瀏覽代碼

Sealed secrets

Simon Kaiser 3 年之前
父節點
當前提交
0473ff48f9
共有 5 個文件被更改,包括 52 次插入0 次删除
  1. 二進制
      .DS_Store
  2. 1
    0
      .gitignore
  3. 20
    0
      README.md
  4. 28
    0
      gitops-kaisers-info/k8-kaisers-info-sealedsecret.crt
  5. 3
    0
      services-kaisers-info/templates/authentik.yaml

二進制
.DS_Store 查看文件


+ 1
- 0
.gitignore 查看文件

@@ -0,0 +1 @@
1
+*.key

+ 20
- 0
README.md 查看文件

@@ -31,6 +31,26 @@ kubectl apply -f application-longhorn-kaisers-info.yaml
31 31
 ```
32 32
 kubectl apply -f application-gitops-kaisers-info.yaml
33 33
 ```
34
+### Sealed-Secrets
35
+#### Own Certificates
36
+https://github.com/bitnami-labs/sealed-secrets/blob/main/docs/bring-your-own-certificates.md
37
+
38
+```
39
+export PRIVATEKEY="k8-kaisers-info-sealedsecret.key"
40
+export PUBLICKEY="k8-kaisers-info-sealedsecret.crt"
41
+export NAMESPACE="sealed-secrets"
42
+export SECRETNAME="k8-kaisers-info-sealedsecret"
43
+
44
+openssl req -x509 -nodes -newkey rsa:4096 -keyout "$PRIVATEKEY" -out "$PUBLICKEY" -subj "/CN=sealed-secret/O=sealed-secret"
45
+kubectl -n "$NAMESPACE" create secret tls "$SECRETNAME" --cert="$PUBLICKEY" --key="$PRIVATEKEY"
46
+kubectl -n "$NAMESPACE" label secret "$SECRETNAME" sealedsecrets.bitnami.com/sealed-secrets-key=active
47
+kubectl -n "$NAMESPACE" delete pod -l name=app.kubernetes.io/name=sealed-secrets 
48
+kubectl -n "$NAMESPACE" logs -l name=sealed-secrets-controller
49
+```
50
+#### Sealing a secret
51
+```
52
+kubeseal --cert "./${PUBLICKEY}" --scope cluster-wide < mysecret.yaml | kubectl apply -f-
53
+```
34 54
 
35 55
 ## Services
36 56
 ### Services

+ 28
- 0
gitops-kaisers-info/k8-kaisers-info-sealedsecret.crt 查看文件

@@ -0,0 +1,28 @@
1
+-----BEGIN CERTIFICATE-----
2
+MIIE3DCCAsQCCQCsG9gJvmZ1XjANBgkqhkiG9w0BAQsFADAwMRYwFAYDVQQDDA1z
3
+ZWFsZWQtc2VjcmV0MRYwFAYDVQQKDA1zZWFsZWQtc2VjcmV0MB4XDTIyMDUzMTE2
4
+MDIwN1oXDTIyMDYzMDE2MDIwN1owMDEWMBQGA1UEAwwNc2VhbGVkLXNlY3JldDEW
5
+MBQGA1UECgwNc2VhbGVkLXNlY3JldDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCC
6
+AgoCggIBAMB988b3SmVJKeWmMgaCzLkO/iWiXofsl6jzpHTMbFuctLJQvnXLzZ8b
7
+0lEL50KVE/KBvt+1p+0eWObNREAHva2zQh07BwjHjkxR6Z086lnUGeacOyx4wd13
8
+/H6yxZpZahbKruE+Awd6sspti71LZ7PcafLw8+HjGiftF+jeLj3A5a3U1yE1WVIk
9
+eB4ypxf7XRScZBjrL0LNN7S63lsc0vrjmphmj47hhWsVkAEDOrP5RSGu6R7d/caO
10
+ECCxXBx+NCKf7ARdTxo0gGPOCa2TnVsFkncUXolGpHEQwLAWMubv94SE4PMcGSbU
11
+xZbSd+/y9yHTBmYSz1xxpx0iDLmjuhD7axZpvwFW8/u5kbWIvIp1a2kIPOdfUgbM
12
+emxYyVCBcgfNBv0274n0bI4KmImY60/QdTifLiVujUP7R0h721FckqlLwZ8sskte
13
+dQZ0LTMMNjaGqKhWKeCxNbbH1VQDbMAJZR2omamK7VbXa2BX9z6c4ILtDf9vBCuS
14
+4x+V99iQJNVeqCLhq0hykMxKrCUccRd+IXw1PUAp1Ng05VasDul3znpKA1x6hxvV
15
+S+o8w6vC2yNkmvgy86S4TJlwzikDXS55B4TqOgrj6IhnFzcdp/HTxeAzqT8ETZ32
16
+gfT2pvWZDKnYbyWgMd/N4pQv6W7DlrPib/0YiXPvGfGZEU6e7j5JAgMBAAEwDQYJ
17
+KoZIhvcNAQELBQADggIBAJKYhggjjhbavqiukBAeXyH2u9y/Ush60K0uAVcs6ZtG
18
+gh0Bz5kERAIpgrUD7oFuHknPQ8LsLzzwxMGzXBj2jHNNkKR0SWZdq5KHO/cluby/
19
+qBfUOGEI8Em5KLFVxa1YnQnPZZrhmHxd3t/cL0QG8c89hhohG8C1IlJT8WN5zM0h
20
+LXyXUPwfynXW0W0IILPWlNWkxBS3aDTWyoZo3gKu2YKQRH/4VV3yXoGVJWyETz7X
21
+MRPaatqqK56mxa+ZDrjoA9Ff+lmO3ixSbGX9bWesUiaOdzXZLzv1SRCu5vlLO3QJ
22
+z6gbJa8StmwFg5VGkBM66WnV0PE7dmiU48VjFRM1Ptp/BSTuhoZPJb8ccFIRMro7
23
+Q+Aopc2Vp0hvx/gGgDSHLfh23j60QC41kCRp8Y7cAvYmyl0TO0yw+CqIz+/LqBIU
24
+GwXGFIG+gju5JBAKD/NvAD0IT1c5DPAIEJBB9hk5SF9/CxNOD8VPGfQqAhofN3gD
25
+fA4/65xAQRWjTwvCuCwYkKfBjAEv3+43ixDjO+DZhI1H5o5uEQgyFXGvitobDhAP
26
+zJZZJiWWY+tr9feUkaEMwGJn4X38A/ocI7J44vWqLk0WcakUd2sykMeZTEL9c9Oj
27
+MPutKHHEIOWybWzUut4c3O9TZwdq77mRzWCXhNBxvly6L3o5wly356jOOvlxC0Rw
28
+-----END CERTIFICATE-----

+ 3
- 0
services-kaisers-info/templates/authentik.yaml 查看文件

@@ -22,6 +22,9 @@ spec:
22 22
       releaseName: "authentik"
23 23
       values: |
24 24
         authentik:
25
+          env: {
26
+            AK_ADMIN_PASS: 'SIMON'
27
+          }
25 28
           secret_key: "qlfgmSJ8GT/EoE3JsphrM81KzyYqoDYif7u59m/sVL4EQ6MO"
26 29
           # This sends anonymous usage-data, stack traces on errors and
27 30
           # performance data to sentry.beryju.org, and is fully opt-in