Skip to content

Commit dbca465

Browse files
Ani1357CasLubbers
andauthored
feat: removing hashicorp vault and external-secrets (#1618)
Co-authored-by: Cas Lubbers <[email protected]>
1 parent 48730d9 commit dbca465

File tree

81 files changed

+23
-18069
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

81 files changed

+23
-18069
lines changed

.env.sample

+1-2
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,6 @@ AWS_DEFAULT_REGION=''
1919
AWS_REGION=''
2020
AWS_ACCESS_KEY_ID=''
2121
AWS_SECRET_ACCESS_KEY=''
22-
# Vault:
23-
VAULT_TOKEN=''
22+
2423

2524
OTOMI_CHARTS_URL='https://github.com/redkubes/otomi-charts.git'

.values/.secrets.sample

-2
Original file line numberDiff line numberDiff line change
@@ -14,5 +14,3 @@ AWS_DEFAULT_REGION=''
1414
AWS_REGION=''
1515
AWS_ACCESS_KEY_ID=''
1616
AWS_SECRET_ACCESS_KEY=''
17-
# Vault:
18-
VAULT_TOKEN=''

.values/env/apps/vault.yaml

-3
This file was deleted.

README.md

-1
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,6 @@ Otomi offers a set of integrated Kubernetes applications (using upstream open so
105105
- [Grafana](https://github.com/grafana/grafana): Visualize metrics, logs, and traces from multiple sources
106106
- [Grafana Loki](https://github.com/grafana/loki): Collecting container application logs
107107
- [Harbor](https://github.com/goharbor/harbor): Container image registry with role-based access control, image scanning, and image signing
108-
- [HashiCorp Vault](https://github.com/hashicorp/vault): Manage Secrets and Protect Sensitive Data
109108
- [OPA/Gatekeeper](https://github.com/open-policy-agent/gatekeeper): Policy-based control for cloud-native environments
110109
- [Jaeger](https://github.com/jaegertracing/jaeger): End-to-end distributed tracing and monitor for complex distributed systems
111110
- [Kiali](https://github.com/kiali/kiali): Observe Istio service mesh relations and connections

apps.yaml

-23
Original file line numberDiff line numberDiff line change
@@ -85,17 +85,6 @@ appsInfo:
8585
license: Apache 2.0
8686
about: ExternalDNS synchronizes exposed Kubernetes Services and Ingresses with DNS providers.
8787
integration: ExternalDNS is used by Otomi to make public service domains accessible by registering them with Otomi's load balancer CNAME or IP address. When ExternalDNS is not enabled (default), then Otomi will rely on nip.io to create host names for all services.
88-
external-secrets:
89-
title: External Secrets Operator
90-
appVersion: 0.10.2
91-
repo: https://github.com/external-secrets/external-secrets
92-
maintainers: External Secrets community
93-
relatedLinks:
94-
- https://otomi.io/docs/apps/external-secrets
95-
- https://external-secrets.io
96-
license: Apache 2.0
97-
about: External Secrets Operator reads information from a third-party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.
98-
integration: External Secrets is used by Otomi to allow teams to automatically sync (partial) secrets created in the packaged (Hashicorp) Vault.
9988
falco:
10089
title: Falco
10190
appVersion: 0.33.1
@@ -352,18 +341,6 @@ appsInfo:
352341
dependencies: Prometheus, Grafana, Loki, Tempo
353342
about: The OpenTelemetry Collector offers a vendor-agnostic implementation on how to receive, process and export telemetry data. In addition, it removes the need to run, operate and maintain multiple agents/collectors in order to support open-source telemetry data formats (e.g. Jaeger, Prometheus, etc.) to multiple open-source or commercial back-ends.
354343
integration: OpenTelemetry Collector is used to receive telementry data from Istio Envoy access logs and export this data to Tempo.
355-
vault:
356-
title: Vault Operator
357-
appVersion: 1.16.0
358-
repo: https://github.com/hashicorp/vault
359-
maintainers: HashiCorp
360-
relatedLinks:
361-
- https://otomi.io/docs/apps/vault
362-
- https://www.vaultproject.io/
363-
- https://www.vaultproject.io/docs/configuration/storage
364-
license: MPL-2.0
365-
about: Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, and more. Vault provides a unified interface to any secret, while providing tight access control and recording a detailed audit log.
366-
integration: Vault has been made team aware. When enabled, a space will automatically be created for each team, and only team members are allowed access. Vault is automatically configured to use Otomi's Keycloak OIDC settings for SSO. Vault runs natively on Kubernetes. To prevent data from Vault being lost during a rolling cluster upgrade, data persistence can be configured in combination with external (blob) storage.
367344
velero:
368345
title: Velero
369346
appVersion: 1.9.0

binzx/otomi

-1
Original file line numberDiff line numberDiff line change
@@ -232,7 +232,6 @@ vars=(
232232
TRACE
233233
VERBOSITY
234234
VALUES_INPUT
235-
VAULT_TOKEN
236235
)
237236
dump_vars "${vars[@]}"
238237

chart/otomi/templates/sops-secrets.yaml

-3
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,4 @@ data:
2828
{{- with .region }}
2929
GOOGLE_REGION: {{ . | b64enc }}{{ end }}
3030
{{- end }}
31-
{{- with $v.vault }}
32-
VAULT_TOKEN: {{ .token | b64enc }}
33-
{{- end }}
3431
{{- end }}

chart/otomi/values.yaml

+1-3
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ otomi: {}
8989
# KMS for encrypting values
9090
# kms:
9191
# sops:
92-
# # provider can be one of aws|azure|google|vault
92+
# # provider can be one of aws|azure|google
9393
# provider: ''
9494
# aws:
9595
# keys: ''
@@ -105,8 +105,6 @@ otomi: {}
105105
# keys: ''
106106
# accountJson: ''
107107
# project: ''
108-
# vault:
109-
# token: ''
110108
# Bring your own IDP, or leave commented out to use keycloak as IDP
111109
# oidc:
112110
# clientID: ''

charts/external-secrets/.helmignore

-26
This file was deleted.

charts/external-secrets/Chart.yaml

-15
This file was deleted.

charts/external-secrets/README.md

-168
This file was deleted.

charts/external-secrets/README.md.gotmpl

-35
This file was deleted.

charts/external-secrets/ci/main-values.yaml

-2
This file was deleted.

charts/external-secrets/templates/NOTES.txt

-13
This file was deleted.

0 commit comments

Comments
 (0)