Skip to content

Vault/k8s secrets engine #408

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Draft
wants to merge 9 commits into
base: master
Choose a base branch
from
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
40 changes: 40 additions & 0 deletions secrets/kubernetes/bindings.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@

apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: k8s-secrets-abilities-binding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: k8s-secrets-abilities
subjects:
- kind: ServiceAccount
name: vault
namespace: vault
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: demo-clusterrole-abilities
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: demo-cluster-role-list-pods
subjects:
- kind: ServiceAccount
name: vault
namespace: vault
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: demo-role-abilities
namespace: demo
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: demo-role-list-pods
subjects:
- kind: ServiceAccount
name: sample-app
namespace: demo
47 changes: 47 additions & 0 deletions secrets/kubernetes/roles.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: k8s-secrets-abilities
rules:
- apiGroups:
- ""
resources:
- serviceaccounts/token
verbs:
- create
- apiGroups: [""]
resources:
- serviceaccounts
verbs:
- create
- delete
- apiGroups:
- rbac.authorization.k8s.io
resources:
- roles
- rolebindings
- clusterroles
- clusterrolebindings
verbs:
- create
- delete
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: demo-role-list-pods
namespace: demo
rules:
- apiGroups: [""]
resources: ["pods"]
verbs: ["list"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: demo-cluster-role-list-pods
rules:
- apiGroups: [""]
resources: ["pods"]
verbs: ["list","get","delete"]

5 changes: 5 additions & 0 deletions secrets/kubernetes/serviceAccounts.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: sample-app
namespace: demo
11 changes: 11 additions & 0 deletions secrets/kubernetes/values.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
global:
enabled: false

server:
enabled: true
image:
repository: hashicorp/vault
tag: 1.11.0-rc1
dev:
enabled: true
logLevel: debug