Explorar o código

use external secrets for backup cloudflared + traefik

Josh Bicking hai 1 semana
pai
achega
5562e3c81e
Modificáronse 2 ficheiros con 57 adicións e 0 borrados
  1. 23 0
      backup/cloudflared/cloudflared.yaml
  2. 34 0
      backup/traefik/external-secrets.yaml

+ 23 - 0
backup/cloudflared/cloudflared.yaml

@@ -68,3 +68,26 @@ data:
       path: /notifications/hub.*
       service: http://vaultwarden-service.vaultwarden.svc.cluster.local:3012
     - service: http_status:404
+---
+apiVersion: external-secrets.io/v1
+kind: ExternalSecret
+metadata:
+  name: tunnel-credentials
+  namespace: kube-system
+spec:
+  target:
+    name: tunnel-credentials
+    deletionPolicy: Delete
+    template:
+      type: Opaque
+      data:
+        credentials.json: |-
+          {{ .credentials }}
+  data:
+    - secretKey: credentials
+      sourceRef:
+        storeRef:
+          name: bitwarden-notes
+          kind: ClusterSecretStore
+      remoteRef:
+        key: 4a0b91df-6fcb-4dc1-a0b7-b3f800730cc1

+ 34 - 0
backup/traefik/external-secrets.yaml

@@ -0,0 +1,34 @@
+---
+apiVersion: external-secrets.io/v1
+kind: ExternalSecret
+metadata:
+  name: cloudflare-secrets
+  namespace: kube-system
+spec:
+  target:
+    name: cloudflare-secrets
+    deletionPolicy: Delete
+    template:
+      type: Opaque
+      data:
+        email: |-
+          {{ .email }}
+        api-key: |-
+          {{ .apikey }}
+  data:
+    - secretKey: email
+      sourceRef:
+        storeRef:
+          name: bitwarden-login
+          kind: ClusterSecretStore
+      remoteRef:
+        key: 6bf20ac6-c5c5-4c72-96eb-b3f800752799
+        property: username
+    - secretKey: apikey
+      sourceRef:
+        storeRef:
+          name: bitwarden-login
+          kind: ClusterSecretStore
+      remoteRef:
+        key: 6bf20ac6-c5c5-4c72-96eb-b3f800752799
+        property: password