Skip to content

Commit f8ade6b

Browse files
update external secrets
1 parent 3853db6 commit f8ade6b

File tree

4 files changed

+99
-99
lines changed

4 files changed

+99
-99
lines changed

config/prow/boskos/patch-aws-account/job.yaml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -35,11 +35,11 @@ spec:
3535
- name: ACCESS_KEY_ID
3636
valueFrom:
3737
secretKeyRef:
38-
name: aws-access-key-id
39-
key: aws-access-key-id
38+
name: tanzu-prow-bot
39+
key: AWS_ACCESS_KEY_ID
4040
- name: ACCESS_KEY_SECRET
4141
valueFrom:
4242
secretKeyRef:
43-
name: aws-access-key-secret
44-
key: aws-access-key-secret
43+
name: tanzu-prow-bot
44+
key: AWS_SECRET_ACCESS_KEY
4545
restartPolicy: Never

config/prow/config.yaml

Lines changed: 13 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -158,64 +158,27 @@ presets:
158158
hostPath:
159159
path: /sys/fs/cgroup
160160
type: Directory
161-
# AWS ECR registry creds
162-
- labels:
163-
preset-registry-credentials: "true"
164-
env:
165-
- name: REGISTRY_ENABLED
166-
value: "true"
167-
- name: REGISTRY_USERNAME
168-
value: /etc/registry-username/username
169-
- name: REGISTRY_PASSWORD
170-
value: /etc/registry-password/password
171-
volumes:
172-
- name: registry-username
173-
secret:
174-
defaultMode: 0400
175-
secretName: registry-username
176-
- name: registry-password
177-
secret:
178-
defaultMode: 0400
179-
secretName: registry-password
180-
volumeMounts:
181-
- name: registry-username
182-
mountPath: /etc/registry-username
183-
readOnly: true
184-
- name: registry-password
185-
mountPath: /etc/registry-password
186-
readOnly: true
187161
# AWS credentials
188162
- labels:
189163
preset-aws-credentials: "true"
190164
env:
191165
- name: AWS_ACCESS_KEY_ID
192-
value: /etc/aws-access-key-id/aws-access-key-id
166+
valueFrom:
167+
secretKeyRef:
168+
name: tanzu-prow-bot
169+
key: AWS_ACCESS_KEY_ID
193170
- name: AWS_SECRET_ACCESS_KEY
194-
value: /etc/aws-access-key-secret/aws-access-key-secret
195-
- name: AWS_B64ENCODED_CREDENTIAL
196171
valueFrom:
197172
secretKeyRef:
198-
name: aws-b64encoded-credential
199-
key: aws-b64encoded-credential
173+
name: tanzu-prow-bot
174+
key: AWS_SECRET_ACCESS_KEY
200175
- name: AWS_SSH_KEY_NAME
201176
valueFrom:
202177
secretKeyRef:
203-
name: aws-ssh-key-name
204-
key: aws-ssh-key-name
205-
volumes:
206-
- name: aws-access-key-id
207-
secret:
208-
defaultMode: 0400
209-
secretName: aws-access-key-id
210-
- name: aws-access-key-secret
211-
secret:
212-
defaultMode: 0400
213-
secretName: aws-access-key-secret
214-
volumeMounts:
215-
- name: aws-access-key-id
216-
mountPath: /etc/aws-access-key-id
217-
readOnly: true
218-
- name: aws-access-key-secret
219-
mountPath: /etc/aws-access-key-secret
220-
readOnly: true
221-
178+
name: tanzu-prow-bot
179+
key: AWS_SSH_KEY_NAME
180+
- name: AWS_REGION
181+
valueFrom:
182+
secretKeyRef:
183+
name: tanzu-prow-bot
184+
key: AWS_REGION

