Vladimir Khlyunev | cc648af | 2024-04-25 19:56:40 +0400 | [diff] [blame] | 1 | import yaml |
| 2 | |
| 3 | secrets_template = { |
| 4 | 'apiVersion': 'v1', |
| 5 | 'kind': 'Secret', |
| 6 | 'metadata': { |
| 7 | 'name': 'osh-dev-hidden', |
| 8 | 'namespace': 'openstack', |
| 9 | 'labels': { |
| 10 | "openstack.lcm.mirantis.com/osdpl_secret": 'true' |
| 11 | } |
| 12 | }, |
| 13 | |
| 14 | 'type': 'Opaque', |
| 15 | 'stringData': { |
| 16 | "ca_cert": "", |
| 17 | "api_cert": "", |
| 18 | "api_key": "" |
| 19 | } |
| 20 | } |
| 21 | |
| 22 | data_dict = { |
| 23 | 'kind': 'OpenStackDeploymentSecret', |
| 24 | 'metadata': { |
| 25 | 'name': 'mosk', |
| 26 | 'namespace': 'openstack'}, |
| 27 | "spec": { |
| 28 | "features": { |
| 29 | "ssl": { |
| 30 | "public_endpoints": { |
| 31 | "ca_cert": { |
| 32 | "value_from": { |
| 33 | "secret_key_ref": { |
| 34 | "key": "ca_cert", |
| 35 | "name": "mosk_ssl_keys"} |
| 36 | } |
| 37 | }, |
| 38 | "api_cert": { |
| 39 | "value_from": { |
| 40 | "secret_key_ref": { |
| 41 | "key": "api_cert", "name": "mosk_ssl_keys"} |
| 42 | } |
| 43 | }, |
| 44 | "api_key": { |
| 45 | "value_from": { |
| 46 | "secret_key_ref": { |
| 47 | "key": "api_key", |
| 48 | "name": "mosk_ssl_keys"} |
| 49 | } |
| 50 | }, |
| 51 | } |
| 52 | } |
| 53 | } |
| 54 | } |
| 55 | |
| 56 | } |
| 57 | files = {"ca_cert": "/root/cert/ca.pem", |
| 58 | "api_cert": "/root/cert/server.pem", |
| 59 | "api_key": "/root/cert/server-key.pem"} |
| 60 | for f, path in files.items(): |
| 61 | with open(path, "r") as certfile: |
| 62 | secrets_template["stringData"][f] = certfile.read() |
| 63 | |
Vladimir Khlyunev | e03b04f | 2024-04-26 02:57:02 +0400 | [diff] [blame] | 64 | out_file_path = "/root/bm_mcc_mosk/child/kaas_workloads/osdpl-ssl-secrets.yaml" |
Vladimir Khlyunev | cc648af | 2024-04-25 19:56:40 +0400 | [diff] [blame] | 65 | |
| 66 | with open(out_file_path, "w") as f: |
| 67 | yaml.dump(secrets_template, f) |