diff --git a/docs/content/community/hello.md b/docs/content/community/hello.md index 24ab994d..2407f7e6 100644 --- a/docs/content/community/hello.md +++ b/docs/content/community/hello.md @@ -49,6 +49,19 @@ As a small, dedicated team of security enthusiasts, we value focused, effective communication. Thus, we prefer to consolidate our interactions into a single channel, rather than dispersing them across multiple platforms. +> **Türkçe Konuşanlar İçin:** +> +> Özgür yazılım birlikte olunca güzel 🤗. +> +> Eğer **VMware Secrets Manager** ile ilgili bir sorun varsa, projeye +> katkıda bulunmak istiyorsan veya başka bir konuda yardıma ihtiyacın varsa, +> dil engeli olmadan bize ulaşabilirsin. +> +> [Kampus Discord Sunucusu'nda **VMware Secrets Manager** kanalında][kampus] +> buluşalım ve birlikte dünyayı daha güvenli hale getirelim 🤘. + +[kampus]: https://discord.gg/kampus "Join Kampus Discord Server" + ## Join Our Public Meetings > **We Are Stronger Together** diff --git a/docs/content/community/maintainers.md b/docs/content/community/maintainers.md index 3887b3d5..964d3f56 100644 --- a/docs/content/community/maintainers.md +++ b/docs/content/community/maintainers.md @@ -49,10 +49,10 @@ assisting in feature development. **Qi Hu** (*Patrick*) [@BulldromeQ](https://github.com/BulldromeQ) -Patrick has played a crucial role in integrating VSecM to work seamlessly with -the [Carvel](https://carvel.dev) suite of tools. He has helped enhance the -stability and reliability of both the VSecM and SPIRE. And he is actively -involved in making VSecM even more robust. +Patrick has played a crucial role in integrating **VSecM** to work seamlessly +with the [Carvel](https://carvel.dev) suite of tools. He has helped enhance the +stability and reliability of both the **VSecM** and **SPIRE**. And he is +actively involved in making **VSecM** even more robust. [codeowners]: https://github.com/vmware-tanzu/secrets-manager/blob/main/CODEOWNERS "VMware Secrets Manager CODEOWNERS" diff --git a/docs/templates/index.html b/docs/templates/index.html index 93b084bc..796bb00f 100644 --- a/docs/templates/index.html +++ b/docs/templates/index.html @@ -71,21 +71,21 @@ Calendar Favorite 1 Streamline Icon: https://streamlinehq.com -  Mark Your Calendars: +  Mark Your Calendars: The next VSecM Contributor Sync will be on... Thursday, 2024-07-25 + >Thursday, 2024-08-30 at 8:00am Pacific time. diff --git a/examples/multiple_secrets/k8s-eks/Deployment.yaml b/examples/multiple_secrets/k8s-eks/Deployment.yaml deleted file mode 100644 index ce57646e..00000000 --- a/examples/multiple_secrets/k8s-eks/Deployment.yaml +++ /dev/null @@ -1,61 +0,0 @@ -# /* -# | Protect your secrets, protect your sensitive data. -# : Explore VMware Secrets Manager docs at https://vsecm.com/ -# / keep your secrets... secret -# >/ -# <>/' Copyright 2023-present VMware Secrets Manager contributors. -# >/' SPDX-License-Identifier: BSD-2-Clause -# */ - -apiVersion: apps/v1 -kind: Deployment -metadata: - name: example - namespace: default - labels: - app.kubernetes.io/name: example -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/name: example - template: - metadata: - labels: - app.kubernetes.io/name: example - spec: - serviceAccountName: example - containers: - - name: main - image: vsecm/example-multiple-secrets:0.26.2 - volumeMounts: - # Volume mount for SPIRE unix domain socket. - - name: spire-agent-socket - mountPath: /spire-agent-socket - readOnly: true - # - # You can configure this workload by providing environment variables. - # - # See https://vsecm.com/configuration for more information - # about these environment variables. - # - # When you don't explicitly provide env vars here, VMware Secrets Manager - # Safe will assume the default values outlined in the given link above. - # - env: - - name: SPIFFE_ENDPOINT_SOCKET - value: "unix:///spire-agent-socket/spire-agent.sock" - - name: VSECM_LOG_LEVEL - value: "7" - - name: VSECM_SPIFFEID_PREFIX_WORKLOAD - value: "spiffe://vsecm.com/workload/" - - name: VSECM_SPIFFEID_PREFIX_SAFE - value: "spiffe://vsecm.com/workload/vsecm-safe/ns/vsecm-system/sa/vsecm-safe/n/" - volumes: - # Using