File tree Expand file tree Collapse file tree
charts/hello-coco/templates Expand file tree Collapse file tree Original file line number Diff line number Diff line change 1414 # not individual containers. All containers in this pod are part of the same trust boundary.
1515 shareProcessNamespace : true
1616 serviceAccountName : spire-agent
17- # TODO: Make imagePullSecrets configurable like qtodo chart pattern (values.yaml + conditional)
18- # Currently hardcoded 'global-pull-secret' which must be manually created in the namespace
19- # Should either: 1) use ServiceAccount.imagePullSecrets, or 2) be conditional from values
2017 imagePullSecrets :
21- - name : global- pull-secret
18+ - name : pull-secret
2219
2320 containers :
2421 # SPIRE Agent Sidecar
Original file line number Diff line number Diff line change 1+ apiVersion : external-secrets.io/v1beta1
2+ kind : ExternalSecret
3+ metadata :
4+ name : pull-secret
5+ namespace : {{ .Release.Namespace }}
6+ spec :
7+ refreshInterval : 1h
8+ secretStoreRef :
9+ name : openshift-config
10+ kind : SecretStore
11+ target :
12+ name : pull-secret
13+ template :
14+ type : kubernetes.io/dockerconfigjson
15+ data :
16+ .dockerconfigjson : " {{ `{{ .dockerconfigjson | toString }}` }}"
17+ data :
18+ - secretKey : dockerconfigjson
19+ remoteRef :
20+ key : pull-secret
21+ property : .dockerconfigjson
Original file line number Diff line number Diff line change 1+ apiVersion : v1
2+ kind : ServiceAccount
3+ metadata :
4+ name : pull-secret-reader
5+ namespace : {{ .Release.Namespace }}
6+ ---
7+ apiVersion : rbac.authorization.k8s.io/v1
8+ kind : ClusterRole
9+ metadata :
10+ name : pull-secret-reader
11+ rules :
12+ - apiGroups : [""]
13+ resources : ["secrets"]
14+ resourceNames : ["pull-secret"]
15+ verbs : ["get", "list", "watch"]
16+ - apiGroups : [""]
17+ resources : ["namespaces"]
18+ verbs : ["get"]
19+ - apiGroups : ["authorization.k8s.io"]
20+ resources : ["selfsubjectrulesreviews"]
21+ verbs : ["create"]
22+ ---
23+ apiVersion : rbac.authorization.k8s.io/v1
24+ kind : ClusterRoleBinding
25+ metadata :
26+ name : pull-secret-reader
27+ roleRef :
28+ apiGroup : rbac.authorization.k8s.io
29+ kind : ClusterRole
30+ name : pull-secret-reader
31+ subjects :
32+ - kind : ServiceAccount
33+ name : pull-secret-reader
34+ namespace : {{ .Release.Namespace }}
Original file line number Diff line number Diff line change 1+ apiVersion : external-secrets.io/v1beta1
2+ kind : SecretStore
3+ metadata :
4+ name : openshift-config
5+ namespace : {{ .Release.Namespace }}
6+ spec :
7+ provider :
8+ kubernetes :
9+ remoteNamespace : openshift-config
10+ server :
11+ caProvider :
12+ type : ConfigMap
13+ name : kube-root-ca.crt
14+ key : ca.crt
15+ auth :
16+ serviceAccount :
17+ name : pull-secret-reader
You can’t perform that action at this time.
0 commit comments