Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Keyvault cleanup - Change variables #1440

Merged
merged 2 commits into from
Sep 5, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 4 additions & 4 deletions scripts/aks/bootstrap.sh
Original file line number Diff line number Diff line change
Expand Up @@ -443,7 +443,7 @@ echo "Bootstrap advanced network for aks instance \"${CLUSTER_NAME}\"... "
SECRET_NAME="radix-clusters"
update_keyvault="true"
K8S_CLUSTER_LIST=$(az keyvault secret show \
--vault-name "${AZ_COMMON_KEYVAULT}" --name "${SECRET_NAME}" \
--vault-name "${AZ_RESOURCE_KEYVAULT}" --name "${SECRET_NAME}" \
--query="value" \
--output tsv | jq '{clusters:.clusters | sort_by(.name | ascii_downcase)}' 2>/dev/null)
temp_file_path="/tmp/$(uuidgen)"
Expand All @@ -455,7 +455,7 @@ if [[ ${update_keyvault} == true ]]; then
EXPIRY_DATE=$(date -u +"%Y-%m-%dT%H:%M:%SZ" --date="$KV_EXPIRATION_TIME")

#printf "\nUpdating keyvault \"%s\"... " "${AZ_RESOURCE_KEYVAULT}"
if [[ "$(az keyvault secret set --name "${SECRET_NAME}" --vault-name "${AZ_COMMON_KEYVAULT}" --value "${new_master_k8s_api_ip_whitelist}" --expires "$EXPIRY_DATE" 2>&1)" == *"ERROR"* ]]; then
if [[ "$(az keyvault secret set --name "${SECRET_NAME}" --vault-name "${AZ_RESOURCE_KEYVAULT}" --value "${new_master_k8s_api_ip_whitelist}" --expires "$EXPIRY_DATE" 2>&1)" == *"ERROR"* ]]; then
printf "\nERROR: Could not update secret in keyvault \"%s\". Exiting..." "${AZ_RESOURCE_KEYVAULT}" >&2
exit 1
fi
Expand All @@ -465,7 +465,7 @@ fi
#Lets run it again interactivly

K8S_CLUSTER_LIST=$(az keyvault secret show \
--vault-name "${AZ_COMMON_KEYVAULT}" --name "${SECRET_NAME}" \
--vault-name "${AZ_RESOURCE_KEYVAULT}" --name "${SECRET_NAME}" \
--query="value" \
--output tsv | jq '{clusters:.clusters | sort_by(.name | ascii_downcase)}' 2>/dev/null)
temp_file_path="/tmp/$(uuidgen)"
Expand All @@ -477,7 +477,7 @@ if [[ ${update_keyvault} == true ]]; then
EXPIRY_DATE=$(date -u +"%Y-%m-%dT%H:%M:%SZ" --date="$KV_EXPIRATION_TIME")

printf "\nUpdating keyvault \"%s\"... " "${AZ_RESOURCE_KEYVAULT}"
if [[ "$(az keyvault secret set --name "${SECRET_NAME}" --vault-name "${AZ_COMMON_KEYVAULT}" --value "${new_master_k8s_api_ip_whitelist}" --expires "$EXPIRY_DATE" 2>&1)" == *"ERROR"* ]]; then
if [[ "$(az keyvault secret set --name "${SECRET_NAME}" --vault-name "${AZ_RESOURCE_KEYVAULT}" --value "${new_master_k8s_api_ip_whitelist}" --expires "$EXPIRY_DATE" 2>&1)" == *"ERROR"* ]]; then
printf "\nERROR: Could not update secret in keyvault \"%s\". Exiting..." "${AZ_RESOURCE_KEYVAULT}" >&2
exit 1
fi
Expand Down
4 changes: 2 additions & 2 deletions scripts/aks/clusterlist.sh
Original file line number Diff line number Diff line change
Expand Up @@ -92,7 +92,7 @@ source ${RADIX_PLATFORM_REPOSITORY_PATH}/scripts/utility/lib_clusterlist.sh
###

