Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

tf/k8s-infra-prow-build-trusted: add ExternalSecrets #2865

Merged
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -1,5 +1,19 @@
# This is a place holder for adding kubernetes external secrets, please add the
# ExternalSecret CR here, separated by `---`.
#
# e.g.
# apiVersion: kubernetes-client.io/v1
# kind: ExternalSecret
# metadata:
# name: kubernetes-secret-name
# namespace: test-pods
# spec:
# backendType: gcpSecretsManager
# projectId: k8s-infra-prow-build-trusted
# data:
# - key: google-secret-manager-secret-name
# name: key-in-kubernetes-secret
# version: latest
---
apiVersion: kubernetes-client.io/v1
kind: ExternalSecret
Expand All @@ -10,9 +24,9 @@ spec:
backendType: gcpSecretsManager
projectId: k8s-infra-prow-build-trusted
data:
- key: cncf-ci-github-token # The name of the GSM Secret
name: token # The key to write to in the Kubernetes Secret
version: latest # The version of the GSM Secret
- key: cncf-ci-github-token
name: token
version: latest
---
apiVersion: kubernetes-client.io/v1
kind: ExternalSecret
Expand All @@ -22,9 +36,9 @@ metadata:
spec:
backendType: gcpSecretsManager
data:
- key: snyk-token # The name of the GSM Secret
name: SNYK_TOKEN # The key to write to in the Kubernetes Secret
version: latest # The version of the GSM Secret
- key: snyk-token
name: SNYK_TOKEN
version: latest
---
apiVersion: kubernetes-client.io/v1
kind: ExternalSecret
Expand All @@ -35,9 +49,9 @@ spec:
backendType: gcpSecretsManager
projectId: k8s-infra-prow-build-trusted
data:
- key: k8s-triage-robot-github-token # The name of the GSM Secret
name: token # The key to write to in the Kubernetes Secret
version: latest # The version of the GSM Secret
- key: k8s-triage-robot-github-token
name: token
version: latest
---
apiVersion: kubernetes-client.io/v1
kind: ExternalSecret
Expand All @@ -48,6 +62,58 @@ spec:
backendType: gcpSecretsManager
projectId: kubernetes-public
data:
- key: k8s-infra-ci-robot-github-token # The name of the GSM Secret
name: token # The key to write to in the Kubernetes Secret
version: latest # The version of the GSM Secret
- key: k8s-infra-ci-robot-github-token
name: token
version: latest
---
apiVersion: kubernetes-client.io/v1
kind: ExternalSecret
metadata:
name: k8s-cip-test-prod-service-account
namespace: test-pods
spec:
backendType: gcpSecretsManager
projectId: kubernetes-public
data:
- key: k8s-cip-test-prod-service-account
name: service-account.json
version: latest
---
apiVersion: kubernetes-client.io/v1
kind: ExternalSecret
metadata:
name: k8s-gcr-audit-test-prod-service-account
namespace: test-pods
spec:
backendType: gcpSecretsManager
projectId: kubernetes-public
data:
- key: k8s-gcr-audit-test-prod-service-account
name: service-account.json
version: latest
---
apiVersion: kubernetes-client.io/v1
kind: ExternalSecret
metadata:
name: service-account
namespace: test-pods
spec:
backendType: gcpSecretsManager
projectId: kubernetes-public
data:
- key: service-account
name: service-account.json
version: latest
---
apiVersion: kubernetes-client.io/v1
kind: ExternalSecret
metadata:
name: slack-tempelis-auth
namespace: test-pods
spec:
backendType: gcpSecretsManager
projectId: kubernetes-public
data:
- key: slack-tempelis-auth
name: auth.json
version: latest
4 changes: 0 additions & 4 deletions infra/gcp/terraform/k8s-infra-prow-build-trusted/secrets.tf
Original file line number Diff line number Diff line change
Expand Up @@ -28,10 +28,6 @@ locals {
group = "sig-release"
owners = "k8s-infra-release-admins@kubernetes.io"
}
k8s-infra-kops-e2e-tests-aws-ssh-key = {
group = "sig-cluster-lifecycle"
owners = "k8s-infra-kops-maintainers@kubernetes.io"
}
k8s-triage-robot-github-token = {
group = "sig-contributor-experience"
owners = "github@kubernetes.io"
Expand Down