Replies: 1 comment 7 replies
-
Hey @shxpark, were you able to get this working? I am currently trying to use the SSCSI driver to mount secrets directly into the argocd repo server. Really curious to know if you got this working. Thanks |
Beta Was this translation helpful? Give feedback.
7 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I have two secrets that are stored in Secrets Manager - the oidc client secret and a tls crt/key. How can I read values from Secrets Manager? I know the oidc.config is stored in the argocd-cm config map and I know you can also mask the client secret value by storing that value inside the argocd-secret secret but the values in there must be getting read somehow from a path. I've tried changing this part of the deployment.yaml
- mountPath: /app/config/server/tls name: argocd-repo-server-tls
to a different mount path so I can mount my secretsmanager value onto the path and my tls.crt and tls.key that I get from secrets manager successfully mounts onto /app/config/server/tls but the tls termination doesn't happen.
Any ideas what I can do that doesn't involve using k8s secrets and passing the values directly from secrets manager to a volume mount?
These are my secretsproviderclass for both values
apiVersion: secrets-store.csi.x-k8s.io/v1 kind: SecretProviderClass metadata: name: argocd-client-secret namespace: ${argocd_ns} spec: provider: aws parameters: objects: | - objectName: *secrets manager arn that contains client_secret* jmesPath: - path: client_secret objectAlias: client_secret
apiVersion: secrets-store.csi.x-k8s.io/v1 kind: SecretProviderClass metadata: name: argocd-tls-cert namespace: ${argocd_ns} spec: provider: aws parameters: objects: | - objectName: *secrets manager arn that contains tls.crt and tls.key* jmesPath: - path: cert objectAlias: tls.crt - path: key objectAlias: tls.key
Beta Was this translation helpful? Give feedback.
All reactions