K8S_CLUSTER_LIST=$(az keyvault secret show \
--vault-name "${AZ_COMMON_KEYVAULT}" --name "${SECRET_NAME}" \
--vault-name "${AZ_RESOURCE_KEYVAULT}" --name "${SECRET_NAME}" \
--query="value" \
--output tsv | jq '{clusters:.clusters | sort_by(.name | ascii_downcase)}' 2>/dev/null)
temp_file_path="/tmp/$(uuidgen)"
Expand All @@ -104,7 +104,7 @@ if [[ ${update_keyvault} == true ]]; then
EXPIRY_DATE=$(date -u +"%Y-%m-%dT%H:%M:%SZ" --date="$KV_EXPIRATION_TIME")

printf "\nUpdating keyvault \"%s\"... " "${AZ_RESOURCE_KEYVAULT}"
if [[ "$(az keyvault secret set --name "${SECRET_NAME}" --vault-name "${AZ_COMMON_KEYVAULT}" --value "${new_master_k8s_api_ip_whitelist}" --expires "$EXPIRY_DATE" 2>&1)" == *"ERROR"* ]]; then
if [[ "$(az keyvault secret set --name "${SECRET_NAME}" --vault-name "${AZ_RESOURCE_KEYVAULT}" --value "${new_master_k8s_api_ip_whitelist}" --expires "$EXPIRY_DATE" 2>&1)" == *"ERROR"* ]]; then
printf "\nERROR: Could not update secret in keyvault \"%s\". Exiting..." "${AZ_RESOURCE_KEYVAULT}" >&2
exit 1
fi
Expand Down
4 changes: 2 additions & 2 deletions scripts/aks/teardown.sh
Original file line number Diff line number Diff line change
Expand Up @@ -410,7 +410,7 @@ echo "Done."
SECRET_NAME="radix-clusters"
update_keyvault="true"
K8S_CLUSTER_LIST=$(az keyvault secret show \
--vault-name "${AZ_COMMON_KEYVAULT}" --name "${SECRET_NAME}" \
--vault-name "${AZ_RESOURCE_KEYVAULT}" --name "${SECRET_NAME}" \
--query="value" \
--output tsv | jq '{clusters:.clusters | sort_by(.name | ascii_downcase)}' 2>/dev/null)
temp_file_path="/tmp/$(uuidgen)"
Expand All @@ -422,7 +422,7 @@ if [[ ${update_keyvault} == true ]]; then
EXPIRY_DATE=$(date -u +"%Y-%m-%dT%H:%M:%SZ" --date="$KV_EXPIRATION_TIME")

#printf "\nUpdating keyvault \"%s\"... " "${AZ_RESOURCE_KEYVAULT}"
if [[ "$(az keyvault secret set --name "${SECRET_NAME}" --vault-name "${AZ_COMMON_KEYVAULT}" --value "${new_master_k8s_api_ip_whitelist}" --expires "$EXPIRY_DATE" 2>&1)" == *"ERROR"* ]]; then
if [[ "$(az keyvault secret set --name "${SECRET_NAME}" --vault-name "${AZ_RESOURCE_KEYVAULT}" --value "${new_master_k8s_api_ip_whitelist}" --expires "$EXPIRY_DATE" 2>&1)" == *"ERROR"* ]]; then
printf "\nERROR: Could not update secret in keyvault \"%s\". Exiting..." "${AZ_RESOURCE_KEYVAULT}" >&2
exit 1
fi
Expand Down
2 changes: 1 addition & 1 deletion scripts/aks/update_api_server_whitelist.sh
Original file line number Diff line number Diff line change
Expand Up @@ -81,7 +81,7 @@ fi

# Define script variables

SECRET_NAME="kubernetes-api-server-whitelist-ips-${RADIX_ENVIRONMENT}"
SECRET_NAME="kubernetes-api-auth-ip-range"
update_keyvault=false

#######################################################################################
Expand Down
2 changes: 1 addition & 1 deletion scripts/cicd-canary/scaling/create-managed-identity.sh
Original file line number Diff line number Diff line change
Expand Up @@ -176,7 +176,7 @@ rm ${tmp_file_name}
# TODO: DevOps issue 259748, downgrade Contributor role when new role is ready
# https://github.com/equinor/Solum/issues/10900
create_role_assignment_for_identity "${mi_name}" "${AKS_COMMAND_RUNNER_ROLE_NAME}" "/subscriptions/${AZ_SUBSCRIPTION_ID}/resourceGroups/${AZ_RESOURCE_GROUP_CLUSTERS}"
set-kv-policy "${mi_object_id}" "get"
# set-kv-policy "${mi_object_id}" "get"
create-role-and-rolebinding "${WORKDIR_PATH}/role.yaml" "${WORKDIR_PATH}/rolebinding.yaml"
modify-role-binding ${mi_object_id}
add-federated-gh-credentials ${mi_name} "radix-platform" "master"
4 changes: 2 additions & 2 deletions scripts/config-and-secrets/bootstrap-acr.sh
Original file line number Diff line number Diff line change
Expand Up @@ -109,7 +109,7 @@ verify_cluster_access
printf "Installing registry sp secret in k8s cluster...\n"