config/prow/external-secrets.yaml

Lines changed: 81 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -1,78 +1,115 @@
1-
apiVersion: "kubernetes-client.io/v1"
1+
# contains AWS credentials for the tanzu-prow-bot user
2+
apiVersion: kubernetes-client.io/v1
23
kind: ExternalSecret
34
metadata:
4-
name: registry-username
5+
name: tanzu-prow-bot
56
namespace: test-pods
67
spec:
78
backendType: secretsManager
8-
region: us-east-2
9-
roleArn: arn:aws:iam::609817409085:role/prow-ecr
10-
data:
11-
- key: registry/username
12-
name: username
9+
# optional: specify role to assume when retrieving the data
10+
roleArn: arn:aws:iam::605126514283:role/tanzu-prow-secret-manager-role
11+
# optional: specify region
12+
region: us-east-1
13+
dataFrom:
14+
- tanzu/tanzu-prow-bot
15+
1316
---
14-
apiVersion: "kubernetes-client.io/v1"
17+
apiVersion: kubernetes-client.io/v1
1518
kind: ExternalSecret
1619
metadata:
17-
name: registry-password
18-
namespace: test-pods
20+
name: github-token
21+
namespace: prow
1922
spec:
2023
backendType: secretsManager
21-
region: us-east-2
22-
roleArn: arn:aws:iam::609817409085:role/prow-ecr
24+
roleArn: arn:aws:iam::605126514283:role/tanzu-prow-secret-manager-role
25+
region: us-east-1
2326
data:
24-
- key: registry/password
25-
name: password
27+
- key: tanzu/prow-service-cluster
28+
name: github-token
29+
- key: tanzu/prow-service-cluster
30+
name: appid
31+
2632
---
27-
apiVersion: "kubernetes-client.io/v1"
33+
apiVersion: kubernetes-client.io/v1
2834
kind: ExternalSecret
2935
metadata:
30-
name: aws-access-key-id
31-
namespace: test-pods
36+
name: hmac-token
37+
namespace: prow
3238
spec:
3339
backendType: secretsManager
34-
region: us-east-2
35-
roleArn: arn:aws:iam::609817409085:role/prow-ecr
40+
roleArn: arn:aws:iam::605126514283:role/tanzu-prow-secret-manager-role
41+
region: us-east-1
3642
data:
37-
- key: aws-access-key-id
38-
name: aws-access-key-id
43+
- key: tanzu/prow-service-cluster
44+
name: hmac-token
45+
3946
---
40-
apiVersion: "kubernetes-client.io/v1"
47+
apiVersion: kubernetes-client.io/v1
4148
kind: ExternalSecret
4249
metadata:
43-
name: aws-access-key-secret
44-
namespace: test-pods
50+
name: github-oauth-config
51+
namespace: prow
4552
spec:
4653
backendType: secretsManager
47-
region: us-east-2
48-
roleArn: arn:aws:iam::609817409085:role/prow-ecr
49-
data:
50-
- key: aws-access-key-secret
51-
name: aws-access-key-secret
54+
roleArn: arn:aws:iam::605126514283:role/tanzu-prow-secret-manager-role
55+
region: us-east-1
56+
dataFrom:
57+
- tanzu/github-oauth-config
58+
5259
---
53-
apiVersion: "kubernetes-client.io/v1"
60+
apiVersion: kubernetes-client.io/v1
5461
kind: ExternalSecret
5562
metadata:
56-
name: aws-b64encoded-credential
57-
namespace: test-pods
63+
name: cookie
64+
namespace: prow
5865
spec:
5966
backendType: secretsManager
60-
region: us-east-2
61-
roleArn: arn:aws:iam::609817409085:role/prow-ecr
62-
data:
63-
- key: aws-b64encoded-credential
64-
name: aws-b64encoded-credential
67+
roleArn: arn:aws:iam::605126514283:role/tanzu-prow-secret-manager-role
68+
region: us-east-1
69+
dataFrom:
70+
- tanzu/cookie
71+
72+
---
73+
74+
# gcs-credentials secret is required in both prow as well as test-pods namespace
75+
# refer: https://github.com/kubernetes/test-infra/blob/master/prow/getting_started_deploy.md#configure-a-gcs-bucket
76+
77+
apiVersion: kubernetes-client.io/v1
78+
kind: ExternalSecret
79+
metadata:
80+
name: gcs-credentials
81+
namespace: prow
82+
spec:
83+
backendType: secretsManager
84+
roleArn: arn:aws:iam::605126514283:role/tanzu-prow-secret-manager-role
85+
region: us-east-1
86+
dataFrom:
87+
- tanzu/prow-service-account
88+
6589
---
66-
apiVersion: "kubernetes-client.io/v1"
90+
91+
apiVersion: kubernetes-client.io/v1
6792
kind: ExternalSecret
6893
metadata:
69-
name: aws-ssh-key-name
94+
name: gcs-credentials
7095
namespace: test-pods
7196
spec:
7297
backendType: secretsManager
73-
region: us-east-2
74-
roleArn: arn:aws:iam::609817409085:role/prow-ecr
75-
data:
76-
- key: aws-ssh-key-name
77-
name: aws-ssh-key-name
98+
roleArn: arn:aws:iam::605126514283:role/tanzu-prow-secret-manager-role
99+
region: us-east-1
100+
dataFrom:
101+
- tanzu/prow-service-account
78102

103+
104+
---
105+
apiVersion: kubernetes-client.io/v1
106+
kind: ExternalSecret
107+
metadata:
108+
name: testgrid-gcs-credentials
109+
namespace: test-pods
110+
spec:
111+
backendType: secretsManager
112+
roleArn: arn:aws:iam::605126514283:role/tanzu-prow-secret-manager-role
113+
region: us-east-1
114+
dataFrom:
115+
- tanzu/testgrid-service-account

config/prow/kubernetes-external-secrets_sa.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ kind: ServiceAccount
33
metadata:
44
annotations:
55
eks.amazonaws.com/audience: sts.amazonaws.com
6-
eks.amazonaws.com/role-arn: arn:aws:iam::609817409085:role/prow-ecr
6+
eks.amazonaws.com/role-arn: arn:aws:iam::605126514283:role/tanzu-prow-secret-manager-role
77
eks.amazonaws.com/sts-regional-endpoints: "true"
88
name: kubernetes-external-secrets-sa
99
namespace: default

0 commit comments

Comments
 (0)