Skip to content
This repository has been archived by the owner on May 5, 2024. It is now read-only.

Commit

Permalink
fix: removing sops
Browse files Browse the repository at this point in the history
  • Loading branch information
truxnell committed Feb 12, 2023
1 parent 48bef11 commit 02a3024
Show file tree
Hide file tree
Showing 7 changed files with 87 additions and 105 deletions.
4 changes: 2 additions & 2 deletions .sops.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,10 +9,10 @@ creation_rules:
age: >-
age12kzuwvvedndehkke84apwamungqrcavf2khwjvd46f6lkq0wqq5q3s3vth
- path_regex: k8s/manifests/.*\.sops\.toml
- path_regex: kubernetes/.*\.sops\.toml
age: >-
age12kzuwvvedndehkke84apwamungqrcavf2khwjvd46f6lkq0wqq5q3s3vth
- path_regex: k8s/manifests/.*\.sops\.json
- path_regex: kubernetes/.*\.sops\.json
age: >-
age12kzuwvvedndehkke84apwamungqrcavf2khwjvd46f6lkq0wqq5q3s3vth
35 changes: 0 additions & 35 deletions infrastructure/talos/hegira/talenv.sops.yaml

This file was deleted.

20 changes: 0 additions & 20 deletions kubernetes/apps/security/glauth/app/config/groups.sops.toml

This file was deleted.

20 changes: 0 additions & 20 deletions kubernetes/apps/security/glauth/app/config/server.sops.toml

This file was deleted.

20 changes: 0 additions & 20 deletions kubernetes/apps/security/glauth/app/config/users.sops.toml

This file was deleted.

85 changes: 85 additions & 0 deletions kubernetes/apps/security/glauth/app/externalsecret.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,85 @@
---
# yaml-language-server: $schema=https://kubernetes-schemas.trux.dev/clustersecretstore_v1beta1.json
apiVersion: external-secrets.io/v1beta1
kind: ClusterSecretStore
metadata:
name: &name glauth
namespace: security
spec:
provider:
doppler:
project: *name
config: prd
auth:
secretRef:
dopplerToken:
name: doppler-token-auth-api
key: dopplerToken
namespace: flux-system
---
# yaml-language-server: $schema=https://kubernetes-schemas.trux.dev/externalsecret_v1beta1.json
apiVersion: external-secrets.io/v1beta1
kind: ExternalSecret
metadata:
name: &name glauth
namespace: security
spec:
secretStoreRef:
kind: ClusterSecretStore
name: *name
target:
name: *name
creationPolicy: Owner
template:
engineVersion: v2
data:
server.toml: |
debug = true
[ldap]
enabled = true
listen = "0.0.0.0:389"
[ldaps]
enabled = false
[api]
enabled = true
tls = false
listen = "0.0.0.0:5555"
[backend]
datastore = "config"
baseDN = "dc=home,dc=arpa"
groups.toml: |
[[groups]]
name = "svcaccts"
gidnumber = 6500
[[groups]]
name = "admins"
gidnumber = 6501
[[groups]]
name = "people"
gidnumber = 6502
# Create passbcrypt:
# https://gchq.github.io/CyberChef/#recipe=Bcrypt(12)To_Hex('None',0)
# or
# htpasswd -bnBC 10 "" YOUR_PASSWORD | tr -d ':\n' | od -A n -t x1 | sed 's/ *//g' | tr -d '\n'
users.toml: |
[[users]]
name = "search"
uidnumber = 5000
primarygroup = 6500
passbcrypt = ""
[[users.capabilities]]
action = "search"
object = "*"
[[users]]
name = "{{ .TRUX_USERNAME }}"
mail = "{{ .TRUX_EMAIL }}"
givenname ="{{ .TRUX_FIRSTNAME }}"
sn ="{{ .TRUX_SURNAME }}"
uidnumber = 5001
primarygroup = 6502
othergroups = [ 6501 ]
passbcrypt = "{{ .TRUX_PASS_BCRYPT }}"
dataFrom:
- find:
name:
regexp: .*
8 changes: 0 additions & 8 deletions kubernetes/apps/security/glauth/app/kustomization.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -5,13 +5,5 @@ kind: Kustomization
namespace: security
resources:
- ./helmrelease.yaml
secretGenerator:
- name: glauth
files:
- server.toml=config/server.sops.toml
- groups.toml=config/groups.sops.toml
- users.toml=config/users.sops.toml
generatorOptions:
disableNameSuffixHash: true
metadata:
namespace: security

0 comments on commit 02a3024

Please sign in to comment.