This component generates a bash sourceable cache file from some secret definitions by communicating with the central part of this component via beam.
This enables secure generation and validation of secret tokens like Open ID Connect secrets.
services:
local:
image: samply/secret-sync-local:latest
environment:
# See below for the format specification
- SECRET_DEFINITIONS=${ARGS}
# The beam app id of the secret sync central component that answers OIDC requests (optional)
- OIDC_PROVIDER=${OIDC_PROVIDER_APP_ID}
# The beam app id of the secret sync central component that answers GitLab project access token requests (optional)
- GITLAB_PROJECT_ACCESS_TOKEN_PROVIDER=app2.proxy2.broker
# Required args for the beam proxy for more options look at the beam Readme
- PROXY_ID=proxy1.broker
- BROKER_URL=${BROKER_URL}
volumes:
# Path can be configuard via CACHE_PATH this container path is the default
- ${CACHE_PATH}:/usr/local/cache
# Used for the embedded beam proxy
secrets:
- privkey.pem
- root.crt.pem
SECRET_DEFINITIONS
should be \x1E
(Ascii record separator) delimited list of secret definitions.
A secret definition is a :
separated 3-tuple. The first value is the secret type which defines how the secret is generated. The second argument is the secrets name which will be the name written to the secrets cache file. The third value is the data used to generate the secret which depends on the secret type used.
services:
central:
image: samply/secret-sync-central:latest
environment:
# Url of the local beam proxy
- BEAM_URL=http://proxy:8082
# App id of this beam app
- BEAM_ID=secret-sync.central.broker
- BEAM_SECRET=${BEAM_SECRET_FOR_THIS_APP}
# Optional keycloak parameters
- KEYCLOAK_URL=http://keycloak:8080
# Client id of the keycloak client which has to have permissions to create clients
- KEYCLOAK_ID=my_keycloak_admin
# The client secret for the client
- KEYCLOAK_SECRET=my_secret
# Extra service account roles for the private client
- KEYCLOAK_SERVICE_ACCOUNT_ROLES=query-users,query-groups
# Optional GitLab parameters
# The base URL for API calls, e.g. "https://gitlab.com/"
- GITLAB_URL=
# A long-living personal (or impersonation) access token that is used to create short-living project access tokens. Requires at least the "api" scope. Note that group access tokens and project access tokens cannot be used to create project access tokens.
- GITLAB_API_ACCESS_TOKEN=
Register an Open ID Connect client at the central half of this component.
Secret type: OIDC
Each argument is separated by a semicolon. The arguments are:
- The type of OIDC client which gets created. Either
public
orprivate
- A comma separated list of urls permitted for redirection
Example:
OIDC:MY_OIDC_CLIENT_SECRET:public;https://foo.com,https://bar.com
Create a GitLab project access token for read access (git clone/pull) to the bridgehead configuration repository.
Secret type: GitLabProjectAccessToken
The argument is always bridgehead-configuration
.
Example: GitLabProjectAccessToken:GIT_CONFIG_REPO_TOKEN:bridgehead-configuration