SPIFFE CSI Driver to bind to the SPIRE Agent Socket - # ref: https://github.com/spiffe/spiffe-csi - - name: spire-agent-socket - csi: - driver: "csi.spiffe.io" - readOnly: true diff --git a/examples/multiple_secrets/k8s-eks/Identity.yaml b/examples/multiple_secrets/k8s-eks/Identity.yaml deleted file mode 100644 index 06ef6948..00000000 --- a/examples/multiple_secrets/k8s-eks/Identity.yaml +++ /dev/null @@ -1,29 +0,0 @@ -# /* -# | Protect your secrets, protect your sensitive data. -# : Explore VMware Secrets Manager docs at https://vsecm.com/ -# / keep your secrets... secret -# >/ -# <>/' Copyright 2023-present VMware Secrets Manager contributors. -# >/' SPDX-License-Identifier: BSD-2-Clause -# */ - -apiVersion: spire.spiffe.io/v1alpha1 -kind: ClusterSPIFFEID -metadata: - name: example -spec: - className: "vsecm" - # SPIFFE ID `MUST` start with "spiffe://vsecm.com/workload/$workloadName/ns/" - # for `vsecm-safe` to recognize the workload and dispatch secrets to it. - spiffeIDTemplate: "spiffe://vsecm.com\ - /workload/example\ - /ns/{{ .PodMeta.Namespace }}\ - /sa/{{ .PodSpec.ServiceAccountName }}\ - /n/{{ .PodMeta.Name }}" - podSelector: - matchLabels: - app.kubernetes.io/name: example - workloadSelectorTemplates: - - "k8s:ns:default" - - "k8s:sa:example" diff --git a/examples/multiple_secrets/k8s-eks/ServiceAccount.yaml b/examples/multiple_secrets/k8s-eks/ServiceAccount.yaml deleted file mode 100644 index 548f20ac..00000000 --- a/examples/multiple_secrets/k8s-eks/ServiceAccount.yaml +++ /dev/null @@ -1,16 +0,0 @@ -# /* -# | Protect your secrets, protect your sensitive data. -# : Explore VMware Secrets Manager docs at https://vsecm.com/ -# / keep your secrets... secret -# >/ -# <>/' Copyright 2023-present VMware Secrets Manager contributors. -# >/' SPDX-License-Identifier: BSD-2-Clause -# */ - -apiVersion: v1 -kind: ServiceAccount -metadata: - name: example - namespace: default -automountServiceAccountToken: false diff --git a/examples/multiple_secrets/k8s-eks/image-override.yaml b/examples/multiple_secrets/k8s-eks/image-override.yaml deleted file mode 100644 index 7a114ff4..00000000 --- a/examples/multiple_secrets/k8s-eks/image-override.yaml +++ /dev/null @@ -1,24 +0,0 @@ -# /* -# | Protect your secrets, protect your sensitive data. -# : Explore VMware Secrets Manager docs at https://vsecm.com/ -# / keep your secrets... secret -# >/ -# <>/' Copyright 2023-present VMware Secrets Manager contributors. -# >/' SPDX-License-Identifier: BSD-2-Clause -# */ - -apiVersion: apps/v1 -kind: Deployment -metadata: - name: example - namespace: default -spec: - template: - spec: - containers: - - name: main - image: public.ecr.aws/h8y1n7y7/example-multiple-secrets:0.26.2 - env: - - name: VSECM_LOG_LEVEL - value: "7" \ No newline at end of file diff --git a/examples/multiple_secrets/k8s-eks/kustomization.yaml b/examples/multiple_secrets/k8s-eks/kustomization.yaml deleted file mode 100644 index e58cdad7..00000000 --- a/examples/multiple_secrets/k8s-eks/kustomization.yaml +++ /dev/null @@ -1,18 +0,0 @@ -# /* -# | Protect your secrets, protect your sensitive data. -# : Explore VMware Secrets Manager docs at https://vsecm.com/ -# / keep your secrets... secret -# >/ -# <>/' Copyright 2023-present VMware Secrets Manager contributors. -# >/' SPDX-License-Identifier: BSD-2-Clause -# */ - -apiVersion: kustomize.config.k8s.io/v1beta1 -kind: Kustomization -resources: -- Deployment.yaml -generatorOptions: - disableNameSuffixHash: true -patches: -- path: image-override.yaml diff --git a/examples/multiple_secrets/k8s/Deployment.yaml b/examples/multiple_secrets/k8s/Deployment.yaml index ce57646e..f6d428fd 100644 --- a/examples/multiple_secrets/k8s/Deployment.yaml +++ b/examples/multiple_secrets/k8s/Deployment.yaml @@ -28,7 +28,7 @@ spec: serviceAccountName: example containers: - name: main - image: vsecm/example-multiple-secrets:0.26.2 + image: vsecm/example-multiple-secrets:latest volumeMounts: # Volume mount for SPIRE unix domain socket. - name: spire-agent-socket diff --git a/examples/multiple_secrets/k8s/image-override.yaml b/examples/multiple_secrets/k8s/image-override.yaml index ce19daf8..ba2103de 