🎉 initial commit
This commit is contained in:
15
vault/helm-vault-server.yaml
Normal file
15
vault/helm-vault-server.yaml
Normal file
@@ -0,0 +1,15 @@
|
||||
# see https://rancher.com/docs/k3s/latest/en/helm/
|
||||
# see https://github.com/hashicorp/vault-helm
|
||||
apiVersion: helm.cattle.io/v1
|
||||
kind: HelmChart
|
||||
metadata:
|
||||
name: vault
|
||||
namespace: default
|
||||
spec:
|
||||
repo: https://helm.releases.hashicorp.com
|
||||
chart: vault
|
||||
version: 0.17.1
|
||||
targetNamespace: default
|
||||
valuesContent: |-
|
||||
injector:
|
||||
enabled: false
|
||||
14
vault/ingress-vault.yaml
Normal file
14
vault/ingress-vault.yaml
Normal file
@@ -0,0 +1,14 @@
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
kind: IngressRoute
|
||||
metadata:
|
||||
name: vault-internal
|
||||
namespace: default
|
||||
spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`vault.dev.localhost`)
|
||||
kind: Rule
|
||||
services:
|
||||
- name: vault-internal
|
||||
port: 8200
|
||||
2
vault/init-vault.sh
Executable file
2
vault/init-vault.sh
Executable file
@@ -0,0 +1,2 @@
|
||||
kubectl exec vault-0 -- vault operator init -key-shares=1 -key-threshold=1 -format=json > init-keys.json
|
||||
./unseal-vault.sh
|
||||
16
vault/issuer-vault.yaml
Normal file
16
vault/issuer-vault.yaml
Normal file
@@ -0,0 +1,16 @@
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Issuer
|
||||
metadata:
|
||||
name: vault-issuer
|
||||
namespace: default
|
||||
spec:
|
||||
vault:
|
||||
server: http://vault.default:8200
|
||||
path: pki/sign/dev-dot-localhost
|
||||
auth:
|
||||
kubernetes:
|
||||
mountPath: /v1/auth/kubernetes
|
||||
role: issuer
|
||||
secretRef:
|
||||
name: issuer-token-sh68l
|
||||
key: token
|
||||
8
vault/unseal-vault.sh
Executable file
8
vault/unseal-vault.sh
Executable file
@@ -0,0 +1,8 @@
|
||||
cat init-keys.json | jq -r ".unseal_keys_b64[]"
|
||||
VAULT_UNSEAL_KEY=$(cat init-keys.json | jq -r ".unseal_keys_b64[]")
|
||||
kubectl exec vault-0 -- vault operator unseal $VAULT_UNSEAL_KEY
|
||||
kubectl get pods
|
||||
cat init-keys.json | jq -r ".root_token"
|
||||
VAULT_ROOT_TOKEN=$(cat init-keys.json | jq -r ".root_token")
|
||||
kubectl exec vault-0 -- vault login $VAULT_ROOT_TOKEN
|
||||
|
||||
16
vault/vault-issuer.yaml
Normal file
16
vault/vault-issuer.yaml
Normal file
@@ -0,0 +1,16 @@
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Issuer
|
||||
metadata:
|
||||
name: vault-issuer
|
||||
namespace: default
|
||||
spec:
|
||||
vault:
|
||||
server: http://vault.default:8200
|
||||
path: pki/role/dev-dot-localhost
|
||||
auth:
|
||||
kubernetes:
|
||||
mountPath: /v1/auth/kubernetes
|
||||
role: issuer
|
||||
secretRef:
|
||||
name: issuer-token-xhgk8
|
||||
key: token
|
||||
Reference in New Issue
Block a user