Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support external secrets for service tokens and xsrf #1373

Merged
merged 1 commit into from
Nov 17, 2023

Conversation

darend
Copy link
Contributor

@darend darend commented Jan 18, 2023

Add support for using external/existing secrets for the following keys:

  • registry.secret
  • jobservice.secret
  • core.secret
  • core.xsrfKey

@zyyw
Copy link
Collaborator

zyyw commented Feb 9, 2023

Thanks for contributing to harbor-helm!
Could you please justify why you would like external secrets for service tokens and xsrf?

@darend
Copy link
Contributor Author

darend commented Feb 9, 2023

Could you please justify why you would like external secrets for service tokens and xsrf?

This is related to previous requests including #189 and #1179. A growing practice is to use gitops to automate deployment of charts (ie: argocd). Without external secret supports the sensitive values will need to be defined in the values file, or rely on the autogenerated helm values. Exposing in the values file is not secure. Relying on autogenerated values can lead to challenges where every run will produce new values for the secrets. This PR will address this limitation for all of the the remaining sensitive values.

@darend
Copy link
Contributor Author

darend commented Feb 23, 2023

Hi @zyyw , do you have any concerns with this change?

@darend darend force-pushed the support-external-secrets branch from 4c5f9d3 to 8e24019 Compare March 13, 2023 19:49
@darend
Copy link
Contributor Author

darend commented Mar 13, 2023

@zyyw I have rebased after chart museum was removed

@cdemers
Copy link

cdemers commented May 25, 2023

Hi! Any progress on that PR? As was said before, It would help users of ArgoCD. Especially as ArgoCD provides a valuable information regarding synchronisation status between what's deployed and what's would be deployed based on git. Having the xsrf regenerated every time we render the Helm template to check if there is drift makes it so that it's either always out of sync, or always synchronizing, which is usually not practical.
Thanks!

@cvegagimenez
Copy link
Contributor

Hi @zyyw ,

any news about this?

@zyyw
Copy link
Collaborator

zyyw commented Nov 16, 2023

@darend sorry for troubling you. Would you mind rebasing the main branch and resolving the conflicts?

I'll create a separate PR based on this one if we haven't heard from you in one week. But credits go to you.
Thank you for contributing to harbor-helm!

@darend
Copy link
Contributor Author

darend commented Nov 16, 2023

Hi @zyyw , I will work on rebasing over the next few days

@zyyw
Copy link
Collaborator

zyyw commented Nov 16, 2023

Sounds great!

@darend darend force-pushed the support-external-secrets branch from 8e24019 to cd6ab34 Compare November 17, 2023 18:05
@darend
Copy link
Contributor Author

darend commented Nov 17, 2023

zyyw it has been rebased

@zyyw
Copy link
Collaborator

zyyw commented Nov 17, 2023

Awesome!

@zyyw zyyw merged commit 626d8e3 into goharbor:main Nov 17, 2023
6 checks passed
@darend darend deleted the support-external-secrets branch November 17, 2023 23:55
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants