diff --git a/docs/src/api/builtins/secrets.md b/docs/src/api/builtins/secrets.md index 2ab843ac..b2d19909 100644 --- a/docs/src/api/builtins/secrets.md +++ b/docs/src/api/builtins/secrets.md @@ -276,53 +276,6 @@ Example: Decrypted password: 123 ``` -## secretsForKubernetesConfigFromAws - -Create a Kubernetes -config file out of an AWS EKS cluster -and set it up in the -[KUBECONFIG Environment Variable](https://kubernetes.io/docs/concepts/configuration/). - -Types: - -- secretsForKubernetesConfigFromAws - (`attrsOf secretForKubernetesConfigFromAwsType`): Optional. - Defaults to `{ }`. -- secretForKubernetesConfigFromAwsType (`submodule`): - - cluster (`str`): - AWS EKS Cluster name. - - region (`str`): - AWS Region the EKS cluster is located in. - -Example: - -=== "makes.nix" - - ```nix - { - outputs, - ... - }: { - secretsForKubernetesConfigFromAws = { - myCluster = { - cluster = "makes-k8s"; - region = "us-east-1"; - }; - }; - deployTerraform = { - modules = { - moduleProd = { - setup = [ - outputs."/secretsForKubernetesConfigFromAws/myCluster" - ]; - src = "/my/module1"; - version = "0.14"; - }; - }; - }; - } - ``` - ## secretsForTerraformFromEnv Export secrets in a format suitable for Terraform diff --git a/docs/src/security/threat-model.md b/docs/src/security/threat-model.md index 98d9f21b..229f7902 100644 --- a/docs/src/security/threat-model.md +++ b/docs/src/security/threat-model.md @@ -119,8 +119,7 @@ `secretsForAwsFromEnv`, `secretsForAwsFromGitlab`, `secretsForEnvFromSops`, - `secretsForGpgFromEnv`, - `secretsForKubernetesConfigFromAws`, and + `secretsForGpgFromEnv`, and `secretsForTerraformFromEnv`. However, we don't currently have a way to protect the user diff --git a/src/evaluator/modules/default.nix b/src/evaluator/modules/default.nix index 05e0cccc..f139ac6c 100644 --- a/src/evaluator/modules/default.nix +++ b/src/evaluator/modules/default.nix @@ -28,7 +28,6 @@ (import ./secrets-for-aws-from-gitlab/default.nix args) (import ./secrets-for-env-from-sops/default.nix args) (import ./secrets-for-gpg-from-env/default.nix args) - (import ./secrets-for-kubernetes-config-from-aws/default.nix args) (import ./secrets-for-terraform-from-env/default.nix args) (import ./test-license/default.nix args) (import ./test-terraform/default.nix args) diff --git a/src/evaluator/modules/secrets-for-kubernetes-config-from-aws/default.nix b/src/evaluator/modules/secrets-for-kubernetes-config-from-aws/default.nix deleted file mode 100644 index 79242db1..00000000 --- a/src/evaluator/modules/secrets-for-kubernetes-config-from-aws/default.nix +++ /dev/null @@ -1,31 +0,0 @@ -{ __toModuleOutputs__, makeSecretForKubernetesConfigFromAws, ... }: -{ config, lib, ... }: -let - secretForKubernetesConfigFromAwsType = lib.types.submodule (_: { - options = { - cluster = lib.mkOption { type = lib.types.str; }; - region = lib.mkOption { type = lib.types.str; }; - }; - }); - - makeOutput = name: - { cluster, region, }: { - name = "/secretsForKubernetesConfigFromAws/${name}"; - value = makeSecretForKubernetesConfigFromAws { - inherit cluster; - inherit name; - inherit region; - }; - }; -in { - options = { - secretsForKubernetesConfigFromAws = lib.mkOption { - default = { }; - type = lib.types.attrsOf secretForKubernetesConfigFromAwsType; - }; - }; - config = { - outputs = - __toModuleOutputs__ makeOutput config.secretsForKubernetesConfigFromAws; - }; -}