100644 --- a/examples/multiple_secrets/k8s/image-override.yaml +++ b/examples/multiple_secrets/k8s/image-override.yaml @@ -18,6 +18,7 @@ spec: spec: containers: - name: main + # Change this, if you want to use a different image: image: localhost:5000/example-multiple-secrets:0.26.2 env: - name: VSECM_LOG_LEVEL diff --git a/examples/using_init_container/k8s-eks/Deployment.yaml b/examples/using_init_container/k8s-eks/Deployment.yaml deleted file mode 100644 index 876223de..00000000 --- a/examples/using_init_container/k8s-eks/Deployment.yaml +++ /dev/null @@ -1,71 +0,0 @@ -# /* -# | Protect your secrets, protect your sensitive data. -# : Explore VMware Secrets Manager docs at https://vsecm.com/ -# / keep your secrets... secret -# >/ -# <>/' Copyright 2023-present VMware Secrets Manager contributors. -# >/' SPDX-License-Identifier: BSD-2-Clause -# */ - -apiVersion: apps/v1 -kind: Deployment -metadata: - name: example - namespace: default - labels: - app.kubernetes.io/name: example -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/name: example - template: - metadata: - labels: - app.kubernetes.io/name: example - spec: - serviceAccountName: example - containers: - - name: main - image: vsecm/example-using-init-container:0.26.2 - - initContainers: - # See `./register.sh` to register the workload and finalize - # this init container. - - name: init-container - image: vsecm/vsecm-ist-init-container:0.26.2 - volumeMounts: - # Volume mount for SPIRE unix domain socket. - - name: spire-agent-socket - mountPath: /spire-agent-socket - readOnly: true - # - # You can configure VSecM Init Container by providing - # environment variables. - # - # See https://vsecm.com/configuration for more information - # about these environment variables. - # - # When you don't explicitly provide env vars here, VMware Secrets Manager - # Init Container will assume the default values outlined in the given - # link above. - # - env: - - name: SPIFFE_ENDPOINT_SOCKET - value: "unix:///spire-agent-socket/spire-agent.sock" - - name: VSECM_LOG_LEVEL - value: "7" - - name: VSECM_SPIFFEID_PREFIX_WORKLOAD - value: "spiffe://vsecm.com/workload/" - - name: VSECM_SPIFFEID_PREFIX_SAFE - value: "spiffe://vsecm.com/workload/vsecm-safe/ns/vsecm-system/sa/vsecm-safe/n/" - - name: VSECM_INIT_CONTAINER_POLL_INTERVAL - value: "5000" - volumes: - # Using SPIFFE CSI Driver to bind to the SPIRE Agent Socket - # ref: https://github.com/spiffe/spiffe-csi - - name: spire-agent-socket - csi: - driver: "csi.spiffe.io" - readOnly: true diff --git a/examples/using_init_container/k8s-eks/Identity.yaml b/examples/using_init_container/k8s-eks/Identity.yaml deleted file mode 100644 index 06ef6948..00000000 --- a/examples/using_init_container/k8s-eks/Identity.yaml +++ /dev/null @@ -1,29 +0,0 @@ -# /* -# | Protect your secrets, protect your sensitive data. -# : Explore VMware Secrets Manager docs at https://vsecm.com/ -# / keep your secrets... secret -# >/ -# <>/' Copyright 2023-present VMware Secrets Manager contributors. -# >/' SPDX-License-Identifier: BSD-2-Clause -# */ - -apiVersion: spire.spiffe.io/v1alpha1 -kind: ClusterSPIFFEID -metadata: - name: example -spec: - className: "vsecm" - # SPIFFE ID `MUST` start with "spiffe://vsecm.com/workload/$workloadName/ns/" - # for `vsecm-safe` to recognize the workload and dispatch secrets to it. - spiffeIDTemplate: "spiffe://vsecm.com\ - /workload/example\ - /ns/{{ .PodMeta.Namespace }}\ - /sa/{{ .PodSpec.ServiceAccountName }}\ - /n/{{ .PodMeta.Name }}" - podSelector: - matchLabels: - app.kubernetes.io/name: example - workloadSelectorTemplates: - - "k8s:ns:default" - - "k8s:sa:example" diff --git a/examples/using_init_container/k8s-eks/Secret.yaml b/examples/using_init_container/k8s-eks/Secret.yaml deleted file mode 100644 index de021ff1..00000000 --- a/examples/using_init_container/k8s-eks/Secret.yaml +++ /dev/null @@ -1,23 +0,0 @@ -# /* -# | Protect your secrets, protect your sensitive data. -# : Explore VMware Secrets Manager docs at https://vsecm.com/ -# / keep your secrets... secret -# >/ -# <>/' Copyright 2023-present VMware Secrets Manager contributors. -# >/' SPDX-License-Identifier: BSD-2-Clause -# */ - -apiVersion: v1 -kind: Secret -metadata: - # The string after `vsecm-secret-` must match the workload's name. - # For example, this is an VSecM-managed secret for the workload named `example` - # with the SPIFFE ID - # `"spiffe://vsecm.com/workload/example\ - # /ns/{{ .PodMeta.Namespace }}\ - # /sa/{{ .PodSpec.ServiceAccountName }}\ - # /n/{{ .PodMeta.Name }}"` - name: vsecm-secret-example - namespace: default -type: Opaque diff --git a/examples/using_init_container/k8s-eks/ServiceAccount.yaml b/examples/using_init_container/k8s-eks/ServiceAccount.yaml deleted file mode 100644 index 548f20ac..00000000 --- a/examples/using_init_container/k8s-eks/ServiceAccount.yaml +++ /dev/null @@ -1,16 +0,0 @@ -# /* -# | Protect your secrets, protect your sensitive data. -# : Explore VMware Secrets Manager docs at https://vsecm.com/ -# / keep your secrets... secret -# >/ -# <>/' Copyright 2023-present VMware Secrets Manager contributors. -# >/' SPDX-License-Identifier: BSD-2-Clause -# */ - -apiVersion: v1 -kind: ServiceAccount -metadata: - name: example - namespace: default -automountServiceAccountToken: false diff --git a/examples/using_init_container/k8s-eks/image-override.yaml b/examples/using_init_container/k8s-eks/image-override.yaml deleted file mode 100644 index dc9e8a26..00000000 --- a/examples/using_init_container/k8s-eks/image-override.yaml +++ /dev/null @@ -1,24 +0,0 @@ -# /* -# | Protect your secrets, protect your sensitive data. -# : Explore VMware Secrets Manager docs at https://vsecm.com/ -# / keep your secrets... secret -# >/ -# <>/' Copyright 2023-present VMware Secrets Manager contributors. -# >/' SPDX-License-Identifier: BSD-2-Clause -# */ - -apiVersion: apps/v1 -kind: Deployment -metadata: - name: example - namespace: default -spec: - template: - spec: - containers: - - name: main - image: public.ecr.aws/h8y1n7y7/example-using-init-container:0.26.2 - initContainers: - - name: init-container - image: public.ecr.aws/h8y1n7y7/vsecm-ist-init-container:0.26.2 diff --git a/examples/using_init_container/k8s-eks/kustomization.yaml b/examples/using_init_container/k8s-eks/kustomization.yaml deleted file mode 100644 index 9892008c..00000000 --- a/examples/using_init_container/k8s-eks/kustomization.yaml +++ /dev/null @@ -1,18 +0,0 @@ -# /* -# | Protect your secrets, protect your sensitive data. -# : Explore VMware Secrets Manager docs at https://vsecm.com/ -# / keep your secrets... secret -# >/ -# <>/' Copyright 2023-present VMware Secrets Manager contributors. -# >/' SPDX-License-Identifier: BSD-2-Clause -# */ - -apiVersion: kustomize.config.k8s.io/v1beta1 -kind: Kustomization -resources: -- Deployment.yaml -patches: -- path: image-override.yaml -generatorOptions: - disableNameSuffixHash: true diff --git a/examples/using_init_container/k8s/Deployment.yaml b/examples/using_init_container/k8s/Deployment.yaml index 876223de..b5d6e822 100644 --- a/examples/using_init_container/k8s/Deployment.yaml +++ b/examples/using_init_container/k8s/Deployment.yaml @@ -28,13 +28,13 @@ spec: serviceAccountName: example containers: - name: main - image: vsecm/example-using-init-container:0.26.2 + image: vsecm/example-using-init-container:latest initContainers: # See `./register.sh` to register the workload and finalize # this init container. - name: init-container - image: vsecm/vsecm-ist-init-container:0.26.2 + image: vsecm/vsecm-ist-init-container:latest volumeMounts: # Volume mount for SPIRE unix domain socket. - name: spire-agent-socket diff --git a/examples/using_init_container/k8s/image-override.yaml b/examples/using_init_container/k8s/image-override.yaml index f1fdd902..88aabb9d 100644 --- a/examples/using_init_container/k8s/image-override.yaml +++ b/examples/using_init_container/k8s/image-override.yaml @@ -18,7 +18,9 @@ spec: spec: containers: - name: main + # Change this, if you want to use a different image: image: localhost:5000/example-using-init-container:0.26.2 initContainers: - name: init-container + # Change this, if you want to use a different image: image: localhost:5000/vsecm-ist-init-container:0.26.2 diff --git a/examples/using_sdk_go/k8s-eks/Deployment.yaml