Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,4 +7,4 @@ keywords:
- confidential-containers
name: trustee
# DO NOT EDIT VERSION HERE, IT IS AUTO-GENERATED BY SEMANTIC-RELEASE
version: 0.2.0
version: 0.2.1
3 changes: 2 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# trustee

![Version: 0.2.0](https://img.shields.io/badge/Version-0.2.0-informational?style=flat-square)
![Version: 0.2.1](https://img.shields.io/badge/Version-0.2.1-informational?style=flat-square)

A Helm chart to provide an opinionated deployment of Trustee in a validated pattern

Expand Down Expand Up @@ -32,6 +32,7 @@ In order to use this chart, you will need to:
| global.coco.securityPolicyFlavour | string | `"insecure"` | |
| global.secretStore.backend | string | `""` | |
| kbs.cosignKeys | string | `"secret/data/hub/coSignKeys"` | |
| kbs.extraSecrets | list | `[]` | |
| kbs.publicKey | string | `"secret/data/hub/kbsPublicKey"` | |
| kbs.secretResources[0].key | string | `"secret/data/hub/kbsres1"` | |
| kbs.secretResources[0].name | string | `"kbsres1"` | |
Expand Down
3 changes: 3 additions & 0 deletions templates/kbs.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,9 @@ spec:
{{- range .Values.kbs.secretResources }}
- "{{ .name }}"
{{- end }}
{{- range .Values.kbs.extraSecrets }}
- "{{ . }}"
{{- end }}
{{- if eq .Values.global.coco.securityPolicyFlavour "signed" }}
- "cosign-keys"
{{- end }}
Expand Down
7 changes: 7 additions & 0 deletions values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -36,6 +36,13 @@ kbs:
key: "secret/data/hub/kbsres1"
- name: "passphrase"
key: "secret/data/hub/passphrase"
# Pre-existing secrets to add to kbsSecretResources without creating
# ExternalSecrets. Use this for secrets that are created outside the
# Vault/ESO flow (e.g. by imperative jobs, cert-manager, or other
# controllers). Only the secret name is needed; the secret must already
# exist in the trustee-operator-system namespace.
extraSecrets: []

# Intel TDX (Trust Domain Extensions) configuration
tdx:
# Enable TDX attestation support
Expand Down