Skip to content

Secrets proxy#1109

Open
tr0njavolta wants to merge 7 commits intoupbound:mainfrom
tr0njavolta:secrets-proxy
Open

Secrets proxy#1109
tr0njavolta wants to merge 7 commits intoupbound:mainfrom
tr0njavolta:secrets-proxy

Conversation

@tr0njavolta
Copy link
Member

Description

Type of change

  • Bug fix (typo, broken link, incorrect info)
  • Content update (new info, clarification, reorganization)
  • New content (new page, section, or guide)

Checklist

  • I ran make vale-file FILE=docs/path/to/file.md locally for files changed (or will fix Vale suggestions in review)
  • Links work and point to the right places
  • If this adds new content, I tested the examples/instructions

Additional notes

initial commit

update vale

update placement

update auth
@vercel
Copy link

vercel bot commented Mar 12, 2026

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Actions Updated (UTC)
docs Ready Ready Preview, Comment Mar 12, 2026 7:11pm

Request Review

Copy link
Member

@ezgidemirel ezgidemirel left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @tr0njavolta, this looks great! I left a couple of comments, but it explains the flow very clearly.

name: upbound-provider-aws-iam
spec:
package: xpkg.upbound.io/upbound/provider-aws-iam:v2.2.0
ignoreCrossplaneConstraints: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

no need for this line, since people will use official UXP releases

Comment on lines +212 to +219
---
apiVersion: pkg.crossplane.io/v1
kind: Provider
metadata:
name: upbound-provider-family-aws
spec:
package: xpkg.upbound.io/upbound/provider-family-aws:v2.2.0
ignoreCrossplaneConstraints: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

no need to install family provider separately. we don't need to set the ignoreCrossplaneConstraints so it will be automatically installed

```

```shell
kubectl apply -f providers.yaml
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
kubectl apply -f providers.yaml
kubectl apply -f provider.yaml

secrets were created:
```shell
kubectl get secret -n crossplane-system
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
kubectl get secret -n crossplane-system
kubectl get secret

Comment on lines +63 to +67
vault policy write crossplane-policy - <<'EOF'
path "secret/data/crossplane-system/*" {
capabilities = ["read", "list"]
}
EOF
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
vault policy write crossplane-policy - <<'EOF'
path "secret/data/crossplane-system/*" {
capabilities = ["read", "list"]
}
EOF
vault policy write crossplane - <<EOF
path "secret/*" {
capabilities = ["create", "read", "update", "delete","list"]
}
path "secret/metadata/*" {
capabilities = ["create", "read", "update", "delete","list"]
}
EOF
# allow "secret-store-vault" service account in "crossplane-system" namespace to use "crossplane" policy created above
vault write auth/kubernetes/role/crossplane \
bound_service_account_names="secret-store-vault" \
bound_service_account_namespaces=crossplane-system \
policies=crossplane\
ttl=24h

EOF
```

## Configure Vault Kubernetes auth
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I wouldn't include this section to the doc. They may prefer different authentication methods based on their environments. We can simply say, token based authentication and kubernetes authentication are supported.

If they already have a Vault instance, they new how they can authenticate to it.

<!-- vale Google.Headings = NO -->
## Install the Secret Store add-on

Apply the add-on to deploy the Secrets Proxy backend:
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we may mention that the addon package will not be installed without a valid license

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants