Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feat/external secrets #150

Closed
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
132 commits
Select commit Hold shift + click to select a range
f82483c
dev environment
flashguerdon Nov 16, 2023
aa40d68
comment out credentials
flashguerdon Nov 16, 2023
9217987
helmignore
flashguerdon Nov 17, 2023
0d4d26d
helmignore
flashguerdon Nov 17, 2023
0093dbd
fix invalide type error
flashguerdon Nov 17, 2023
8be19f0
fix invalide type error
flashguerdon Nov 17, 2023
1b9058f
fix invalide type error
flashguerdon Nov 17, 2023
c873438
remove elasticsearch
flashguerdon Nov 17, 2023
f3a4bdc
enable for aws
flashguerdon Nov 17, 2023
5fb6a44
enable for aws
flashguerdon Nov 17, 2023
971fa29
use default portal image
flashguerdon Nov 17, 2023
1af126b
es
flashguerdon Nov 17, 2023
7a840e9
enable aws
flashguerdon Nov 20, 2023
6682354
sower credential commented out for testing
flashguerdon Nov 20, 2023
cf1ef4f
reverse proxy - aws
flashguerdon Nov 20, 2023
676d543
disable global aws
flashguerdon Nov 20, 2023
daaebe8
reverse proxy
flashguerdon Nov 20, 2023
587a3b7
pelican bucket
flashguerdon Nov 20, 2023
f6e3b02
pelican bucket
flashguerdon Nov 20, 2023
1bee68c
not dev
flashguerdon Nov 20, 2023
51ca16c
disable wts
flashguerdon Nov 20, 2023
e991b8e
disable sower
flashguerdon Nov 20, 2023
1e832a7
disable sheepdog
flashguerdon Nov 20, 2023
d05258e
portal default image and dev env
flashguerdon Nov 20, 2023
d30375e
sheep dog
flashguerdon Nov 20, 2023
d44627f
disable aws
flashguerdon Nov 20, 2023
bb9b433
dev env
flashguerdon Nov 20, 2023
1c8c40e
hostname
flashguerdon Nov 20, 2023
13832d5
remove alb
flashguerdon Nov 21, 2023
61bbc79
portal image:
flashguerdon Nov 21, 2023
ce0f7fe
update image
flashguerdon Nov 21, 2023
d71f789
update image
flashguerdon Nov 21, 2023
c6d0fb5
db persistence
flashguerdon Nov 21, 2023
f29fbd6
dictionary url
flashguerdon Nov 21, 2023
06dda01
portal image
flashguerdon Nov 22, 2023
f5d2707
peregrine image
flashguerdon Nov 22, 2023
f1c93cb
peregrine image
flashguerdon Nov 22, 2023
61c5174
peregrine image
flashguerdon Nov 22, 2023
cd8084d
hardcode testing passwords
flashguerdon Nov 22, 2023
85653be
hardcode testing passwords
flashguerdon Nov 22, 2023
6570087
hardcode testing passwords
flashguerdon Nov 22, 2023
9a4103d
portal and peregrine images
flashguerdon Nov 22, 2023
3ae1072
peregrine images
flashguerdon Nov 22, 2023
1c83b70
secrets manager
flashguerdon Dec 1, 2023
9d6b261
secrets manager
flashguerdon Dec 1, 2023
364919f
secrets manager
flashguerdon Dec 1, 2023
fdfb9ab
update values
flashguerdon Dec 1, 2023
5caa0a9
fix typo
flashguerdon Dec 1, 2023
ab397ee
fix typo
flashguerdon Dec 1, 2023
72f309d
fix typo
flashguerdon Dec 1, 2023
c2d7746
fix typo
flashguerdon Dec 1, 2023
aab6851
fix typo
flashguerdon Dec 1, 2023
8d76ad5
fix typo
flashguerdon Dec 1, 2023
c06d805
fix typo
flashguerdon Dec 1, 2023
c615a89
fix typo
flashguerdon Dec 1, 2023
bbe4883
fix typo
flashguerdon Dec 1, 2023
38a2a5d
fix typo
flashguerdon Dec 1, 2023
b34f1fa
updates
flashguerdon Dec 1, 2023
a5d0cae
updates
flashguerdon Dec 1, 2023
b7f0731
updates
flashguerdon Dec 1, 2023
f552f6c
updates
flashguerdon Dec 1, 2023
4eb18d6
updates
flashguerdon Dec 1, 2023
a97fe13
updates
flashguerdon Dec 1, 2023
d98d354
updates
flashguerdon Dec 1, 2023
070c7d7
update secrets
flashguerdon Dec 1, 2023
af288cc
secrets manager
flashguerdon Dec 3, 2023
a286b70
comment unused properties
flashguerdon Dec 3, 2023
2fb0953
code fix
flashguerdon Dec 3, 2023
e7aa321
sower pelican bucket
flashguerdon Dec 3, 2023
877a2b5
pelican aws access keys
flashguerdon Dec 3, 2023
3bc4623
error converting YAML to JSON: yaml: line 9: could not find expected ':'
flashguerdon Dec 3, 2023
1decf75
pelican aws access keys
flashguerdon Dec 3, 2023
c7631f2
add namespace
flashguerdon Dec 4, 2023
b12e839
add namespace
flashguerdon Dec 4, 2023
f91edcb
remove portal and guppy
flashguerdon Dec 4, 2023
b6b40a8
enable portal
flashguerdon Dec 4, 2023
e1b5b81
external secrets
flashguerdon Dec 6, 2023
99f8a53
external secrets
flashguerdon Dec 7, 2023
d6b85c0
update defaults
flashguerdon Dec 7, 2023
2495b64
add env folder
flashguerdon Dec 8, 2023
08375d2
add env folder
flashguerdon Dec 8, 2023
5174520
add env folder
flashguerdon Dec 8, 2023
cbb54ef
add env folder
flashguerdon Dec 8, 2023
3c4e30e
values updates
flashguerdon Dec 8, 2023
94b8c01
values updates
flashguerdon Dec 8, 2023
deb9db7
values updates
flashguerdon Dec 8, 2023
c56660c
values updates
flashguerdon Dec 8, 2023
16bd406
values updates
flashguerdon Dec 8, 2023
ab49d25
values updates
flashguerdon Dec 8, 2023
0bcd5ec
env secrets values
flashguerdon Dec 8, 2023
b97b305
env secrets values
flashguerdon Dec 8, 2023
2be45ab
env secrets values
flashguerdon Dec 8, 2023
6265a08
env secrets values
flashguerdon Dec 8, 2023
fcb098c
enable services
flashguerdon Dec 8, 2023
9991fdc
fix chart.yaml
flashguerdon Dec 10, 2023
8d7ce88
fence volumes
flashguerdon Dec 22, 2023
d632cb6
fence volumes
flashguerdon Dec 22, 2023
5c11491
fence volumes
flashguerdon Dec 22, 2023
16a3a7a
fence volumes
flashguerdon Dec 22, 2023
9b33318
fence volumes
flashguerdon Dec 22, 2023
fada4f4
fence volumes
flashguerdon Dec 22, 2023
209cf08
openid
flashguerdon Dec 22, 2023
324accd
openid
flashguerdon Dec 22, 2023
2894ece
openid
flashguerdon Dec 22, 2023
965b675
openid
flashguerdon Dec 22, 2023
23f7eb7
openid
flashguerdon Dec 22, 2023
34b2519
openid
flashguerdon Dec 22, 2023
9a257f4
openid
flashguerdon Dec 22, 2023
26e4355
openid
flashguerdon Dec 23, 2023
2c12a4c
openid
flashguerdon Dec 23, 2023
6966a00
openid
flashguerdon Dec 23, 2023
800e29a
openid
flashguerdon Dec 23, 2023
ecc1f6d
openid
flashguerdon Dec 23, 2023
72dcb1b
openid
flashguerdon Dec 23, 2023
f50c096
openid
flashguerdon Dec 23, 2023
df1a7c2
openid
flashguerdon Dec 23, 2023
1dfdac4
openid
flashguerdon Dec 23, 2023
85e48bf
openid
flashguerdon Dec 23, 2023
75fee63
openid
flashguerdon Dec 23, 2023
11eba7f
openid
flashguerdon Dec 23, 2023
903f6cb
openid
flashguerdon Dec 23, 2023
580278b
openid
flashguerdon Dec 23, 2023
09cfd19
openid
flashguerdon Dec 23, 2023
5ab94c4
secrets volume
flashguerdon Dec 23, 2023
116902a
secrets volume
flashguerdon Dec 23, 2023
e9a1d82
comments
flashguerdon Jan 2, 2024
69cbcf8
fence default refresh
flashguerdon Jan 4, 2024
07bb189
Merge branch 'master' into feat/external-secrets
flashguerdon Jan 4, 2024
1b5f540
update dependency
flashguerdon Jan 4, 2024
506c7d6
Read me
flashguerdon Jan 4, 2024
afdd8ad
removed environment folder
flashguerdon Jan 5, 2024
ce9e4e4
read me
flashguerdon Jan 5, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion docs/portal/Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -42,4 +42,4 @@ COPY --from=builder /data-portal/src/img/ /usr/share/nginx/html/src/img/
COPY --from=builder /data-portal/src/css/ /usr/share/nginx/html/src/css/

