-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathsecretstore.ts
81 lines (75 loc) · 2.34 KB
/
secretstore.ts
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
import { awsProvider } from "./index";
import { Provider } from "@pulumi/kubernetes";
import * as aws from "@pulumi/aws";
import * as k8s from "@pulumi/kubernetes";
export function createSecretStore(k8sProvider: Provider) {
// Create an IAM user for secrets management
const secretsUser = new aws.iam.User("secretsUser", {
name: "secretsManagerUser"
}, { provider: awsProvider });
// Attach policy to the user that allows managing Secrets Manager
const policy = new aws.iam.Policy("policy", {
description: "Policy that allows management of Secrets Manager",
policy: JSON.stringify({
Version: "2012-10-17",
Statement: [{
Action: [
"secretsmanager:*"
],
Resource: "*",
Effect: "Allow"
}]
})
}, { provider: awsProvider });
// Attach policy to the user
new aws.iam.UserPolicyAttachment("userPolicyAttachment", {
user: secretsUser.name,
policyArn: policy.arn
}, { provider: awsProvider });
// Create access key for the IAM user
const accessKey = new aws.iam.AccessKey("accessKey", {
user: secretsUser.name
}, { provider: awsProvider });
// Create Kubernetes Secret with AWS credentials
const awsCredsSecret = new k8s.core.v1.Secret("aws-creds", {
metadata: {
name: "aws-creds",
namespace: "kube-system"
},
stringData: {
accessKey: accessKey.id,
secretAccessKey: accessKey.secret
}
}, { provider: k8sProvider });
// Create a SecretStore that references AWS Secrets Manager with IAM user credentials
return new k8s.apiextensions.CustomResource("aws-secret-store", {
apiVersion: "external-secrets.io/v1beta1",
kind: "ClusterSecretStore",
metadata: {
name: "aws-secret-store",
namespace: "kube-system"
},
spec: {
provider: {
aws: {
service: "SecretsManager",
region: "eu-central-1", // Frankfurt region
auth: {
secretRef: {
accessKeyIDSecretRef: {
name: "aws-creds",
key: "accessKey",
namespace: "kube-system"
},
secretAccessKeySecretRef: {
name: "aws-creds",
key: "secretAccessKey",
namespace: "kube-system"
}
}
}
}
}
}
}, { provider: k8sProvider });
}