feat: transition Secrets K8s existants (extraEnvFrom) en attendant Vault root token

This commit is contained in:
dahoud
2026-04-22 14:51:48 +00:00
parent 945a19462c
commit 307c5c84f8
2 changed files with 18 additions and 17 deletions

View File

@@ -16,7 +16,7 @@ sources:
- https://git.lions.dev/lionsdev/unionflow-server-impl-quarkus-k1 # ce repo (deploy) - https://git.lions.dev/lionsdev/unionflow-server-impl-quarkus-k1 # ce repo (deploy)
dependencies: dependencies:
- name: lions-app - name: lions-app
version: "1.0.0" version: "1.0.1"
repository: "https://git.lions.dev/api/packages/lionsdev/helm" repository: "https://git.lions.dev/api/packages/lionsdev/helm"
# Alternative pour dev local sans registry : # Alternative pour dev local sans registry :
# repository: "file://../helm-chart-lions-app" # repository: "file://../helm-chart-lions-app"

View File

@@ -60,10 +60,21 @@ lions-app:
JAVA_OPTS: -Xms256m -Xmx512m JAVA_OPTS: -Xms256m -Xmx512m
# -------------------------------------------------------- # --------------------------------------------------------
# Secrets depuis Vault (via External Secrets Operator) # Secrets — phase de transition : référencer les Secrets K8s existants
#
# TODO: quand Vault root token sera disponible, migrer vers externalSecret.
# Les Secrets existants (db-secret, oidc-secret) seront alors
# régénérés par ESO depuis Vault automatiquement.
# -------------------------------------------------------- # --------------------------------------------------------
extraEnvFrom:
- secretRef:
name: unionflow-server-impl-quarkus-db-secret
- secretRef:
name: unionflow-server-oidc-secret
externalSecret: externalSecret:
enabled: true enabled: false
# Configuration prête pour activation future :
secretStoreRef: secretStoreRef:
kind: ClusterSecretStore kind: ClusterSecretStore
name: vault-backend name: vault-backend
@@ -72,24 +83,14 @@ lions-app:
creationPolicy: Owner creationPolicy: Owner
deletionPolicy: Retain deletionPolicy: Retain
data: data:
# Base de données
- secretKey: QUARKUS_DATASOURCE_USERNAME - secretKey: QUARKUS_DATASOURCE_USERNAME
remoteRef: remoteRef: { key: lions/applications/unionflow-server/db, property: username }
key: lions/applications/unionflow-server/db
property: username
- secretKey: QUARKUS_DATASOURCE_PASSWORD - secretKey: QUARKUS_DATASOURCE_PASSWORD
remoteRef: remoteRef: { key: lions/applications/unionflow-server/db, property: password }
key: lions/applications/unionflow-server/db
property: password
# Keycloak OIDC
- secretKey: KEYCLOAK_CLIENT_SECRET - secretKey: KEYCLOAK_CLIENT_SECRET
remoteRef: remoteRef: { key: lions/applications/unionflow-server/oidc, property: client-secret }
key: lions/applications/unionflow-server/oidc
property: client-secret
- secretKey: KEYCLOAK_ADMIN_SERVICE_SECRET - secretKey: KEYCLOAK_ADMIN_SERVICE_SECRET
remoteRef: remoteRef: { key: lions/applications/unionflow-server/oidc, property: admin-service-secret }
key: lions/applications/unionflow-server/oidc
property: admin-service-secret
# -------------------------------------------------------- # --------------------------------------------------------
# Ingress # Ingress