COPY overrides/dockerStart.sh dockerStart.sh
CMD bash ./dockerStart.sh
CMD bash ./dockerStart.sh
12 changes: 9 additions & 3 deletions helm/arborist/templates/db-init.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,12 @@
{{ include "common.db_setup_job" . }}
{{- if .Values.global.cloudsecrets.enabled | default false }}
{{ include "common.cloud_db_setup_job" . }}
---
{{ include "common.db-secret" . }}
{{ include "common.cloud_db_setup_sa" . }}
---
{{ include "common.db_setup_sa" . }}
{{- else }}
{{ include "common.db_setup_job" . }}
---
{{ include "common.db-secret" . }}
---
{{ include "common.db_setup_sa" . }}
{{- end }}
14 changes: 10 additions & 4 deletions helm/audit/templates/db-init.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,12 @@
{{ include "common.db_setup_job" . }}
{{- if .Values.global.cloudsecrets.enabled | default false }}
{{ include "common.cloud_db_setup_job" . }}
---
{{ include "common.db-secret" . }}
{{ include "common.cloud_db_setup_sa" . }}
---
{{ include "common.db_setup_sa" . }}
---
{{- else }}
{{ include "common.db_setup_job" . }}
---
{{ include "common.db-secret" . }}
---
{{ include "common.db_setup_sa" . }}
{{- end }}
139 changes: 139 additions & 0 deletions helm/common/templates/_cloud_db_setup_job.tpl
Original file line number Diff line number Diff line change
@@ -0,0 +1,139 @@
# DB Setup ServiceAccount
# Needs to update/ create secrets to signal that db is ready for use.
{{- define "common.cloud_db_setup_sa" -}}
apiVersion: v1
kind: ServiceAccount
metadata:
name: {{ .Chart.Name }}-dbcreate-sa
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: {{ .Chart.Name }}-dbcreate-role
rules:
- apiGroups: [""]
resources: ["secrets"]
verbs: ["*"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: {{ .Chart.Name }}-dbcreate-rolebinding
subjects:
- kind: ServiceAccount
name: {{ .Chart.Name }}-dbcreate-sa
namespace: {{ .Release.Namespace }}
roleRef:
kind: Role
name: {{ .Chart.Name }}-dbcreate-role
apiGroup: rbac.authorization.k8s.io
{{- end }}

