updating to v0.0.3 (#233)
The new version of the agent, can be launched via cattle and run in a k8s environment.
This commit is contained in:
parent
ad23789819
commit
1e281a0c72
@ -1,5 +1,5 @@
|
||||
secrets-bridge:
|
||||
image: rancher/secrets-bridge:v0.0.2
|
||||
image: rancher/secrets-bridge:v0.0.3
|
||||
command: agent --bridge-url ${BRIDGE_URL}
|
||||
volumes:
|
||||
- /var/run/docker.sock:/var/run/docker.sock
|
||||
|
@ -7,7 +7,7 @@ Only works with Hashicorp Vault server in dev mode currently.
|
||||
#### Description:
|
||||
This is the server side component for the Vault Secrets bridge with Rancher. This service should *NOT* be deployed in the same environment as user applications. It will have access to Vault, and compromising it will give the person access to *ALL* secrets available in that environment. It should instead be run in an environment reserved for the team operating Rancher.
|
||||
|
||||
The reason this uses a temporary Cubbyhole token to start the service is that ENV variables do show up in the Rancher API and Docker inspect commands.
|
||||
The reason this uses a temporary Cubbyhole token to start the service is that ENV variables do show up in the Rancher API and Docker inspect commands. That said, if this service fails, the issuing token will expire and all app tokens will also expire.
|
||||
|
||||
#### Pre-reqs:
|
||||
|
||||
|
@ -1,5 +1,5 @@
|
||||
secrets-bridge:
|
||||
image: rancher/secrets-bridge:v0.0.2
|
||||
image: rancher/secrets-bridge:v0.0.3
|
||||
environment:
|
||||
CATTLE_ACCESS_KEY: ${CATTLE_ACCESS_KEY}
|
||||
CATTLE_SECRET_KEY: ${CATTLE_SECRET_KEY}
|
||||
|
Loading…
x
Reference in New Issue
Block a user