File tree 4 files changed +9
-0
lines changed
terraform-jx-azurekeyvault
4 files changed +9
-0
lines changed Original file line number Diff line number Diff line change @@ -17,6 +17,7 @@ locals {
17
17
job_secret_env_vars_vault = var. key_vault_enabled ? {
18
18
AZURE_TENANT_ID = module.secrets.tenant_id
19
19
AZURE_SUBSCRIPTION_ID = module.secrets.subscription_id
20
+ AZURE_CLIENT_ID = module.secrets.client_id
20
21
} : {}
21
22
22
23
job_secret_env_vars_ssa = var. server_side_apply_enabled ? {
Original file line number Diff line number Diff line change @@ -115,6 +115,7 @@ module "secrets" {
115
115
source = " ./terraform-jx-azurekeyvault"
116
116
enabled = var. key_vault_enabled
117
117
principal_id = module. cluster . kubelet_identity_id
118
+ kubelet_client_id = module. cluster . kubelet_client_id
118
119
cluster_name = local. cluster_name
119
120
resource_group_name = var. key_vault_resource_group_name
120
121
key_vault_name = var. key_vault_name
Original file line number Diff line number Diff line change @@ -7,3 +7,6 @@ output "tenant_id" {
7
7
output "subscription_id" {
8
8
value = var. enabled ? data. azurerm_subscription . current . subscription_id : " "
9
9
}
10
+ output "client_id" {
11
+ value = var. enabled ? var. kubelet_client_id : " "
12
+ }
Original file line number Diff line number Diff line change @@ -29,6 +29,10 @@ variable "principal_id" {
29
29
type = string
30
30
description = " The id of the service principal that should be granted permission on the key vault"
31
31
}
32
+ variable "kubelet_client_id" {
33
+ type = string
34
+ description = " The client id of the kubelet identity used when authenticating to the key vault"
35
+ }
32
36
variable "secret_map" {
33
37
type = map (string )
34
38
description = " Map of secret keys and values to store in Azure Key Vault"
You can’t perform that action at this time.
0 commit comments