# DB Setup Job
{{- define "common.cloud_db_setup_job" -}}
apiVersion: batch/v1
kind: Job
metadata:
name: {{ .Chart.Name }}-dbcreate
spec:
template:
metadata:
labels:
# TODO : READ FROM CENTRAL FUNCTION TOO?
app: gen3job
spec:
serviceAccountName: {{ .Chart.Name }}-dbcreate-sa
restartPolicy: Never
containers:
- name: db-setup
# TODO: READ THIS IMAGE FROM GLOBAL VALUES?
image: quay.io/cdis/awshelper:master
imagePullPolicy: Always
command: ["/bin/bash", "-c"]
env:
- name: PGPASSWORD
valueFrom:
secretKeyRef:
name: {{ .Chart.Name }}-dbcreds
key: password
optional: false
- name: PGUSER
valueFrom:
secretKeyRef:
name: {{ .Chart.Name }}-dbcreds
key: username
optional: false
- name: PGPORT
valueFrom:
secretKeyRef:
name: {{ .Chart.Name }}-dbcreds
key: port
optional: false
- name: PGHOST
valueFrom:
secretKeyRef:
name: {{ .Chart.Name }}-dbcreds
key: host
optional: false
- name: SERVICE_PGUSER
valueFrom:
secretKeyRef:
name: {{ .Chart.Name }}-dbcreds
key: serviceusername
optional: false
- name: SERVICE_PGDB
valueFrom:
secretKeyRef:
name: {{ .Chart.Name }}-dbcreds
key: database
optional: false
- name: SERVICE_PGPASS
valueFrom:
secretKeyRef:
name: {{ .Chart.Name }}-dbcreds
key: servicepassword
optional: false
- name: GEN3_HOME
value: /home/ubuntu/cloud-automation
args:
- |
#!/bin/bash
set -e

source "${GEN3_HOME}/gen3/lib/utils.sh"
gen3_load "gen3/gen3setup"

echo "PGHOST=$PGHOST"
echo "PGPORT=$PGPORT"
echo "PGUSER=$PGUSER"

echo "SERVICE_PGDB=$SERVICE_PGDB"
echo "SERVICE_PGUSER=$SERVICE_PGUSER"

until pg_isready -h $PGHOST -p $PGPORT -U $SERVICE_PGUSER -d template1
do
>&2 echo "Postgres is unavailable - sleeping"
sleep 5
done
>&2 echo "Postgres is up - executing command"


if psql -lqt | cut -d \| -f 1 | grep -qw $SERVICE_PGDB; then
gen3_log_info "Database exists"
PGPASSWORD=$SERVICE_PGPASS psql -d $SERVICE_PGDB -h $PGHOST -p $PGPORT -U $SERVICE_PGUSER -c "\conninfo"

# Update secret to signal that db is ready, and services can start
kubectl patch secret/{{ .Chart.Name }}-dbcreds -p '{"data":{"dbcreated":"dHJ1ZQo="}}'
else
echo "database does not exist"
psql -tc "SELECT 1 FROM pg_database WHERE datname = '$SERVICE_PGDB'" | grep -q 1 || psql -c "CREATE DATABASE \"$SERVICE_PGDB\";"
gen3_log_info psql -tc "SELECT 1 FROM pg_user WHERE usename = '$SERVICE_PGUSER'" | grep -q 1 || psql -c "CREATE USER \"$SERVICE_PGUSER\" WITH PASSWORD '$SERVICE_PGPASS';"
psql -tc "SELECT 1 FROM pg_user WHERE usename = '$SERVICE_PGUSER'" | grep -q 1 || psql -c "CREATE USER \"$SERVICE_PGUSER\" WITH PASSWORD '$SERVICE_PGPASS';"
psql -c "GRANT ALL ON DATABASE \"$SERVICE_PGDB\" TO \"$SERVICE_PGUSER\" WITH GRANT OPTION;"
psql -d $SERVICE_PGDB -c "CREATE EXTENSION ltree; ALTER ROLE \"$SERVICE_PGUSER\" WITH LOGIN"
PGPASSWORD=$SERVICE_PGPASS psql -d $SERVICE_PGDB -h $PGHOST -p $PGPORT -U $SERVICE_PGUSER -c "\conninfo"

