deploy-templates/charts/vault/templates/script-config-configmap.yaml (68 lines of code) (raw):
apiVersion: v1
kind: ConfigMap
metadata:
name: script-config
namespace: {{ .Release.Namespace }}
labels:
helm.sh/chart: {{ include "vault.chart" . }}
app.kubernetes.io/name: {{ include "vault.name" . }}
app.kubernetes.io/instance: {{ .Release.Name }}
app.kubernetes.io/managed-by: {{ .Release.Service }}
data:
script-config.sh: |-
#!/bin/sh
vault_url=http://hashicorp-vault:8200
#policy fo keys
curl \
--header "X-Vault-Token: $VAULT_ROOT_TOKEN" \
--request PUT \
--data @/cfg/keys-policy/keys-policy.json \
$vault_url/v1/sys/policies/acl/keys
curl \
--header "X-Vault-Token: $VAULT_ROOT_TOKEN" \
--request PUT \
--data @/cfg/registry-regulation-management-encryption-only-policy/registry-regulation-management-encryption-only-policy.json \
$vault_url/v1/sys/policies/acl/registry-regulation-management-encryption-only-policy
curl \
--header "X-Vault-Token: $VAULT_ROOT_TOKEN" \
--request PUT \
--data @/cfg/user-publisher-job-decryption-only-policy/user-publisher-job-decryption-only-policy.json \
$vault_url/v1/sys/policies/acl/user-publisher-job-decryption-only-policy
#vault auth enable kubernetes
curl \
--header "X-Vault-Token: $VAULT_ROOT_TOKEN" \
--request POST \
--data @/cfg/auth-method/auth-method.json \
$vault_url/v1/sys/auth/kubernetes
curl \
--header "X-Vault-Token: $VAULT_ROOT_TOKEN" \
--request POST \
--data @/cfg/auth-config/auth-config.json \
$vault_url/v1/auth/kubernetes/config
#role
curl \
--header "X-Vault-Token: $VAULT_ROOT_TOKEN" \
--request POST \
--data @/cfg/role/role.json \
$vault_url/v1/auth/kubernetes/role/sa-role
curl \
--header "X-Vault-Token: $VAULT_ROOT_TOKEN" \
--request POST \
--data @/cfg/role/registry-regulation-management-encryption-only-role/registry-regulation-management-encryption-only-role.json \
$vault_url/v1/auth/kubernetes/role/registry-regulation-management-encryption-only-role
curl \
--header "X-Vault-Token: $VAULT_ROOT_TOKEN" \
--request POST \
--data @/cfg/role/user-publisher-job-decryption-only-role/user-publisher-job-decryption-only-role.json \
$vault_url/v1/auth/kubernetes/role/user-publisher-job-decryption-only-role
#enable transit engine
curl \
--header "X-Vault-Token: $VAULT_ROOT_TOKEN" \
--request POST \
--data @/cfg/transit-engine/transit-engine.json \
$vault_url/v1/sys/mounts/transit
#key
curl \
--header "X-Vault-Token: $VAULT_ROOT_TOKEN" \
--request POST \
--data @/cfg/main-key/main-key.json \
$vault_url/v1/transit/keys/main-key
curl \
--header "X-Vault-Token: $VAULT_ROOT_TOKEN" \
--request POST \
--data @/cfg/registry-regulation-management-encryption-key/registry-regulation-management-encryption-key.json \
$vault_url/v1/transit/keys/registry-regulation-management-encryption-key