az keyvault secret download \
--vault-name "$AZ_COMMON_KEYVAULT" \
--vault-name "$AZ_RESOURCE_KEYVAULT" \
--name "radix-cr-cicd" \
--file sp_credentials.json

Expand Down Expand Up @@ -141,7 +141,7 @@ printf "\nDone\n"
printf "Installing app registry secret in k8s cluster...\n"

az keyvault secret download \
--vault-name "$AZ_COMMON_KEYVAULT" \
--vault-name "$AZ_RESOURCE_KEYVAULT" \
--name "${AZ_SYSTEM_USER_APP_REGISTRY_SECRET_KEY}" \
--file acr_password.json

Expand Down
6 changes: 3 additions & 3 deletions scripts/dockerhub/update_docker_auth.sh
Original file line number Diff line number Diff line change
Expand Up @@ -111,7 +111,7 @@ echo -e "Update Docker auth in keyvault:"
echo -e ""
echo -e " > WHERE:"
echo -e " ------------------------------------------------------------------"
echo -e " - AZ_RESOURCE_KEYVAULT : $AZ_COMMON_KEYVAULT"
echo -e " - AZ_RESOURCE_KEYVAULT : $AZ_RESOURCE_KEYVAULT"
echo -e ""
echo -e " > WHAT:"
echo -e " ------------------------------------------------------------------"
Expand Down Expand Up @@ -147,13 +147,13 @@ printf "Updating Docker auth in keyvault... "
EXPIRY_DATE=$(date -u +"%Y-%m-%dT%H:%M:%SZ" --date="$KV_EXPIRATION_TIME") # The secrets have no real expiration date

az keyvault secret set \
--vault-name "${AZ_COMMON_KEYVAULT}" \
--vault-name "${AZ_RESOURCE_KEYVAULT}" \
--name docker-io-auth-username \
--value "${USER_NAME}" \
--expires "${EXPIRY_DATE}" --output none || exit

az keyvault secret set \
--vault-name "${AZ_COMMON_KEYVAULT}" \
--vault-name "${AZ_RESOURCE_KEYVAULT}" \
--name docker-io-auth-access-token \
--value "${ACCESS_TOKEN}" \
--expires "${EXPIRY_DATE}" --output none || exit
Expand Down
12 changes: 6 additions & 6 deletions scripts/flux/bootstrap.sh
Original file line number Diff line number Diff line change
Expand Up @@ -171,7 +171,7 @@ echo -e " - CLUSTER_NAME : $CLUSTER_NAME"
echo -e ""
echo -e " > WHAT:"
echo -e " -------------------------------------------------------------------"
echo -e " - AZ_RESOURCE_KEYVAULT : $AZ_COMMON_KEYVAULT"
echo -e " - AZ_RESOURCE_KEYVAULT : $AZ_RESOURCE_KEYVAULT"
echo -e " - GIT_REPO : $GIT_REPO"
echo -e " - GIT_BRANCH : $GIT_BRANCH"
echo -e " - GIT_DIR : $GIT_DIR"
Expand Down Expand Up @@ -231,8 +231,8 @@ printf "...Done"
### CREDENTIALS
###

FLUX_PRIVATE_KEY="$(az keyvault secret show --name "$FLUX_PRIVATE_KEY_NAME" --vault-name "$AZ_COMMON_KEYVAULT")"
# FLUX_PUBLIC_KEY="$(az keyvault secret show --name "$FLUX_PUBLIC_KEY_NAME" --vault-name "$AZ_COMMON_KEYVAULT")"
FLUX_PRIVATE_KEY="$(az keyvault secret show --name "$FLUX_PRIVATE_KEY_NAME" --vault-name "$AZ_RESOURCE_KEYVAULT")"
# FLUX_PUBLIC_KEY="$(az keyvault secret show --name "$FLUX_PUBLIC_KEY_NAME" --vault-name "$AZ_RESOURCE_KEYVAULT")"