b/examples/using_sdk_go/k8s-eks/Deployment.yaml deleted file mode 100644 index f4573f92..00000000 --- a/examples/using_sdk_go/k8s-eks/Deployment.yaml +++ /dev/null @@ -1,61 +0,0 @@ -# /* -# | Protect your secrets, protect your sensitive data. -# : Explore VMware Secrets Manager docs at https://vsecm.com/ -# / keep your secrets... secret -# >/ -# <>/' Copyright 2023-present VMware Secrets Manager contributors. -# >/' SPDX-License-Identifier: BSD-2-Clause -# */ - -apiVersion: apps/v1 -kind: Deployment -metadata: - name: example - namespace: default - labels: - app.kubernetes.io/name: example -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/name: example - template: - metadata: - labels: - app.kubernetes.io/name: example - spec: - serviceAccountName: example - containers: - - name: main - image: vsecm/example-using-sdk-go:0.26.2 - volumeMounts: - # Volume mount for SPIRE unix domain socket. - - name: spire-agent-socket - mountPath: /spire-agent-socket - readOnly: true - # - # You can configure this workload by providing environment variables. - # - # See https://vsecm.com/configuration for more information - # about these environment variables. - # - # When you don't explicitly provide env vars here, VMware Secrets Manager - # Safe will assume the default values outlined in the given link above. - # - env: - - name: SPIFFE_ENDPOINT_SOCKET - value: "unix:///spire-agent-socket/spire-agent.sock" - - name: VSECM_LOG_LEVEL - value: "7" - - name: VSECM_SPIFFEID_PREFIX_WORKLOAD - value: "spiffe://vsecm.com/workload/" - - name: VSECM_SPIFFEID_PREFIX_SAFE - value: "spiffe://vsecm.com/workload/vsecm-safe/ns/vsecm-system/sa/vsecm-safe/n/" - volumes: - # Using SPIFFE CSI Driver to bind to the SPIRE Agent Socket - # ref: https://github.com/spiffe/spiffe-csi - - name: spire-agent-socket - csi: - driver: "csi.spiffe.io" - readOnly: true diff --git a/examples/using_sdk_go/k8s-eks/Identity.yaml b/examples/using_sdk_go/k8s-eks/Identity.yaml deleted file mode 100644 index 06ef6948..00000000 --- a/examples/using_sdk_go/k8s-eks/Identity.yaml +++ /dev/null @@ -1,29 +0,0 @@ -# /* -# | Protect your secrets, protect your sensitive data. -# : Explore VMware Secrets Manager docs at https://vsecm.com/ -# / keep your secrets... secret -# >/ -# <>/' Copyright 2023-present VMware Secrets Manager contributors. -# >/' SPDX-License-Identifier: BSD-2-Clause -# */ - -apiVersion: spire.spiffe.io/v1alpha1 -kind: ClusterSPIFFEID -metadata: - name: example -spec: - className: "vsecm" - # SPIFFE ID `MUST` start with "spiffe://vsecm.com/workload/$workloadName/ns/" - # for `vsecm-safe` to recognize the workload and dispatch secrets to it. - spiffeIDTemplate: "spiffe://vsecm.com\ - /workload/example\ - /ns/{{ .PodMeta.Namespace }}\ - /sa/{{ .PodSpec.ServiceAccountName }}\ - /n/{{ .PodMeta.Name }}" - podSelector: - matchLabels: - app.kubernetes.io/name: example - workloadSelectorTemplates: - - "k8s:ns:default" - - "k8s:sa:example" diff --git a/examples/using_sdk_go/k8s-eks/Secret.yaml b/examples/using_sdk_go/k8s-eks/Secret.yaml deleted file mode 100644 index de021ff1..00000000 --- a/examples/using_sdk_go/k8s-eks/Secret.yaml +++ /dev/null @@ -1,23 +0,0 @@ -# /* -# | Protect your secrets, protect your sensitive data. -# : Explore VMware Secrets Manager docs at https://vsecm.com/ -# / keep your secrets... secret -# >/ -# <>/' Copyright 2023-present VMware Secrets Manager contributors. -# >/' SPDX-License-Identifier: BSD-2-Clause -# */ - -apiVersion: v1 -kind: Secret -metadata: - # The string after `vsecm-secret-` must match the workload's name. - # For example, this is an VSecM-managed secret for the workload named `example` - # with the SPIFFE ID - # `"spiffe://vsecm.com/workload/example\ - # /ns/{{ .PodMeta.Namespace }}\ - # /sa/{{ .PodSpec.ServiceAccountName }}\ - # /n/{{ .PodMeta.Name }}"` - name: vsecm-secret-example - namespace: default -type: Opaque diff --git a/examples/using_sdk_go/k8s-eks/image-override.yaml b/examples/using_sdk_go/k8s-eks/image-override.yaml deleted file mode 100644 index 787dff86..00000000 --- a/examples/using_sdk_go/k8s-eks/image-override.yaml +++ /dev/null @@ -1,21 +0,0 @@ -# /* -# | Protect your secrets, protect your sensitive data. -# : Explore VMware Secrets Manager docs at https://vsecm.com/ -# / keep your secrets... secret -# >/ -# <>/' Copyright 2023-present VMware Secrets Manager contributors. -# >/' SPDX-License-Identifier: BSD-2-Clause -# */ - -apiVersion: apps/v1 -kind: Deployment -metadata: - name: example - namespace: default -spec: - template: - spec: - containers: - - name: main - image: public.ecr.aws/h8y1n7y7/example-using-sdk-go:0.26.2 diff --git a/examples/using_sdk_go/k8s-eks/kustomization.yaml b/examples/using_sdk_go/k8s-eks/kustomization.yaml deleted file mode 100644 index 9892008c..00000000 --- a/examples/using_sdk_go/k8s-eks/kustomization.yaml +++ /dev/null @@ -1,18 +0,0 @@ -# /* -# | Protect your secrets, protect your sensitive data. -# : Explore VMware Secrets Manager docs at https://vsecm.com/ -# / keep your secrets... secret -# >/ -# <>/' Copyright 2023-present VMware Secrets Manager contributors. -# >/' SPDX-License-Identifier: BSD-2-Clause -# */ - -apiVersion: kustomize.config.k8s.io/v1beta1 -kind: Kustomization -resources: -- Deployment.yaml -patches: -- path: image-override.yaml -generatorOptions: - disableNameSuffixHash: true diff --git a/examples/using_sdk_go/k8s/Deployment.yaml b/examples/using_sdk_go/k8s/Deployment.yaml index f4573f92..5e2051bf 100644 --- a/examples/using_sdk_go/k8s/Deployment.yaml +++ b/examples/using_sdk_go/k8s/Deployment.yaml @@ -28,7 +28,7 @@ spec: serviceAccountName: example containers: - name: main - image: vsecm/example-using-sdk-go:0.26.2 + image: vsecm/example-using-sdk-go:latest volumeMounts: # Volume mount for SPIRE unix domain socket. - name: spire-agent-socket diff --git a/examples/using_sdk_go/k8s/image-override.yaml b/examples/using_sdk_go/k8s/image-override.yaml index 57e04822..87b800d6 100644 --- a/examples/using_sdk_go/k8s/image-override.yaml +++ b/examples/using_sdk_go/k8s/image-override.yaml @@ -18,4 +18,5 @@ spec: spec: containers: - name: main + # Change this, if you want to use a different image image: localhost:5000/example-using-sdk-go:0.26.2 diff --git a/examples/using_sidecar/k8s-eks/Deployment.yaml b/examples/using_sidecar/k8s-eks/Deployment.yaml deleted file mode 100644 index 346621fd..00000000 --- a/examples/using_sidecar/k8s-eks/Deployment.yaml +++ /dev/null @@ -1,85 +0,0 @@ -# /* -# | Protect your secrets, protect your sensitive data. -# : Explore VMware Secrets Manager docs at https://vsecm.com/ -# / keep your secrets... secret -# >/ -# <>/' Copyright 2023-present VMware Secrets Manager contributors. -# >/' SPDX-License-Identifier: BSD-2-Clause -# */ - -apiVersion: apps/v1 -kind: Deployment -metadata: - name: example - namespace: default - labels: - app.kubernetes.io/name: example -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/name: example - template: - metadata: - labels: - app.kubernetes.io/name: example - spec: - serviceAccountName: example - containers: - - name: main - image: vsecm/example-using-sidecar:0.26.2 - volumeMounts: - # `main` shares this volume with `sidecar`. - - mountPath: /opt/vsecm - name: vsecm-secrets-volume - - name: sidecar - image: vsecm/vsecm-ist-sidecar:0.26.2 - volumeMounts: - # /opt/vsecm/secrets.json is the place the secrets will be at. - - mountPath: /opt/vsecm - name: vsecm-secrets-volume - # Volume mount for SPIRE unix domain socket. - - name: spire-agent-socket - mountPath: /spire-agent-socket - readOnly: true - # - # You can configure this workload by providing environment variables. - # - # See https://vsecm.com/configuration for more information about - # these environment variables. - # - # When you don't explicitly provide env vars here, VMware Secrets Manager - # Safe will assume the default values outlined in the given link above. - # - env: - - name: SPIFFE_ENDPOINT_SOCKET - value: "unix:///spire-agent-socket/spire-agent.sock" - - name: VSECM_LOG_LEVEL - value: "7" - - name: VSECM_SPIFFEID_PREFIX_WORKLOAD - value: "spiffe://vsecm.com/workload/" - - name: VSECM_SPIFFEID_PREFIX_SAFE - value: "spiffe://vsecm.com/workload/vsecm-safe/ns/vsecm-system/sa/vsecm-safe/n/" - - name: VSECM_SIDECAR_POLL_INTERVAL - value: "5000" - - name: VSECM_SIDECAR_MAX_POLL_INTERVAL - value: "300000" - - name: VSECM_SIDECAR_EXPONENTIAL_BACKOFF_MULTIPLIER - value: "2" - - name: VSECM_SIDECAR_SUCCESS_THRESHOLD - value: "3" - - name: VSECM_SIDECAR_ERROR_THRESHOLD - value: "2" - volumes: - # A memory-backed volume is recommended (but not required) to keep - # the secrets. The secrets can be stored in any kind of volume. - - name: vsecm-secrets-volume - emptyDir: - medium: Memory - # Using SPIFFE CSI Driver to bind to the SPIRE Agent Socket - # ref: https://github.com/spiffe/spiffe-csi - - name: spire-agent-socket - csi: - driver: "csi.spiffe.io" - readOnly: true diff --git a/examples/using_sidecar/k8s-eks/Identity.yaml b/examples/using_sidecar/k8s-eks/Identity.yaml deleted file mode 100644 index 4cea3d90..00000000 --- a/examples/using_sidecar/k8s-eks/Identity.yaml +++ /dev/null @@ -1,29 +0,0 @@ -# /* -# | Protect your secrets, protect your sensitive data. -# : Explore VMware Secrets Manager docs at https://vsecm.com/ -# / keep your secrets... secret -# >/ -# <>/' Copyright 2023-present VMware Secrets Manager contributors. -# >/' SPDX-License-Identifier: BSD-2-Clause -# */ - -apiVersion: spire.spiffe.io/v1alpha1 -kind: ClusterSPIFFEID -metadata: - name: example -spec: - className: "vsecm" - # SPIFFE ID `MUST` start with "spiffe://vsecm.com/workload/$workloadName/ns/" - # for `safe` to recognize the workload and dispatch secrets to it. - spiffeIDTemplate: "spiffe://vsecm.com\ - /workload/example\ - /ns/{{ .PodMeta.Namespace }}\ - /sa/{{ .PodSpec.ServiceAccountName }}\ - /n/{{ .PodMeta.Name }}" - podSelector: - matchLabels: - app.kubernetes.io/name: example - workloadSelectorTemplates: - - "k8s:ns:default" - - "k8s:sa:example" diff --git a/examples/using_sidecar/k8s-eks/Secret.yaml b/examples/using_sidecar/k8s-eks/Secret.yaml deleted file mode 100644 index de021ff1..00000000 --- a/examples/using_sidecar/k8s-eks/Secret.yaml +++ /dev/null @@ -1,23 +0,0 @@ -# /* -# | Protect your secrets, protect your sensitive data. -# : Explore VMware Secrets Manager docs at https://vsecm.com/ -# / keep your secrets... secret -# >/ -# <>/' Copyright 2023-present VMware Secrets Manager contributors. -# >/' SPDX-License-Identifier: BSD-2-Clause -# */ - -apiVersion: v1 -kind: Secret -metadata: - # The string after `vsecm-secret-` must match the workload's name. - # For example, this is an VSecM-managed secret for the workload named `example` - # with the SPIFFE ID - # `"spiffe://vsecm.com/workload/example\ - # /ns/{{ .PodMeta.Namespace }}\ - # /sa/{{ .PodSpec.ServiceAccountName }}\ - # /n/{{ .PodMeta.Name }}"` - name: vsecm-secret-example - namespace: default -type: Opaque diff --git a/examples/using_sidecar/k8s-eks/ServiceAccount.yaml b/examples/using_sidecar/k8s-eks/ServiceAccount.yaml deleted file mode 100644 index 548f20ac..00000000 --- a/examples/using_sidecar/k8s-eks/ServiceAccount.yaml +++ /dev/null @@ -1,16 +0,0 @@ -# /* -# | Protect your secrets, protect your sensitive data. -# : Explore VMware Secrets Manager docs at https://vsecm.com/ -# / keep your secrets... secret -# >/ -# <>/' Copyright 2023-present VMware Secrets Manager contributors. -# >/' SPDX-License-Identifier: BSD-2-Clause -# */ - -apiVersion: v1 -kind: ServiceAccount -metadata: - name: example - namespace: default -automountServiceAccountToken: false diff --git a/examples/using_sidecar/k8s-eks/image-override.yaml b/examples/using_sidecar/k8s-eks/image-override.yaml deleted file mode 100644 index 03ae87ab..00000000 --- a/examples/using_sidecar/k8s-eks/image-override.yaml +++ /dev/null @@ -1,23 +0,0 @@ -# /* -# | Protect your secrets, protect your sensitive data. -# : Explore VMware Secrets Manager docs at https://vsecm.com/ -# / keep your secrets... secret -# >/ -# <>/' Copyright 2023-present VMware Secrets Manager contributors. -# >/' SPDX-License-Identifier: BSD-2-Clause -# */ - -apiVersion: apps/v1 -kind: Deployment -metadata: - name: example - namespace: default -spec: - template: - spec: - containers: - - name: main - image: public.ecr.aws/h8y1n7y7/example-using-sidecar:0.26.2 - - name: sidecar - image: public.ecr.aws/h8y1n7y7/vsecm-ist-sidecar:0.26.2 