Skip to content

Commit 17cc8f3

Browse files
authored
feat: add kbs.extraSecrets for non-ESO secrets (#15)
* feat: add kbs.extraSecrets for non-ESO secrets Allow adding pre-existing K8s Secrets to kbsSecretResources without creating ExternalSecrets. Useful for secrets created by imperative jobs or other controllers outside the Vault flow. Signed-off-by: Beraldo Leal <bleal@redhat.com> * chore: bump to 0.2.1 IIUC, the semantic ver is not triggered yet. And we need a 0.2.1 Signed-off-by: Beraldo Leal <bleal@redhat.com> * chore: update docs just a make helm-docs Signed-off-by: Beraldo Leal <bleal@redhat.com> --------- Signed-off-by: Beraldo Leal <bleal@redhat.com>
1 parent 4b0a717 commit 17cc8f3

4 files changed

Lines changed: 13 additions & 2 deletions

File tree

Chart.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,4 +7,4 @@ keywords:
77
- confidential-containers
88
name: trustee
99
# DO NOT EDIT VERSION HERE, IT IS AUTO-GENERATED BY SEMANTIC-RELEASE
10-
version: 0.2.0
10+
version: 0.2.1

README.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# trustee
22

3-
![Version: 0.2.0](https://img.shields.io/badge/Version-0.2.0-informational?style=flat-square)
3+
![Version: 0.2.1](https://img.shields.io/badge/Version-0.2.1-informational?style=flat-square)
44

55
A Helm chart to provide an opinionated deployment of Trustee in a validated pattern
66

@@ -32,6 +32,7 @@ In order to use this chart, you will need to:
3232
| global.coco.securityPolicyFlavour | string | `"insecure"` | |
3333
| global.secretStore.backend | string | `""` | |
3434
| kbs.cosignKeys | string | `"secret/data/hub/coSignKeys"` | |
35+
| kbs.extraSecrets | list | `[]` | |
3536
| kbs.publicKey | string | `"secret/data/hub/kbsPublicKey"` | |
3637
| kbs.secretResources[0].key | string | `"secret/data/hub/kbsres1"` | |
3738
| kbs.secretResources[0].name | string | `"kbsres1"` | |

templates/kbs.yaml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,9 @@ spec:
1414
{{- range .Values.kbs.secretResources }}
1515
- "{{ .name }}"
1616
{{- end }}
17+
{{- range .Values.kbs.extraSecrets }}
18+
- "{{ . }}"
19+
{{- end }}
1720
{{- if eq .Values.global.coco.securityPolicyFlavour "signed" }}
1821
- "cosign-keys"
1922
{{- end }}

values.yaml

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,13 @@ kbs:
3636
key: "secret/data/hub/kbsres1"
3737
- name: "passphrase"
3838
key: "secret/data/hub/passphrase"
39+
# Pre-existing secrets to add to kbsSecretResources without creating
40+
# ExternalSecrets. Use this for secrets that are created outside the
41+
# Vault/ESO flow (e.g. by imperative jobs, cert-manager, or other
42+
# controllers). Only the secret name is needed; the secret must already
43+
# exist in the trustee-operator-system namespace.
44+
extraSecrets: []
45+
3946
# Intel TDX (Trust Domain Extensions) configuration
4047
tdx:
4148
# Enable TDX attestation support

0 commit comments

Comments
 (0)