-
I have a Kustomization that needs to decrypt files using keys stored in HashiCorp Vault. I am able to supply the vault token through a secret with key "sops.vault-token" however our Vault instance uses a self signed certificate so I'm getting the following error "x509 certificate signed by unknown authority". Is there a way to provide my CA file to the controller? I faced a similar issue when connecting to our Gitlab instance, but there was an option to provide the CA file within the secret for the source controller.
My secret is being created with Terraform
GitLab secret example that is working
|
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 6 replies
-
This is not supported at the moment. I would convert this to an issue. |
Beta Was this translation helpful? Give feedback.
-
@abangs-nn This should be doable by mounting the CA-cert into the source-controller pod. Here's what a patch to your patches:
- patch: |
- op: add
path: /spec/template/spec/containers/0/volumeMounts
value:
- name: vault-ca-pemstore
mountPath: /etc/ssl/certs/vault-ca.pem
subPath: vault-ca.pem
readOnly: true
- op: add
path: /spec/template/spec/volumes
value:
- name: vault-ca-pemstore
secret:
secretName: vault-ca-pemstore
target:
kind: Deployment
name: "source-controller" You just need to create the Update: added patch for |
Beta Was this translation helpful? Give feedback.
@abangs-nn This should be doable by mounting the CA-cert into the source-controller pod. Here's what a patch to your
kustomization.yaml
might look like:You just need to create the
vault-ca-pemstore
…