# Update secret to signal that db has been created, and services can start
kubectl patch secret/{{ .Chart.Name }}-dbcreds -p '{"data":{"dbcreated":"dHJ1ZQo="}}'
fi
{{- end }}
12 changes: 9 additions & 3 deletions helm/fence/templates/db-init.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,12 @@
{{ include "common.db_setup_job" . }}
{{- if .Values.global.cloudsecrets.enabled | default false }}
{{ include "common.cloud_db_setup_job" . }}
---
{{ include "common.db-secret" . }}
{{ include "common.cloud_db_setup_sa" . }}
---
{{ include "common.db_setup_sa" . }}
{{- else }}
{{ include "common.db_setup_job" . }}
---
{{ include "common.db-secret" . }}
---
{{ include "common.db_setup_sa" . }}
{{- end }}
6 changes: 4 additions & 2 deletions helm/fence/templates/fence-config.yaml
Original file line number Diff line number Diff line change
@@ -1,10 +1,12 @@
apiVersion: v1
kind: Secret
kind: ConfigMap
metadata:
name: fence-config
stringData:
data:
fence-config.yaml: |
BASE_URL: https://{{ .Values.global.hostname }}/user
DEFAULT_CLIENT_ID: 'REPLACEME-OPENID-CID'
DEFAULT_CLIENT_SECRET: 'REPLACEME-OPENID-SECRET'
{{- with .Values.FENCE_CONFIG }}
{{- toYaml . | nindent 4 }}
{{ end }}
Expand Down
3 changes: 2 additions & 1 deletion helm/fence/templates/fence-creds.yaml
Original file line number Diff line number Diff line change
@@ -1,3 +1,4 @@
{{- if not .Values.global.cloudsecrets.enabled | default true }}
apiVersion: v1
kind: Secret
metadata:
Expand All @@ -16,4 +17,4 @@ stringData:
"google_client_id": "YOUR.GOOGLE.CLIENT",
"hmac_key": ""
}

{{- end }}
15 changes: 10 additions & 5 deletions helm/fence/templates/fence-deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -61,8 +61,13 @@ spec:
args:
- "-c"
- |
echo "${FENCE_PUBLIC_CONFIG:-""}" > "/var/www/fence/fence-config-public.yaml"
python /var/www/fence/yaml_merge.py /var/www/fence/fence-config-public.yaml /var/www/fence/fence-config-secret.yaml > /var/www/fence/fence-config.yaml
#echo "${FENCE_PUBLIC_CONFIG:-""}" > "/var/www/fence/fence-config-public.yaml"
#python /var/www/fence/yaml_merge.py /var/www/fence/fence-config-public.yaml /var/www/fence/fence-init-config.yaml > /var/www/fence/fence-config.yaml
cp /var/tmp/fence-config.yaml /var/www/fence/fence-config.yaml
CLIENT_ID=(`cat /var/www/fence/openid-creds/client_id`)
CLIENT_SECRET=(`cat /var/www/fence/openid-creds/client_secret`)
sed -i -e "s@REPLACEME-OPENID-CID@$CLIENT_ID@g" /var/www/fence/fence-config.yaml
sed -i -e "s@REPLACEME-OPENID-SECRET@$CLIENT_SECRET@g" /var/www/fence/fence-config.yaml
if [[ -f /fence/keys/key/jwt_private_key.pem ]]; then
openssl rsa -in /fence/keys/key/jwt_private_key.pem -pubout > /fence/keys/key/jwt_public_key.pem
fi
Expand Down Expand Up @@ -94,10 +99,10 @@ spec:
args:
- "-c"
- |
# echo "${FENCE_PUBLIC_CONFIG:-""}" > "/var/www/fence/fence-config-public.yaml"
# python /var/www/fence/yaml_merge.py /var/www/fence/fence-config-public.yaml /var/www/fence/fence-config-secret.yaml > /var/www/fence/fence-config.yaml
#echo "${FENCE_PUBLIC_CONFIG:-""}" > "/var/www/fence/fence-config-public.yaml"
#python /var/www/fence/yaml_merge.py /var/www/fence/fence-config-public.yaml /var/tmp/fence-config.yaml > /var/www/fence/fence-config.yaml
if fence-create migrate --help > /dev/null 2>&1; then
if ! grep -E 'ENABLE_DB_MIGRATION"?: *false' /var/www/fence/fence-config.yaml; then
if ! grep -E 'ENABLE_DB_MIGRATION"?: *false' /var/tmp/fence-config.yaml; then
echo "Running db migration: fence-create migrate"
cd /fence
fence-create migrate
Expand Down
31 changes: 20 additions & 11 deletions helm/fence/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -308,15 +308,15 @@ volumes:
secret:
secretName: "fence-creds"
- name: config-helper
configMap:
name: config-helper
secret:
secretName: fence-secret
optional: true
- name: logo-volume
configMap:
name: "logo-config"
- name: config-volume
secret:
secretName: "fence-config"
configMap:
name: "fence-config"
- name: fence-google-app-creds-secret-volume
secret:
secretName: "fence-google-app-creds-secret"
Expand All @@ -333,13 +333,16 @@ volumes:
configMap:
name: "fence-yaml-merge"
optional: true
- name: openid-creds
secret:
secretName: "openid-creds"

