apiVersion: external-secrets.io/v1beta1 kind: ExternalSecret metadata: name: {{ include "abacus-agent.fullname" . }}-external-secret labels: {{- include "abacus-agent.labels" . | nindent 4 }} spec: secretStoreRef: name: {{ include "abacus-agent.cluster-secret-store.name" . }} kind: ClusterSecretStore refreshInterval: "1h" # The secret that will be created target: name: {{ include "abacus-agent.fullname" . }}-secret template: type: Opaque metadata: labels: {{- include "abacus-agent.labels" . | nindent 10 }} data: {{- if .Values.abacus.aws }} AWS_ACCESS_KEY_ID: {{ print "'{{ .aws_access_key_id | toString }}'" }} AWS_SECRET_ACCESS_KEY: {{ print "'{{ .aws_secret_access_key | toString }}'" }} {{- end }} {{/* RPC URLs */}} OPT_BASE_OUTBOX_CONNECTION_URL: {{ print "'{{ .home_rpc | toString }}'" }} {{/* * For each network, create an environment variable with the RPC endpoint. * The templating of external-secrets will use the data section below to know how * to replace the correct value in the created secret. */}} {{- range .Values.abacus.inboxChains }} OPT_BASE_INBOXES_{{ .name | upper }}_CONNECTION_URL: {{ printf "'{{ .%s_rpc | toString }}'" .name }} {{- end }} data: {{- if .Values.abacus.aws }} - secretKey: aws_access_key_id remoteRef: key: {{ printf "%s-aws-access-key-id" .Values.abacus.runEnv }} - secretKey: aws_secret_access_key remoteRef: key: {{ printf "%s-aws-secret-access-key" .Values.abacus.runEnv }} {{- end }} - secretKey: home_rpc remoteRef: key: {{ printf "%s-rpc-endpoint-%s" .Values.abacus.runEnv .Values.abacus.outboxChain.name }} {{/* * For each network, load the secret in GCP secret manager with the form: environment-rpc-endpoint-network, * and associate it with the secret key networkname_rpc. */}} {{- range .Values.abacus.inboxChains }} - secretKey: {{ printf "%s_rpc" .name }} remoteRef: key: {{ printf "%s-rpc-endpoint-%s" $.Values.abacus.runEnv .name }} {{- end }}