generated from oracle/template-repo
-
Notifications
You must be signed in to change notification settings - Fork 11
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
e2e for workload identity and instance principal auth mechanisms
- Loading branch information
1 parent
36f5811
commit 81f6aa3
Showing
9 changed files
with
325 additions
and
34 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,30 @@ | ||
# | ||
# OCI Secrets Store CSI Driver Provider | ||
# | ||
# Copyright (c) 2022 Oracle America, Inc. and its affiliates. | ||
# Licensed under the Universal Permissive License v 1.0 as shown at https://oss.oracle.com/licenses/upl/ | ||
# | ||
|
||
# SecretProviderClass is a custom resource to provide driver configurations and | ||
# provider-specific parameters to the CSI driver. | ||
# | ||
# On pod start and restart, the driver will communicate with the provider to retrieve the secret content | ||
# from the external Secrets Store you have specified in the SecretProviderClass resource. | ||
# | ||
# For more information check: https://secrets-store-csi-driver.sigs.k8s.io/getting-started/usage.html | ||
# | ||
# This SecretProviderClass is used as a reference example of how to configure the OCI Vault provider. | ||
# Each SecretProviderClass enumerates secrets to mount into the pod. | ||
# So, multiple SecretProviderClass resources could exist in a single Kubernetes cluster. | ||
|
||
apiVersion: secrets-store.csi.x-k8s.io/v1 | ||
kind: SecretProviderClass | ||
metadata: | ||
name: test-oci-provider-class # SecretProviderClass name is referenced from pod definition | ||
spec: | ||
parameters: | ||
authType: instance | ||
secrets: | | ||
- name: test-secret-12813 | ||
vaultId: ocid1.vault.oc1..aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa | ||
provider: oci |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,46 @@ | ||
# | ||
# OCI Secrets Store CSI Driver Provider | ||
# | ||
# Copyright (c) 2022 Oracle America, Inc. and its affiliates. | ||
# Licensed under the Universal Permissive License v 1.0 as shown at https://oss.oracle.com/licenses/upl/ | ||
# | ||
|
||
# This Deployment is used as a reference example of how to mount secrets into the pod | ||
# via Secrets Store CSI Driver and OCI Vault Provider. | ||
|
||
apiVersion: apps/v1 | ||
kind: Deployment | ||
metadata: | ||
name: nginx | ||
labels: | ||
app: nginx | ||
spec: | ||
selector: | ||
matchLabels: | ||
app: nginx | ||
template: | ||
metadata: | ||
labels: | ||
app: nginx | ||
testingSecretName: abc | ||
spec: | ||
containers: | ||
- name: nginx | ||
image: nginx:1.21.4-alpine | ||
ports: | ||
- containerPort: 80 | ||
resources: | ||
limits: | ||
memory: 128Mi | ||
cpu: 200m | ||
volumeMounts: | ||
- name: 'some-creds' | ||
mountPath: '/mnt/secrets-store' # here are mounted secrets | ||
readOnly: true | ||
volumes: | ||
- name: some-creds | ||
csi: | ||
driver: 'secrets-store.csi.k8s.io' | ||
readOnly: true | ||
volumeAttributes: | ||
secretProviderClass: 'test-oci-provider-class' # here we reference particular SecretProviderClass |
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,48 @@ | ||
# | ||
# OCI Secrets Store CSI Driver Provider | ||
# | ||
# Copyright (c) 2022 Oracle America, Inc. and its affiliates. | ||
# Licensed under the Universal Permissive License v 1.0 as shown at https://oss.oracle.com/licenses/upl/ | ||
# | ||
|
||
# This Deployment is used as a reference example of how to mount secrets into the pod | ||
# via Secrets Store CSI Driver and OCI Vault Provider. | ||
|
||
apiVersion: apps/v1 | ||
kind: Deployment | ||
metadata: | ||
name: nginx | ||
labels: | ||
app: nginx | ||
spec: | ||
selector: | ||
matchLabels: | ||
app: nginx | ||
template: | ||
metadata: | ||
labels: | ||
app: nginx | ||
testingSecretName: abc | ||
spec: | ||
serviceAccountName: workload-sa | ||
automountServiceAccountToken: true | ||
containers: | ||
- name: nginx | ||
image: nginx:1.21.4-alpine | ||
ports: | ||
- containerPort: 80 | ||
resources: | ||
limits: | ||
memory: 128Mi | ||
cpu: 200m | ||
volumeMounts: | ||
- name: 'some-creds' | ||
mountPath: '/mnt/secrets-store' # here are mounted secrets | ||
readOnly: true | ||
volumes: | ||
- name: some-creds | ||
csi: | ||
driver: 'secrets-store.csi.k8s.io' | ||
readOnly: true | ||
volumeAttributes: | ||
secretProviderClass: 'test-oci-provider-class' # here we reference particular SecretProviderClass |
Oops, something went wrong.