# -- (list) Volumes to mount to the container.
volumeMounts:
- name: "old-config-volume"
readOnly: true
mountPath: "/var/www/fence/local_settings.py"
subPath: local_settings.py
mountPath: "/var/www/fence/fence_settings.py"
subPath: fence_settings.py
- name: "json-secret-volume"
readOnly: true
mountPath: "/var/www/fence/fence_credentials.json"
Expand All @@ -362,8 +365,8 @@ volumeMounts:
subPath: "privacy_policy.md"
- name: "config-volume"
readOnly: true
mountPath: "/var/www/fence/fence-config.yaml"
subPath: fence-config.yaml
mountPath: "/var/tmp/fence-config.yaml"
subPath: "fence-config.yaml"
- name: "yaml-merge"
readOnly: true
mountPath: "/var/www/fence/yaml_merge.py"
Expand All @@ -380,12 +383,17 @@ volumeMounts:
readOnly: true
mountPath: "/fence/keys/key/jwt_private_key.pem"
subPath: "jwt_private_key.pem"
- name: "openid-creds"
readOnly: true
mountPath: "/var/www/fence/openid-creds"



# -- (list) Volumes to mount to the init container.
initVolumeMounts:
- name: "config-volume"
readOnly: true
mountPath: "/var/www/fence/fence-config.yaml"
mountPath: "/var/tmp/fence-config.yaml"
subPath: fence-config.yaml
- name: "yaml-merge"
readOnly: true
Expand Down Expand Up @@ -1595,8 +1603,9 @@ FENCE_CONFIG:
# Free tier users may request OIDC clients at https://cilogon.org/oauth2/register
cilogon:
discovery_url: 'https://cilogon.org/.well-known/openid-configuration'
client_id: ''
client_secret: ''
# DEFAULT_CLIENT_ID and DEFAULT_CLIENT_SECRET is added by fence-config configMap
client_id: '{{DEFAULT_CLIENT_ID}}'
client_secret: '{{DEFAULT_CLIENT_SECRET}}'
# When registering the Callback URLs for your CILogon OIDC client be
# sure to include the FULL url for this deployment, including the https:// scheme
# and server FQDN.
Expand Down
23 changes: 23 additions & 0 deletions helm/gen3-external-secrets/.helmignore
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
# Patterns to ignore when building packages.
# This supports shell glob matching, relative path matching, and
# negation (prefixed with !). Only one pattern per line.
.DS_Store
# Common VCS dirs
.git/
.gitignore
.bzr/
.bzrignore
.hg/
.hgignore
.svn/
# Common backup files
*.swp
*.bak
*.tmp
*.orig
*~
# Various IDEs
.project
.idea/
*.tmproj
.vscode/
28 changes: 28 additions & 0 deletions helm/gen3-external-secrets/Chart.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
apiVersion: v2
name: gen3-external-secrets
description: A Helm chart for installing ClusterSecretStore and external secrets

# A chart can be either an 'application' or a 'library' chart.
#
# Application charts are a collection of templates that can be packaged into versioned archives
# to be deployed.
#
# Library charts provide useful utilities or functions for the chart developer. They're included as
# a dependency of application charts to inject those utilities and functions into the rendering
# pipeline. Library charts do not define any templates and therefore cannot be deployed.
type: application

# This is the chart version. This version number should be incremented each time you make changes
# to the chart and its templates, including the app version.
# Versions are expected to follow Semantic Versioning (https://semver.org/)
version: 0.1.0

# This is the version number of the application being deployed. This version number should be
# incremented each time you make changes to the application. Versions are not expected to
# follow Semantic Versioning. They should reflect the version the application is using.
# It is recommended to use it with quotes.
appVersion: "1.16.0"
dependencies:
- name: external-secrets
version: 0.9.11
repository: https://charts.external-secrets.io
Loading
Loading