@@ -9,6 +9,7 @@ const kubernetesCaCert = process.env.K8S_CA_CERT || 'k8s-ca-certificate-data';
99
1010const appName = process . env . APP_NAME || 'some-app' ;
1111const appServiceAccountSecretToken = process . env . APP_SVC_ACCT_SECRET_TOKEN || 'app-k8s-token' ;
12+ const kubernetesPath = process . env . APP_SVC_ACCT_SECRET_TOKEN || 'kubernetes' ;
1213
1314vault . auths ( )
1415 . then ( ( result ) => {
@@ -19,7 +20,7 @@ vault.auths()
1920 description : 'Kubernetes auth' ,
2021 } ) ;
2122 } )
22- . then ( ( ) => vault . write ( 'auth/kubernetes /config' , {
23+ . then ( ( ) => vault . write ( 'auth/${kubernetesPath} /config' , {
2324 token_reviewer_jwt : vaultServicAccountSecretToken ,
2425 kubernetes_host : kubernetesHostUrl ,
2526 kubernetes_ca_cert : kubernetesCaCert ,
@@ -28,12 +29,12 @@ vault.auths()
2829 name : appName ,
2930 rules : `path "secret/${ appName } /*" { capabilities = ["read"] }` ,
3031 } ) )
31- . then ( ( ) => vault . write ( `auth/kubernetes /role/${ appName } ` , {
32+ . then ( ( ) => vault . write ( `auth/${ kubernetesPath } /role/${ appName } ` , {
3233 bound_service_account_names : appName ,
3334 bound_service_account_namespaces : 'default' ,
3435 policies : appName ,
3536 ttl : '1h' ,
3637 } ) )
37- . then ( ( ) => vault . kubernetesLogin ( { role : appName , jwt : appServiceAccountSecretToken } ) )
38+ . then ( ( ) => vault . kubernetesLogin ( { role : appName , jwt : appServiceAccountSecretToken , kubernetesPath : kubernetesPath } ) )
3839 . then ( console . log )
3940 . catch ( ( err ) => console . error ( err . message ) ) ;
0 commit comments