Add jobs for oidc and internal-users

This commit is contained in:
dvirlabs 2025-09-28 22:36:12 +03:00
parent dfd631fa3c
commit d23b858b7b
4 changed files with 139 additions and 10 deletions

View File

@ -0,0 +1,63 @@
apiVersion: batch/v1
kind: Job
metadata:
name: vault-bootstrap-internal-users
namespace: dev-tools
annotations:
argocd.argoproj.io/hook: Sync
argocd.argoproj.io/hook-delete-policy: HookSucceeded
argocd.argoproj.io/sync-wave: "1"
spec:
backoffLimit: 2
ttlSecondsAfterFinished: 60
template:
spec:
restartPolicy: OnFailure
securityContext:
runAsNonRoot: true
runAsUser: 1000
runAsGroup: 1000
fsGroup: 1000
containers:
- name: vault
image: hashicorp/vault:1.16
imagePullPolicy: IfNotPresent
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
capabilities: { drop: ["ALL"] }
env:
- name: VAULT_ADDR
value: "http://vault.dev-tools.svc.cluster.local:8200"
- name: VAULT_TOKEN
valueFrom:
secretKeyRef:
name: vault-admin-token
key: token
command: ["/bin/sh","-c"]
args:
- |
set -e
echo "[bootstrap for scope internal-users]"
i=0
until vault status >/dev/null 2>&1; do
i=$((i+1))
[ "$i" -gt 30 ] && echo "Vault not ready" && exit 1
echo "Waiting for Vault... ($i/30)"; sleep 2
done
# vault secrets enable -version=2 -path=internal-users kv 2>/dev/null || true
cat >/tmp/policy.hcl <<'EOF'
path "internal-users/metadata/*" { capabilities = ["list"] }
path "internal-users/data/*" { capabilities = ["read"] }
EOF
vault policy write eso-internal-users-read /tmp/policy.hcl || true
vault write auth/kubernetes/role/eso-internal-users \
bound_service_account_names="external-secrets" \
bound_service_account_namespaces="dev-tools" \
bound_audiences="https://kubernetes.default.svc" \
policies="eso-internal-users-read" \
ttl=1h

View File

@ -2,16 +2,17 @@ apiVersion: external-secrets.io/v1beta1
kind: ClusterSecretStore kind: ClusterSecretStore
metadata: metadata:
name: vault-internal-users name: vault-internal-users
annotations:
argocd.argoproj.io/sync-wave: "2"
spec: spec:
provider: provider:
vault: vault:
server: http://vault.dev-tools.svc.cluster.local:8200 server: "http://vault.dev-tools.svc.cluster.local:8200"
path: internal-users path: "internal-users"
version: v2
auth: auth:
kubernetes: kubernetes:
mountPath: kubernetes mountPath: "auth/kubernetes"
role: eso-internal-users role: "eso-internal-users"
serviceAccountRef: serviceAccountRef:
name: external-secrets name: external-secrets
namespace: dev-tools namespace: dev-tools

View File

@ -0,0 +1,63 @@
apiVersion: batch/v1
kind: Job
metadata:
name: vault-bootstrap-oidc
namespace: dev-tools
annotations:
argocd.argoproj.io/hook: Sync
argocd.argoproj.io/hook-delete-policy: HookSucceeded
argocd.argoproj.io/sync-wave: "1"
spec:
backoffLimit: 2
ttlSecondsAfterFinished: 60
template:
spec:
restartPolicy: OnFailure
securityContext:
runAsNonRoot: true
runAsUser: 1000
runAsGroup: 1000
fsGroup: 1000
containers:
- name: vault
image: hashicorp/vault:1.16
imagePullPolicy: IfNotPresent
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
capabilities: { drop: ["ALL"] }
env:
- name: VAULT_ADDR
value: "http://vault.dev-tools.svc.cluster.local:8200"
- name: VAULT_TOKEN
valueFrom:
secretKeyRef:
name: vault-admin-token
key: token
command: ["/bin/sh","-c"]
args:
- |
set -e
echo "[bootstrap for scope oidc-secrets]"
i=0
until vault status >/dev/null 2>&1; do
i=$((i+1))
[ "$i" -gt 30 ] && echo "Vault not ready" && exit 1
echo "Waiting for Vault... ($i/30)"; sleep 2
done
# vault secrets enable -version=2 -path=oidc-secrets kv 2>/dev/null || true
cat >/tmp/policy.hcl <<'EOF'
path "oidc-secrets/metadata/*" { capabilities = ["list"] }
path "oidc-secrets/data/*" { capabilities = ["read"] }
EOF
vault policy write eso-oidc-read /tmp/policy.hcl || true
vault write auth/kubernetes/role/eso-oidc \
bound_service_account_names="external-secrets" \
bound_service_account_namespaces="dev-tools" \
bound_audiences="https://kubernetes.default.svc" \
policies="eso-oidc-read" \
ttl=1h

View File

@ -2,16 +2,18 @@ apiVersion: external-secrets.io/v1beta1
kind: ClusterSecretStore kind: ClusterSecretStore
metadata: metadata:
name: vault-oidc-secrets name: vault-oidc-secrets
annotations:
argocd.argoproj.io/sync-wave: "2"
spec: spec:
provider: provider:
vault: vault:
server: http://vault.dev-tools.svc.cluster.local:8200 server: "http://vault.dev-tools.svc.cluster.local:8200"
path: oidc-secrets path: "oidc-secrets"
version: v2 version: "v2"
auth: auth:
kubernetes: kubernetes:
mountPath: kubernetes mountPath: "auth/kubernetes"
role: eso-oidc role: "eso-oidc"
serviceAccountRef: serviceAccountRef:
name: external-secrets name: external-secrets
namespace: dev-tools namespace: dev-tools