Skip to content

Commit

Permalink
fix: vault configur setting
Browse files Browse the repository at this point in the history
  • Loading branch information
locmai committed Jul 25, 2022
1 parent 8d1523a commit 245b628
Show file tree
Hide file tree
Showing 3 changed files with 4 additions and 4 deletions.
4 changes: 2 additions & 2 deletions platform/files/oidc/main.go
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ func main() {
// Initialize Vault config and client
config := vault.DefaultConfig()

config.Address = "https://vault." + domain
config.Address = "https://auth." + domain
client, err := vault.NewClient(config)

unseal_secrets, err := k8sclient.CoreV1().Secrets("platform").Get(context.TODO(), "vault-unseal-keys", metav1.GetOptions{})
Expand Down Expand Up @@ -258,7 +258,7 @@ func main() {
map[string]interface{}{
"allowed_client_ids": boundary_client.Data["client_id"],
"scopes_supported": "groups,user,email",
"issuer": "http://vault.platform.svc.cluster.local:8200",
"issuer": "https://auth." + domain,
}); err != nil {
log.Fatal(err)
}
Expand Down
2 changes: 1 addition & 1 deletion platform/templates/argo-workflow.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ spec:
extraArgs:
- --auth-mode=sso
sso:
issuer: "https://auth.maibaloc.com/v1/identity/oidc/provider/vault-provider"
issuer: "https://auth.{{ .Values.global.domain }}/v1/identity/oidc/provider/vault-provider"
sessionExpiry: 240h
clientId:
name: humble-oidc-secrets
Expand Down
2 changes: 1 addition & 1 deletion platform/workflows/templates/configure-vault.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ spec:
templates:
- name: configure-vault
container:
image: locmai/humble-vault-config-tool:0.0.1
image: locmai/humble-vault-config-tool:0.0.2
command: [/vault-init-tool]
env:
- name: HUMBLE_DOMAIN
Expand Down

0 comments on commit 245b628

Please sign in to comment.