Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adding terraform to create resources for csi driver secrets #7047

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 5 additions & 0 deletions infra/azure/terraform/secrets-store-csi-driver/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
# Getting started with secrets-store-csi-driver resource management
The terraform scripts here help create:
- a resource group
- a key vault
- a secret in the key vault
74 changes: 74 additions & 0 deletions infra/azure/terraform/secrets-store-csi-driver/main.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,74 @@
/*
Copyright 2024 The Kubernetes Authors.

Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/

provider "azurerm" {
features {}
}

# Data source to get the current client configuration
data "azurerm_client_config" "current" {}

# TODO: add state maintainence in Azure
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

is this a note for the Azure remote backend?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yep

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
# TODO: add state maintainence in Azure
# TODO: add state maintenance in Azure


# Create a resource group
resource "azurerm_resource_group" "secrets_store_rg" {
name = "secrets-store-csi-driver"
location = "westus2"
tags = {
DO-NOT-DELETE = "contact <[email protected]>"
}
}

# Create a Key Vault
resource "azurerm_key_vault" "secrets_csi_kv" {
name = "secrets-store-csi-e2e"
location = azurerm_resource_group.secrets_store_rg.location
resource_group_name = azurerm_resource_group.secrets_store_rg.name
tenant_id = data.azurerm_client_config.current.tenant_id
sku_name = "standard"

depends_on = [azurerm_resource_group.secrets_store_rg]
}

# Create a Key Vault access policy for the Service Principal
resource "azurerm_key_vault_access_policy" "kv_access_service_principal" {
key_vault_id = azurerm_key_vault.secrets_csi_kv.id
tenant_id = data.azurerm_client_config.current.tenant_id
object_id = data.azurerm_client_config.current.object_id

secret_permissions = [
"Set",
"Get"
]
depends_on = [azurerm_key_vault.secrets_csi_kv]
}

# Create a secret in the Key Vault
resource "azurerm_key_vault_secret" "kv_secret" {
name = "secret1"
value = "test"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe a note here that this is for testing purposes only?

key_vault_id = azurerm_key_vault.secrets_csi_kv.id
depends_on = [azurerm_key_vault.secrets_csi_kv]
}

# To run the Terraform script
output "key_vault_id" {
value = azurerm_key_vault.secrets_csi_kv.id
}

output "key_vault_secret_id" {
value = azurerm_key_vault_secret.kv_secret.id
}