oidc/config \ - oidc_discovery_url="https://keycloack.dvirlabs.com/realms/lab" \ - oidc_client_id="vault" \ - oidc_client_secret="8GWiUqwUZimb4xXHqFNTYCrTkKyc9hrY" \ - default_role="vault-role" + # vault write auth/oidc/config \ + # oidc_discovery_url="https://keycloack.dvirlabs.com/realms/lab" \ + # oidc_client_id="vault" \ + # oidc_client_secret="8GWiUqwUZimb4xXHqFNTYCrTkKyc9hrY" \ + # default_role="vault-role" - vault policy write oidc-ui-access - <