# printf "\nLooking for flux deploy keys for GitHub in keyvault \"${AZ_RESOURCE_KEYVAULT}\"..."
# if [[ -z "$FLUX_PRIVATE_KEY" ]] || [[ -z "$FLUX_PUBLIC_KEY" ]]; then
Expand All @@ -258,7 +258,7 @@ FLUX_PRIVATE_KEY="$(az keyvault secret show --name "$FLUX_PRIVATE_KEY_NAME" --va
# fi

az keyvault secret download \
--vault-name "$AZ_COMMON_KEYVAULT" \
--vault-name "$AZ_RESOURCE_KEYVAULT" \
--name "$FLUX_PRIVATE_KEY_NAME" \
--file "$FLUX_PRIVATE_KEY_NAME" \
2>&1 >/dev/null
Expand All @@ -268,7 +268,7 @@ printf "...Done\n"
# Create secret for Flux v2 to use to authenticate with ACR.
printf "\nCreating k8s secret \"radix-docker\"..."
az keyvault secret download \
--vault-name "$AZ_COMMON_KEYVAULT" \
--vault-name "$AZ_RESOURCE_KEYVAULT" \
--name "radix-cr-cicd" \
--file sp_credentials.json \
2>&1 >/dev/null
Expand Down Expand Up @@ -309,7 +309,7 @@ else
fi

printf "\nGetting Slack Webhook URL..."
SLACK_WEBHOOK_URL="$(az keyvault secret show --vault-name $AZ_RESOURCE_KEYVAULT --name $KV_SECRET_SLACK_WEBHOOK | jq -r .value)"
SLACK_WEBHOOK_URL="$(az keyvault secret show --vault-name $AZ_RESOURCE_KEYVAULT --name slack-webhook | jq -r .value)"
printf "...Done\n"

IMAGE_REGISTRY="${AZ_RESOURCE_CONTAINER_REGISTRY}.azurecr.io"
Expand Down
2 changes: 1 addition & 1 deletion scripts/github_maintenance/bootstrap.sh
Original file line number Diff line number Diff line change
Expand Up @@ -118,7 +118,7 @@ object_id=$(az identity show --name "${MI_GITHUB_MAINTENANCE}-${RADIX_ENVIRONMEN
exit 1
}

set-kv-policy "${object_id}" "get set"
# set-kv-policy "${object_id}" "get set"

namespaces=("default" "ingress-nginx" "radix-web-console-qa" "radix-cicd-canary" "flux-system" "radix-api-qa" "radix-canary-golang-qa" "radix-cost-allocation-api-qa" "radix-platform-qa" "radix-github-webhook-qa" "monitor")

Expand Down
2 changes: 1 addition & 1 deletion scripts/migrate.sh
Original file line number Diff line number Diff line change
Expand Up @@ -669,7 +669,7 @@ if [[ $ENABLE_NOTIFY == true ]]; then
# Notify on slack
echo "Notify on slack"
# Get slack webhook url
SLACK_WEBHOOK_URL="$(az keyvault secret show --vault-name "$AZ_RESOURCE_KEYVAULT" --name "$KV_SECRET_SLACK_WEBHOOK" | jq -r .value)"
SLACK_WEBHOOK_URL="$(az keyvault secret show --vault-name "$AZ_RESOURCE_KEYVAULT" --name slack-webhook | jq -r .value)"
curl -X POST -H 'Content-type: application/json' --data '{"text":"'"$slack_users"' Restore has been completed.","link_names":1}' "$SLACK_WEBHOOK_URL"
fi

Expand Down
7 changes: 3 additions & 4 deletions scripts/radix-zone/radix_zone_c2.env
Original file line number Diff line number Diff line change
Expand Up @@ -63,8 +63,7 @@ AZ_RESOURCE_GROUP_IPPRE="common-${AZ_RADIX_ZONE_LOCATION}"
AZ_REDIS_CACHE_SKU="Standard"

# Shared resources
AZ_RESOURCE_KEYVAULT="radix-vault-${RADIX_ZONE}-${RADIX_ENVIRONMENT}"
AZ_COMMON_KEYVAULT="radix-keyv-${RADIX_ZONE}"
AZ_RESOURCE_KEYVAULT="radix-keyv-${RADIX_ZONE}"
AZ_RESOURCE_MON_KEYVAULT="kv-radix-monitoring-${RADIX_ENVIRONMENT}"
AZ_RESOURCE_ACR_INTERNAL_TASK_NAME="radix-image-builder-internal"

