Skip to content

Commit

Permalink
130-external-secret-store (#338)
Browse files Browse the repository at this point in the history
  • Loading branch information
sekka1 authored Jun 17, 2022
1 parent b36d05c commit d4abd36
Show file tree
Hide file tree
Showing 3 changed files with 141 additions and 0 deletions.
8 changes: 8 additions & 0 deletions terraform-environments/aws/terragrunt-dev/progress.md
Original file line number Diff line number Diff line change
Expand Up @@ -272,6 +272,8 @@ upstream items that have their own life cycle and releases. While we dont want


# 130-external-secrets
This installs the external-secrets helm chart which is an operator

PR: https://github.com/ManagedKube/kubernetes-ops/pull/336

Looks like this also has the same helm provider version problem
Expand All @@ -280,3 +282,9 @@ Looks like this also has the same helm provider version problem
Will have to peg all new ones to the older version for now.
* https://github.com/ManagedKube/kubernetes-ops/pull/337

# 130-external-secrets-store
This installs the CRDs for external-secrets to tell it what AWS secret store
to use.

PR: https://github.com/ManagedKube/kubernetes-ops/pull/338

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Original file line number Diff line number Diff line change
@@ -0,0 +1,60 @@
# Include all settings from the root terragrunt.hcl file
include {
path = find_in_parent_folders()
}

terraform {
source = "github.com/ManagedKube/kubernetes-ops.git//terraform-modules/aws/helm/external-secrets/secret_store?ref=v2.0.4"
}

dependency "eks" {
config_path = "${get_terragrunt_dir()}/../../../200-eks"

mock_outputs = {
zone_id = "zzzz"
}
mock_outputs_allowed_terraform_commands = ["validate", ]
}

# Generate a Kubernetes provider configuration for authenticating against the EKS cluster.
generate "k8s_helm" {
path = "k8s_helm_provider.tf"
if_exists = "overwrite_terragrunt"
contents = templatefile(
find_in_parent_folders("provider_k8s_helm_for_eks.template.hcl"),
{
eks_cluster_name = dependency.eks.outputs.cluster_id,
kubergrunt_exec = get_env("KUBERGRUNT_EXEC", "kubergrunt")
},
)
}

# ---------------------------------------------------------------------------------------------------------------------
# Locals are named constants that are reusable within the configuration.
# ---------------------------------------------------------------------------------------------------------------------
locals {
# Load common variables shared across all accounts
common_vars = read_terragrunt_config(find_in_parent_folders("common.hcl"))

# Load region-level variables
region_vars = read_terragrunt_config(find_in_parent_folders("region.hcl"))

# Load environment-level variables
environment_vars = read_terragrunt_config(find_in_parent_folders("environment.hcl"))

tags = {
ops_env = local.common_vars.locals.environment_name
ops_managed_by = "terraform"
ops_source_repo = local.common_vars.locals.repository_name
ops_source_repo_path = "${local.common_vars.locals.base_repository_path}/${path_relative_to_include()}"
ops_owners = "devops"
}
}

# ---------------------------------------------------------------------------------------------------------------------
# MODULE PARAMETERS
# These are the variables we have to pass in to use the module specified in the terragrunt configuration above
# ---------------------------------------------------------------------------------------------------------------------
inputs = {
environment_name = local.common_vars.locals.environment_name
}

0 comments on commit d4abd36

Please sign in to comment.