-
Notifications
You must be signed in to change notification settings - Fork 0
justogaiht/kube-vault-nodejs
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
# kube-vault-nodejs > Integrate Vault secrets to your nodejs app authenticating with kuberntes seviceaccounts. ## Environment Setup Install Kubernetes: - [with minikube](https://kubernetes.io/docs/tasks/tools/install-minikube) or - [with minishift](https://docs.okd.io/latest/minishift/getting-started/installing.html) or - [kubectl](https://kubernetes.io/docs/tasks/tools/install-kubectl/) Install Hashicorp Vault: - [on kubernetes](https://testdriven.io/blog/running-vault-and-consul-on-kubernetes/) or - [from vault](https://www.vaultproject.io/docs/install/) you need install [Hashicorp consul](https://www.consul.io/docs/install/index.html) as vault storage ### Vault/K8s Integration Add Kubernetes as vault Auth Method. You will need kube certs and rsa key. > cat /root/.kube/config Decode tokens: > echo <CERT VALUE> | base64 -d ## API USAGE > npm i @ummagumma/kube-vault Setup VaultConfig: ``` typescript const vaultConfig: VaultConfig = { auth: 'KUBERNETES', url: 'https://vault:8200', kubernetes: { service: 'kubernetes-api:6443', serviceAccount: 'default' }, secrets: [ 'myplainsecret.token', 'mySecretFolder/app.pass', 'mySecretFolder/app.token' ] } as VaultConfig; ``` Read claimed secrets: ``` typescript const vaultValues = async () => { let vault = new Vault(vaultConfig); const vaultAuth = await vault.init(); const secretsValues = await vault.readSecrets(); return secretsValues; }; ```
About
Add Vault secrets to your nodejs app using kuberntes seviceaccounts to authenticate.
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published