vault-anchore-engine-access-credentials-external-secret.yaml 1.4 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455
  1. {% raw %}
  2. apiVersion: external-secrets.io/v1
  3. kind: ExternalSecret
  4. metadata:
  5. name: anchore-access-credentials
  6. namespace: security
  7. spec:
  8. refreshInterval: 1h0m0s
  9. secretStoreRef:
  10. name: vault-backend
  11. kind: ClusterSecretStore
  12. target:
  13. name: anchore-access-credentials
  14. template:
  15. data:
  16. ANCHORE_ADMIN_USERNAME: >-
  17. {{ printf "{{ .username | toString }}" }}
  18. ANCHORE_ADMIN_PASSWORD: >-
  19. {{ printf "{{ .password | toString }}" }}
  20. ANCHORE_DB_PASSWORD: >-
  21. {{ printf "{{ .dbPassword | toString }}" }}
  22. db-url: >-
  23. {{ printf "{{ .dbUrl | toString }}" }}
  24. db-user: >-
  25. {{ printf "{{ .dbUser | toString }}" }}
  26. postgres-password: >-
  27. {{ printf "{{ .postgresPassword | toString }}" }}
  28. data:
  29. - secretKey: password
  30. remoteRef:
  31. key: anchore-engine
  32. property: ANCHORE_ADMIN_PASSWORD
  33. - secretKey: username
  34. remoteRef:
  35. key: anchore-engine
  36. property: ANCHORE_ADMIN_USERNAME
  37. - secretKey: dbPassword
  38. remoteRef:
  39. key: anchore-engine
  40. property: ANCHORE_DB_PASSWORD
  41. - secretKey: dbUrl
  42. remoteRef:
  43. key: anchore-engine
  44. property: db-url
  45. - secretKey: dbUser
  46. remoteRef:
  47. key: anchore-engine
  48. property: db-user
  49. - secretKey: postgresPassword
  50. remoteRef:
  51. key: anchore-engine
  52. property: postgres-password
  53. {% endraw %}