main.tf 1.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445
  1. resource "kubernetes_namespace" "eso" {
  2. metadata {
  3. name = "external-secrets-operator"
  4. }
  5. }
  6. data "azurerm_client_config" "current" {}
  7. data "azuread_application" "eso" {
  8. display_name = "managed-e2e-suite-external-secrets-operator"
  9. }
  10. data "azuread_application" "e2e" {
  11. display_name = "managed-e2e-suite-external-secrets-e2e"
  12. }
  13. // the `e2e` pod itself runs with workload identity and
  14. // does not rely on client credentials.
  15. resource "kubernetes_service_account" "e2e" {
  16. metadata {
  17. name = "external-secrets-e2e"
  18. namespace = "default"
  19. annotations = {
  20. "azure.workload.identity/client-id" = data.azuread_application.e2e.client_id
  21. }
  22. labels = {
  23. "azure.workload.identity/use" = "true"
  24. }
  25. }
  26. depends_on = [kubernetes_namespace.eso]
  27. }
  28. resource "kubernetes_service_account" "current" {
  29. metadata {
  30. name = "external-secrets-operator"
  31. namespace = "external-secrets-operator"
  32. annotations = {
  33. "azure.workload.identity/client-id" = data.azuread_application.eso.client_id
  34. }
  35. labels = {
  36. "azure.workload.identity/use" = "true"
  37. }
  38. }
  39. depends_on = [kubernetes_namespace.eso]
  40. }