From 2ab9a9e2745685f5b9b82d9b2e55945fc7612a1d Mon Sep 17 00:00:00 2001 From: Joonas Bergius Date: Tue, 30 Jul 2024 23:18:00 -0500 Subject: [PATCH] feat: Add helm chart for secrets-vault Signed-off-by: Joonas Bergius --- .../wasmcloud-secrets-vault/.helmignore | 23 ++++ .../charts/wasmcloud-secrets-vault/Chart.yaml | 24 ++++ .../templates/NOTES.txt | 0 .../templates/_helpers.tpl | 62 +++++++++++ .../templates/deployment.yaml | 79 +++++++++++++ .../templates/service.yaml | 15 +++ .../templates/serviceaccount.yaml | 13 +++ .../wasmcloud-secrets-vault/values.yaml | 105 ++++++++++++++++++ 8 files changed, 321 insertions(+) create mode 100644 secrets/secrets-vault/charts/wasmcloud-secrets-vault/.helmignore create mode 100644 secrets/secrets-vault/charts/wasmcloud-secrets-vault/Chart.yaml create mode 100644 secrets/secrets-vault/charts/wasmcloud-secrets-vault/templates/NOTES.txt create mode 100644 secrets/secrets-vault/charts/wasmcloud-secrets-vault/templates/_helpers.tpl create mode 100644 secrets/secrets-vault/charts/wasmcloud-secrets-vault/templates/deployment.yaml create mode 100644 secrets/secrets-vault/charts/wasmcloud-secrets-vault/templates/service.yaml create mode 100644 secrets/secrets-vault/charts/wasmcloud-secrets-vault/templates/serviceaccount.yaml create mode 100644 secrets/secrets-vault/charts/wasmcloud-secrets-vault/values.yaml diff --git a/secrets/secrets-vault/charts/wasmcloud-secrets-vault/.helmignore b/secrets/secrets-vault/charts/wasmcloud-secrets-vault/.helmignore new file mode 100644 index 0000000..0e8a0eb --- /dev/null +++ b/secrets/secrets-vault/charts/wasmcloud-secrets-vault/.helmignore @@ -0,0 +1,23 @@ +# Patterns to ignore when building packages. +# This supports shell glob matching, relative path matching, and +# negation (prefixed with !). Only one pattern per line. +.DS_Store +# Common VCS dirs +.git/ +.gitignore +.bzr/ +.bzrignore +.hg/ +.hgignore +.svn/ +# Common backup files +*.swp +*.bak +*.tmp +*.orig +*~ +# Various IDEs +.project +.idea/ +*.tmproj +.vscode/ diff --git a/secrets/secrets-vault/charts/wasmcloud-secrets-vault/Chart.yaml b/secrets/secrets-vault/charts/wasmcloud-secrets-vault/Chart.yaml new file mode 100644 index 0000000..14920e3 --- /dev/null +++ b/secrets/secrets-vault/charts/wasmcloud-secrets-vault/Chart.yaml @@ -0,0 +1,24 @@ +apiVersion: v2 +name: wasmcloud-secrets-vault +description: A Helm chart for deploying wasmCloud secrets implementation for Vault KV version 2 + +# A chart can be either an 'application' or a 'library' chart. +# +# Application charts are a collection of templates that can be packaged into versioned archives +# to be deployed. +# +# Library charts provide useful utilities or functions for the chart developer. They're included as +# a dependency of application charts to inject those utilities and functions into the rendering +# pipeline. Library charts do not define any templates and therefore cannot be deployed. +type: application + +# This is the chart version. This version number should be incremented each time you make changes +# to the chart and its templates, including the app version. +# Versions are expected to follow Semantic Versioning (https://semver.org/) +version: 0.1.0 + +# This is the version number of the application being deployed. This version number should be +# incremented each time you make changes to the application. Versions are not expected to +# follow Semantic Versioning. They should reflect the version the application is using. +# It is recommended to use it with quotes. +appVersion: "0.1.0" diff --git a/secrets/secrets-vault/charts/wasmcloud-secrets-vault/templates/NOTES.txt b/secrets/secrets-vault/charts/wasmcloud-secrets-vault/templates/NOTES.txt new file mode 100644 index 0000000..e69de29 diff --git a/secrets/secrets-vault/charts/wasmcloud-secrets-vault/templates/_helpers.tpl b/secrets/secrets-vault/charts/wasmcloud-secrets-vault/templates/_helpers.tpl new file mode 100644 index 0000000..607847e --- /dev/null +++ b/secrets/secrets-vault/charts/wasmcloud-secrets-vault/templates/_helpers.tpl @@ -0,0 +1,62 @@ +{{/* +Expand the name of the chart. +*/}} +{{- define "wasmcloud-secrets-vault.name" -}} +{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" }} +{{- end }} + +{{/* +Create a default fully qualified app name. +We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). +If release name contains chart name it will be used as a full name. +*/}} +{{- define "wasmcloud-secrets-vault.fullname" -}} +{{- if .Values.fullnameOverride }} +{{- .Values.fullnameOverride | trunc 63 | trimSuffix "-" }} +{{- else }} +{{- $name := default .Chart.Name .Values.nameOverride }} +{{- if contains $name .Release.Name }} +{{- .Release.Name | trunc 63 | trimSuffix "-" }} +{{- else }} +{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" }} +{{- end }} +{{- end }} +{{- end }} + +{{/* +Create chart name and version as used by the chart label. +*/}} +{{- define "wasmcloud-secrets-vault.chart" -}} +{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" }} +{{- end }} + +{{/* +Common labels +*/}} +{{- define "wasmcloud-secrets-vault.labels" -}} +helm.sh/chart: {{ include "wasmcloud-secrets-vault.chart" . }} +{{ include "wasmcloud-secrets-vault.selectorLabels" . }} +{{- if .Chart.AppVersion }} +app.kubernetes.io/version: {{ .Chart.AppVersion | quote }} +{{- end }} +app.kubernetes.io/managed-by: {{ .Release.Service }} +{{- end }} + +{{/* +Selector labels +*/}} +{{- define "wasmcloud-secrets-vault.selectorLabels" -}} +app.kubernetes.io/name: {{ include "wasmcloud-secrets-vault.name" . }} +app.kubernetes.io/instance: {{ .Release.Name }} +{{- end }} + +{{/* +Create the name of the service account to use +*/}} +{{- define "wasmcloud-secrets-vault.serviceAccountName" -}} +{{- if .Values.serviceAccount.create }} +{{- default (include "wasmcloud-secrets-vault.fullname" .) .Values.serviceAccount.name }} +{{- else }} +{{- default "default" .Values.serviceAccount.name }} +{{- end }} +{{- end }} diff --git a/secrets/secrets-vault/charts/wasmcloud-secrets-vault/templates/deployment.yaml b/secrets/secrets-vault/charts/wasmcloud-secrets-vault/templates/deployment.yaml new file mode 100644 index 0000000..ff293da --- /dev/null +++ b/secrets/secrets-vault/charts/wasmcloud-secrets-vault/templates/deployment.yaml @@ -0,0 +1,79 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: {{ include "wasmcloud-secrets-vault.fullname" . }} + labels: + {{- include "wasmcloud-secrets-vault.labels" . | nindent 4 }} +spec: + replicas: {{ .Values.replicas }} + selector: + matchLabels: + {{- include "wasmcloud-secrets-vault.selectorLabels" . | nindent 6 }} + template: + metadata: + {{- with .Values.podAnnotations }} + annotations: + {{- toYaml . | nindent 8 }} + {{- end }} + labels: + {{- include "wasmcloud-secrets-vault.labels" . | nindent 8 }} + {{- with .Values.podLabels }} + {{- toYaml . | nindent 8 }} + {{- end }} + spec: + {{- with .Values.imagePullSecrets }} + imagePullSecrets: + {{- toYaml . | nindent 8 }} + {{- end }} + serviceAccountName: {{ include "wasmcloud-secrets-vault.serviceAccountName" . }} + securityContext: + {{- toYaml .Values.podSecurityContext | nindent 8 }} + containers: + - name: {{ .Chart.Name }} + securityContext: + {{- toYaml .Values.securityContext | nindent 12 }} + image: "{{ .Values.image.repository }}:{{ .Values.image.tag | default .Chart.AppVersion }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + env: + - name: SV_VAULT_ADDRESS + value: {{ .Values.config.vault.address }} + - name: SV_VAULT_AUTH_METHOD + value: {{ .Values.config.vault.auth_method_path }} + - name: SV_JWT_AUTH_AUDIENCE + value: {{ .Values.config.vault.jwt_auth_audience }} + - name: SV_VAULT_DEFAULT_SECRET_ENGINE + value: {{ .Values.config.vault.secret_engine_path }} + - name: SV_SERVICE_NAME + value: {{ .Values.config.service_name }} + - name: SV_SECRETS_PREFIX + value: {{ .Values.config.secrets_prefix }} + - name: SV_SERVER_XKEY_SEED + value: {{ .Values.config.xkey_seed }} + - name: SV_SERVER_NKEY_SEED + value: {{ .Values.config.nkey_seed }} + - name: SV_JWKS_ADDRESS + value: {{ .Values.config.jwks_address }} + - name: SV_NATS_ADDRESS + value: {{ .Values.config.nats.address }} + ports: + - name: http + containerPort: {{ .Values.service.port }} + protocol: TCP + livenessProbe: + {{- toYaml .Values.livenessProbe | nindent 12 }} + readinessProbe: + {{- toYaml .Values.readinessProbe | nindent 12 }} + resources: + {{- toYaml .Values.resources | nindent 12 }} + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- with .Values.affinity }} + affinity: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- with .Values.tolerations }} + tolerations: + {{- toYaml . | nindent 8 }} + {{- end }} diff --git a/secrets/secrets-vault/charts/wasmcloud-secrets-vault/templates/service.yaml b/secrets/secrets-vault/charts/wasmcloud-secrets-vault/templates/service.yaml new file mode 100644 index 0000000..ca53d2e --- /dev/null +++ b/secrets/secrets-vault/charts/wasmcloud-secrets-vault/templates/service.yaml @@ -0,0 +1,15 @@ +apiVersion: v1 +kind: Service +metadata: + name: {{ include "wasmcloud-secrets-vault.fullname" . }} + labels: + {{- include "wasmcloud-secrets-vault.labels" . | nindent 4 }} +spec: + type: {{ .Values.service.type }} + ports: + - port: {{ .Values.service.port }} + targetPort: http + protocol: TCP + name: http + selector: + {{- include "wasmcloud-secrets-vault.selectorLabels" . | nindent 4 }} diff --git a/secrets/secrets-vault/charts/wasmcloud-secrets-vault/templates/serviceaccount.yaml b/secrets/secrets-vault/charts/wasmcloud-secrets-vault/templates/serviceaccount.yaml new file mode 100644 index 0000000..023d242 --- /dev/null +++ b/secrets/secrets-vault/charts/wasmcloud-secrets-vault/templates/serviceaccount.yaml @@ -0,0 +1,13 @@ +{{- if .Values.serviceAccount.create -}} +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ include "wasmcloud-secrets-vault.serviceAccountName" . }} + labels: + {{- include "wasmcloud-secrets-vault.labels" . | nindent 4 }} + {{- with .Values.serviceAccount.annotations }} + annotations: + {{- toYaml . | nindent 4 }} + {{- end }} +automountServiceAccountToken: {{ .Values.serviceAccount.automount }} +{{- end }} diff --git a/secrets/secrets-vault/charts/wasmcloud-secrets-vault/values.yaml b/secrets/secrets-vault/charts/wasmcloud-secrets-vault/values.yaml new file mode 100644 index 0000000..50ae3bd --- /dev/null +++ b/secrets/secrets-vault/charts/wasmcloud-secrets-vault/values.yaml @@ -0,0 +1,105 @@ +config: + jwks_address: "" + service_name: "" + secrets_prefix: "" + # TODO: Move these out to a secret reference + nkey_seed: "" + xkey_seed: "" + + nats: + address: "" + jwt: "" + seed: "" + + vault: + address: "" + auth_method_path: "" + jwt_auth_audience: "" + secret_engine_path: "" + defaultRoleName: "" + defaultAuthMethodPath: "" + defaultSecretEnginePath: "" + +replicas: 1 + +image: + repository: ghcr.io/wasmcloud/contrib/secrets-vault + pullPolicy: IfNotPresent + # Overrides the image tag whose default is the chart appVersion. + tag: "" + +imagePullSecrets: [] +nameOverride: "" +fullnameOverride: "" + +serviceAccount: + # Specifies whether a service account should be created + create: true + # Automatically mount a ServiceAccount's API credentials? + automount: true + # Annotations to add to the service account + annotations: {} + # The name of the service account to use. + # If not set and create is true, a name is generated using the fullname template + name: "" + +podAnnotations: {} +podLabels: {} + +podSecurityContext: {} + # fsGroup: 2000 + +securityContext: {} + # capabilities: + # drop: + # - ALL + # readOnlyRootFilesystem: true + # runAsNonRoot: true + # runAsUser: 1000 + +service: + type: ClusterIP + port: 3000 + +ingress: + enabled: false + className: "" + annotations: {} + # kubernetes.io/ingress.class: nginx + # kubernetes.io/tls-acme: "true" + hosts: + - host: chart-example.local + paths: + - path: / + pathType: ImplementationSpecific + tls: [] + # - secretName: chart-example-tls + # hosts: + # - chart-example.local + +resources: {} + # We usually recommend not to specify default resources and to leave this as a conscious + # choice for the user. This also increases chances charts run on environments with little + # resources, such as Minikube. If you do want to specify resources, uncomment the following + # lines, adjust them as necessary, and remove the curly braces after 'resources:'. + # limits: + # cpu: 100m + # memory: 128Mi + # requests: + # cpu: 100m + # memory: 128Mi + +livenessProbe: + httpGet: + path: /.well-known/keys + port: http +readinessProbe: + httpGet: + path: /.well-known/keys + port: http + +nodeSelector: {} + +tolerations: [] + +affinity: {}