chore(argocd): restore ksops integration

This commit is contained in:
David Landry 2024-05-24 23:51:02 -04:00
parent 0e5903b174
commit ba46de6bc2

View file

@ -14,37 +14,38 @@ spec:
secret: secret:
secretName: sops-age secretName: sops-age
# 2. Use an init container to download/copy custom binaries into the emptyDir # 2. Use an init container to download/copy custom binaries into the emptyDir
# initContainers: initContainers:
# - name: install-ksops - name: install-ksops
# image: viaductoss/ksops:v4.3.1 image: viaductoss/ksops:v4.3.1
# command: ["/bin/sh", "-c"] command: ["/bin/sh", "-c"]
# args: args:
# - echo "Installing KSOPS..."; - echo "Installing KSOPS...";
# mv ksops /custom-tools/; mv ksops /custom-tools/;
# mv kustomize /custom-tools/; mv kustomize /custom-tools/;
# echo "Done."; echo "Done.";
# volumeMounts: volumeMounts:
# - mountPath: /custom-tools - mountPath: /custom-tools
# name: custom-tools name: custom-tools
# # 3. Volume mount the custom binary to the bin directory (overriding the existing version) # 3. Volume mount the custom binary to the bin directory (overriding the existing version)
# containers: containers:
# - name: argocd-repo-server - name: argocd-repo-server
# volumeMounts: volumeMounts:
# - mountPath: /usr/local/bin/kustomize - mountPath: /usr/local/bin/kustomize
# name: custom-tools name: custom-tools
# subPath: kustomize subPath: kustomize
# - mountPath: /usr/local/bin/ksops - mountPath: /usr/local/bin/ksops
# name: custom-tools name: custom-tools
# subPath: ksops subPath: ksops
# - name: sops-age - name: sops-age
# readOnly: true readOnly: true
# mountPath: "/.config/sops/age" mountPath: "/.config/sops/age"
env:
- name: XDG_CONFIG_HOME
value: /.config
- name: SOPS_AGE_KEY_FILE
value: /.config/sops/age/keys.txt
env:
- name: XDG_CONFIG_HOME
value: /.config
- name: SOPS_AGE_KEY_FILE
value: /.config/sops/age/keys.txt
## If you use AWS or GCP KMS, don't forget to include the necessary credentials to decrypt the secrets! ## If you use AWS or GCP KMS, don't forget to include the necessary credentials to decrypt the secrets!
# env: # env:
# - name: AWS_ACCESS_KEY_ID # - name: AWS_ACCESS_KEY_ID