Skip to content

Commit 2d02b29

Browse files
committed
Add example commands for checking secret value.
1 parent 5a2fe70 commit 2d02b29

File tree

1 file changed

+10
-2
lines changed

1 file changed

+10
-2
lines changed

README.org

+10-2
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ oc --namespace vplugindemo create -f 2-argocd/configmap-plugin.yaml
9999

100100
With vault deployed, configured and our argocd vault plugin configured, let's now deploy the OpenShift GitOps operator.
101101

102-
Note: The below operator subscription is pinned specifically to ~v1.8.3~ from the ~gitops-1.8~ release channel.
102+
Note: The below operator subscription is pinned specifically to ~v1.11.0~ from the ~gitops-1.11~ release channel.
103103

104104
#+NAME: Deploy openshift gitops operator
105105
#+BEGIN_SRC bash
@@ -117,9 +117,17 @@ oc --namespace vplugindemo create -f 2-argocd/crd-argocd.yaml
117117

118118
* Step 6 - Create argocd application
119119

120-
Once argo is running, create this baseline sample application. This will create a secret resource on the cluster that will have the default placeholder values replaced with values that come from vault! 🎉
120+
Once argo is running, create this baseline sample application. This will create a ~secret~ resource on the cluster that will have the default placeholder values replaced with values that come from vault! 🎉
121121

122122
#+NAME: Create example application
123123
#+BEGIN_SRC: bash
124124
oc --namespace vplugindemo create -f 2-argocd/application-example.yaml
125125
#+END_SRC
126+
127+
Once the application has been created it should automatically sync. We can check the contents of the secret as follows:
128+
129+
#+NAME: Review secret contents
130+
#+BEGIN_SRC: bash
131+
oc get secret example-secret -o jsonpath={.data.username} | base64 --decode
132+
oc get secret example-secret -o jsonpath={.data.password} | base64 --decode
133+
#+END_SRC

0 commit comments

Comments
 (0)