Expand Down Expand Up @@ -117,7 +116,7 @@ MI_AKSKUBELET="radix-id-akskubelet-${RADIX_ZONE}"
### Key vault secrets
###

KV_SECRET_SLACK_WEBHOOK="slack-webhook-${RADIX_ZONE}-${RADIX_ENVIRONMENT}"
# KV_SECRET_SLACK_WEBHOOK="slack-webhook"

KV_EXPIRATION_TIME="12 months"

Expand Down Expand Up @@ -196,7 +195,7 @@ COST_ALLOCATION_API_CONFIG="radixconfig.${RADIX_ZONE}.yaml"
KV_SECRET_SERVICENOW_API_KEY=servicenow-api-key
APP_REGISTRATION_SERVICENOW_CLIENT="ar-radix-servicenow-proxy-client"
APP_REGISTRATION_SERVICENOW_SERVER="ar-radix-servicenow-proxy-server"
KV_SECRET_SERVICENOW_CLIENT_SECRET="ar-radix-servicenow-proxy-client-secret-${RADIX_ZONE}-${RADIX_ENVIRONMENT}"
# KV_SECRET_SERVICENOW_CLIENT_SECRET="ar-radix-servicenow-proxy-client-secret-${RADIX_ZONE}-${RADIX_ENVIRONMENT}"
SERVICE_MANAGEMENT_REFERENCE="110327"

#######################################################################################
Expand Down
5 changes: 2 additions & 3 deletions scripts/radix-zone/radix_zone_dev.env
Original file line number Diff line number Diff line change
Expand Up @@ -66,7 +66,6 @@ AZ_REDIS_CACHE_SKU="Basic"

# Shared resources
AZ_RESOURCE_KEYVAULT="radix-keyv-${RADIX_ZONE}"
AZ_COMMON_KEYVAULT="radix-keyv-${RADIX_ZONE}"
AZ_RESOURCE_MON_KEYVAULT="kv-radix-monitoring-${RADIX_ENVIRONMENT}"
AZ_RESOURCE_ACR_INTERNAL_TASK_NAME="radix-image-builder-internal"

Expand Down Expand Up @@ -120,7 +119,7 @@ MI_GITHUB_MAINTENANCE="radix-github-maintenance"
### Key vault secrets
###

KV_SECRET_SLACK_WEBHOOK="slack-webhook-$RADIX_ZONE"
# KV_SECRET_SLACK_WEBHOOK="slack-webhook"

KV_EXPIRATION_TIME="12 months"

Expand Down Expand Up @@ -198,7 +197,7 @@ COST_ALLOCATION_API_CONFIG="radixconfig.${RADIX_ZONE}.yaml"
KV_SECRET_SERVICENOW_API_KEY=servicenow-api-key
APP_REGISTRATION_SERVICENOW_CLIENT="ar-radix-servicenow-proxy-client"
APP_REGISTRATION_SERVICENOW_SERVER="ar-radix-servicenow-proxy-server"
KV_SECRET_SERVICENOW_CLIENT_SECRET="ar-radix-servicenow-proxy-client-secret-${RADIX_ZONE}-${RADIX_ENVIRONMENT}"
# KV_SECRET_SERVICENOW_CLIENT_SECRET="ar-radix-servicenow-proxy-client-secret-${RADIX_ZONE}-${RADIX_ENVIRONMENT}"
SERVICE_MANAGEMENT_REFERENCE="110327"

#######################################################################################
Expand Down
7 changes: 3 additions & 4 deletions scripts/radix-zone/radix_zone_playground.env
Original file line number Diff line number Diff line change
Expand Up @@ -64,8 +64,7 @@ AZ_RESOURCE_GROUP_IPPRE="common"
AZ_REDIS_CACHE_SKU="Standard"

# Shared resources
AZ_RESOURCE_KEYVAULT="radix-vault-${RADIX_ENVIRONMENT}"
AZ_COMMON_KEYVAULT="radix-keyv-${RADIX_ZONE}"
AZ_RESOURCE_KEYVAULT="radix-keyv-${RADIX_ZONE}"
AZ_RESOURCE_MON_KEYVAULT="kv-radix-monitoring-${RADIX_ENVIRONMENT}"
AZ_RESOURCE_ACR_INTERNAL_TASK_NAME="radix-image-builder-internal"

