update secrets bridge (#272)
This commit is contained in:
parent
855af340f7
commit
a00d892288
@ -7,6 +7,10 @@ Only works with Hashicorp Vault server in dev mode currently.
|
||||
#### Description:
|
||||
This is the agent component for the Vault secrets bridge with Rancher. This service will be deployed in the environment running applications that need secrets. This service does not have direct access to Vault, it communicates with the Secrets Bridge server.
|
||||
|
||||
#### Setup
|
||||
|
||||
See [setup guide](https://github.com/rancher/secrets-bridge/blob/master/docs/setup.md)
|
||||
|
||||
#### Pre-reqs:
|
||||
|
||||
An instance of Secrets Bridge server running.
|
||||
|
@ -1,5 +1,5 @@
|
||||
secrets-bridge:
|
||||
image: rancher/secrets-bridge:v0.0.3
|
||||
image: rancher/secrets-bridge:v0.1.0
|
||||
command: agent --bridge-url ${BRIDGE_URL}
|
||||
volumes:
|
||||
- /var/run/docker.sock:/var/run/docker.sock
|
||||
|
@ -9,6 +9,10 @@ Only works with Hashicorp Vault server in dev mode currently.
|
||||
|
||||
The reason this uses a temporary Cubbyhole token to start the service is that ENV variables do show up in the Rancher API and Docker inspect commands. That said, if this service fails, the issuing token will expire and all app tokens will also expire.
|
||||
|
||||
#### Setup
|
||||
|
||||
See [setup guide](https://github.com/rancher/secrets-bridge/blob/master/docs/setup.md)
|
||||
|
||||
#### Pre-reqs:
|
||||
|
||||
A Vault server in Dev mode.
|
||||
|
@ -1,5 +1,5 @@
|
||||
secrets-bridge:
|
||||
image: rancher/secrets-bridge:v0.0.3
|
||||
image: rancher/secrets-bridge:v0.1.0
|
||||
environment:
|
||||
CATTLE_ACCESS_KEY: ${CATTLE_ACCESS_KEY}
|
||||
CATTLE_SECRET_KEY: ${CATTLE_SECRET_KEY}
|
||||
|
Loading…
x
Reference in New Issue
Block a user