Expand Down Expand Up @@ -118,7 +117,7 @@ MI_CERT_MANAGER="id-radix-certmanager-${CLUSTER_TYPE}-northeurope"
### Key vault secrets
###

KV_SECRET_SLACK_WEBHOOK="slack-webhook-$RADIX_ZONE"
# KV_SECRET_SLACK_WEBHOOK="slack-webhook"

KV_EXPIRATION_TIME="12 months"

Expand Down Expand Up @@ -196,7 +195,7 @@ COST_ALLOCATION_API_CONFIG="radixconfig.${RADIX_ZONE}.yaml"
KV_SECRET_SERVICENOW_API_KEY=servicenow-api-key
APP_REGISTRATION_SERVICENOW_CLIENT="ar-radix-servicenow-proxy-client"
APP_REGISTRATION_SERVICENOW_SERVER="ar-radix-servicenow-proxy-server"
KV_SECRET_SERVICENOW_CLIENT_SECRET="ar-radix-servicenow-proxy-client-secret-${RADIX_ZONE}-${RADIX_ENVIRONMENT}"
# KV_SECRET_SERVICENOW_CLIENT_SECRET="ar-radix-servicenow-proxy-client-secret-${RADIX_ZONE}-${RADIX_ENVIRONMENT}"
SERVICE_MANAGEMENT_REFERENCE="110327"

#######################################################################################
Expand Down
7 changes: 3 additions & 4 deletions scripts/radix-zone/radix_zone_prod.env
Original file line number Diff line number Diff line change
Expand Up @@ -64,8 +64,7 @@ AZ_RESOURCE_GROUP_IPPRE="common"
AZ_REDIS_CACHE_SKU="Standard"

# Shared resources
AZ_RESOURCE_KEYVAULT="radix-vault-${RADIX_ENVIRONMENT}"
AZ_COMMON_KEYVAULT="radix-keyv-platform"
AZ_RESOURCE_KEYVAULT="radix-keyv-platform"
AZ_RESOURCE_MON_KEYVAULT="kv-radix-monitoring-${RADIX_ENVIRONMENT}"
AZ_RESOURCE_ACR_INTERNAL_TASK_NAME="radix-image-builder-internal"

Expand Down Expand Up @@ -119,7 +118,7 @@ MI_CERT_MANAGER="id-radix-certmanager-${CLUSTER_TYPE}-northeurope"
### Key vault secrets
###

KV_SECRET_SLACK_WEBHOOK="slack-webhook-$RADIX_ZONE"
# KV_SECRET_SLACK_WEBHOOK="slack-webhook"

KV_EXPIRATION_TIME="12 months"

Expand Down Expand Up @@ -199,7 +198,7 @@ COST_ALLOCATION_API_CONFIG="radixconfig.${RADIX_ZONE}.yaml"
KV_SECRET_SERVICENOW_API_KEY=servicenow-api-key
APP_REGISTRATION_SERVICENOW_CLIENT="ar-radix-servicenow-proxy-client"
APP_REGISTRATION_SERVICENOW_SERVER="ar-radix-servicenow-proxy-server"
KV_SECRET_SERVICENOW_CLIENT_SECRET="ar-radix-servicenow-proxy-client-secret-${RADIX_ZONE}-${RADIX_ENVIRONMENT}"
# KV_SECRET_SERVICENOW_CLIENT_SECRET="ar-radix-servicenow-proxy-client-secret-${RADIX_ZONE}-${RADIX_ENVIRONMENT}"
SERVICE_MANAGEMENT_REFERENCE="110327"


Expand Down
2 changes: 1 addition & 1 deletion scripts/service-principals-and-aad-apps/bootstrap.sh
Original file line number Diff line number Diff line change
Expand Up @@ -210,7 +210,7 @@ create_github_resource_lock_operator() {
create_oidc_and_federated_credentials "$APP_REGISTRATION_RESOURCE_LOCK_OPERATOR" "${AZ_SUBSCRIPTION_ID}" "radix-platform" "lock-operations-${RADIX_ENVIRONMENT}"
assign_role "$APP_REGISTRATION_RESOURCE_LOCK_OPERATOR" "Omnia Authorization Locks Operator" "/subscriptions/${AZ_SUBSCRIPTION_ID}/resourceGroups/${AZ_RESOURCE_GROUP_CLUSTERS}"
assign_role "$APP_REGISTRATION_RESOURCE_LOCK_OPERATOR" "Reader" "/subscriptions/${AZ_SUBSCRIPTION_ID}/resourceGroups/${AZ_RESOURCE_GROUP_COMMON}/providers/Microsoft.KeyVault/vaults/${AZ_RESOURCE_KEYVAULT}"
set-kv-policy "$(az ad sp list --filter "displayname eq '$APP_REGISTRATION_RESOURCE_LOCK_OPERATOR'" | jq -r .[].id)" "get"
# set-kv-policy "$(az ad sp list --filter "displayname eq '$APP_REGISTRATION_RESOURCE_LOCK_OPERATOR'" | jq -r .[].id)" "get"
}

if [[ "$RADIX_ENVIRONMENT" == "dev" ]]; then
Expand Down
36 changes: 18 additions & 18 deletions scripts/service-principals-and-aad-apps/lib_managed_identity.sh
Original file line number Diff line number Diff line change
Expand Up @@ -220,24 +220,24 @@ function create-role-and-rolebinding {
printf "Done\n"
}

function set-kv-policy {
local object_id
local permissions

object_id=$1
permissions=$2

printf "Creating vault access policy on %s for %s...\n" "${AZ_RESOURCE_KEYVAULT}" "${object_id}"
az keyvault set-policy \
--name "${AZ_RESOURCE_KEYVAULT}" \
--secret-permissions ${permissions} \
--object-id "${object_id}" \
--only-show-errors >/dev/null || {
echo -e "ERROR: Could not create vault access policy on ${AZ_RESOURCE_KEYVAULT}." >&2
exit 1
}
printf "Done\n"
}
# function set-kv-policy {
# local object_id
# local permissions

# object_id=$1
# permissions=$2

# printf "Creating vault access policy on %s for %s...\n" "${AZ_RESOURCE_KEYVAULT}" "${object_id}"
# az keyvault set-policy \
# --name "${AZ_RESOURCE_KEYVAULT}" \
# --secret-permissions ${permissions} \
# --object-id "${object_id}" \
# --only-show-errors >/dev/null || {
# echo -e "ERROR: Could not create vault access policy on ${AZ_RESOURCE_KEYVAULT}." >&2
# exit 1
# }
# printf "Done\n"
# }

function create-az-role {
local name
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -71,7 +71,7 @@ function update_service_principal_credentials_in_az_keyvault() {
fi

# Upload to keyvault
az keyvault secret set --vault-name "${AZ_COMMON_KEYVAULT}" --name "${name}" --file "${tmp_file_path}" ${expires} 2>&1 >/dev/null
az keyvault secret set --vault-name "${AZ_RESOURCE_KEYVAULT}" --name "${name}" --file "${tmp_file_path}" ${expires} 2>&1 >/dev/null

# Clean up
rm -rf "$tmp_file_path"
Expand Down Expand Up @@ -561,7 +561,7 @@ function delete_service_principal_and_stored_credentials() {
az ad sp delete --id "${id}" --output none

printf "deleting credentials in keyvault..."
az keyvault secret delete --vault-name "${AZ_COMMON_KEYVAULT}" --name "${name}" --output none
az keyvault secret delete --vault-name "${AZ_RESOURCE_KEYVAULT}" --name "${name}" --output none
printf "Done.\n"
}

Expand All @@ -572,13 +572,13 @@ function delete_ad_app_and_stored_credentials() {
printf "Working on ad app \"${name}\": "

# Get id from key vault as trying to use the name is just hopeless for client apps when using cli
app_id="$(az keyvault secret show --vault-name ${AZ_COMMON_KEYVAULT} --name "${name}" | jq -r .value | jq -r .id)"
app_id="$(az keyvault secret show --vault-name ${AZ_RESOURCE_KEYVAULT} --name "${name}" | jq -r .value | jq -r .id)"

printf "deleting app in az ad..."
az ad app delete --id "${app_id}" --output none

printf "deleting credentials in keyvault..."
az keyvault secret delete --vault-name "${AZ_COMMON_KEYVAULT}" --name "${name}" --output none
az keyvault secret delete --vault-name "${AZ_RESOURCE_KEYVAULT}" --name "${name}" --output none
printf "Done.\n"
}

Expand Down
Loading