diff --git a/examples/using_sidecar/k8s-eks/kustomization.yaml b/examples/using_sidecar/k8s-eks/kustomization.yaml deleted file mode 100644 index 9892008c..00000000 --- a/examples/using_sidecar/k8s-eks/kustomization.yaml +++ /dev/null @@ -1,18 +0,0 @@ -# /* -# | Protect your secrets, protect your sensitive data. -# : Explore VMware Secrets Manager docs at https://vsecm.com/ -# / keep your secrets... secret -# >/ -# <>/' Copyright 2023-present VMware Secrets Manager contributors. -# >/' SPDX-License-Identifier: BSD-2-Clause -# */ - -apiVersion: kustomize.config.k8s.io/v1beta1 -kind: Kustomization -resources: -- Deployment.yaml -patches: -- path: image-override.yaml -generatorOptions: - disableNameSuffixHash: true diff --git a/examples/using_sidecar/k8s/Deployment.yaml b/examples/using_sidecar/k8s/Deployment.yaml index 346621fd..6b7e9db0 100644 --- a/examples/using_sidecar/k8s/Deployment.yaml +++ b/examples/using_sidecar/k8s/Deployment.yaml @@ -28,13 +28,13 @@ spec: serviceAccountName: example containers: - name: main - image: vsecm/example-using-sidecar:0.26.2 + image: vsecm/example-using-sidecar:latest volumeMounts: # `main` shares this volume with `sidecar`. - mountPath: /opt/vsecm name: vsecm-secrets-volume - name: sidecar - image: vsecm/vsecm-ist-sidecar:0.26.2 + image: vsecm/vsecm-ist-sidecar:latest volumeMounts: # /opt/vsecm/secrets.json is the place the secrets will be at. - mountPath: /opt/vsecm diff --git a/examples/using_sidecar/k8s/image-override.yaml b/examples/using_sidecar/k8s/image-override.yaml index b17962bd..637f943d 100644 --- a/examples/using_sidecar/k8s/image-override.yaml +++ b/examples/using_sidecar/k8s/image-override.yaml @@ -18,6 +18,8 @@ spec: spec: containers: - name: main + # Change this, if you want to use a different image image: localhost:5000/example-using-sidecar:0.26.2 - name: sidecar + # Change this, if you want to use a different image image: localhost:5000/vsecm-ist-sidecar:0.26.2 diff --git a/examples/using_vsecm_inspector/Deployment.yaml b/examples/using_vsecm_inspector/Deployment.yaml index 2737bf8a..9199e42c 100644 --- a/examples/using_vsecm_inspector/Deployment.yaml +++ b/examples/using_vsecm_inspector/Deployment.yaml @@ -28,7 +28,7 @@ spec: serviceAccountName: vsecm-inspector containers: - name: main - image: localhost:5000/vsecm-inspector:0.26.2 + image: localhost:5000/vsecm-inspector:latest volumeMounts: - name: spire-agent-socket mountPath: /spire-agent-socket diff --git a/helm-charts/0.26.2/charts/safe/templates/Secret.yaml b/helm-charts/0.26.2/charts/safe/templates/Secret.yaml index 7073ddbc..65adcc41 100644 --- a/helm-charts/0.26.2/charts/safe/templates/Secret.yaml +++ b/helm-charts/0.26.2/charts/safe/templates/Secret.yaml @@ -16,6 +16,8 @@ metadata: labels: {{- include "safe.labels" . | nindent 4 }} app.kubernetes.io/operated-by: vsecm + annotations: + kubernetes.io/service-account.name: {{ include "safe.serviceAccountName" . }} type: Opaque data: # '{}' (e30=) is a special placeholder to tell Safe that the Secret diff --git a/helm-charts/0.26.2/charts/safe/templates/ServiceAccount.yaml b/helm-charts/0.26.2/charts/safe/templates/ServiceAccount.yaml index f5ca50c6..9cd283cb 100644 --- a/helm-charts/0.26.2/charts/safe/templates/ServiceAccount.yaml +++ b/helm-charts/0.26.2/charts/safe/templates/ServiceAccount.yaml @@ -23,4 +23,6 @@ metadata: {{- toYaml . | nindent 4 }} {{- end }} automountServiceAccountToken: true +secrets: + - name: {{ .Values.rootKeySecretName }} {{- end }} diff --git a/examples/using_sdk_go/k8s-eks/ServiceAccount.yaml b/helm-charts/0.26.2/charts/sentinel/templates/Role.yaml similarity index 51% rename from examples/using_sdk_go/k8s-eks/ServiceAccount.yaml rename to helm-charts/0.26.2/charts/sentinel/templates/Role.yaml index 548f20ac..49c9e02c 100644 --- a/examples/using_sdk_go/k8s-eks/ServiceAccount.yaml +++ b/helm-charts/0.26.2/charts/sentinel/templates/Role.yaml @@ -8,9 +8,15 @@ # >/' SPDX-License-Identifier: BSD-2-Clause # */ -apiVersion: v1 -kind: ServiceAccount +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role metadata: - name: example - namespace: default -automountServiceAccountToken: false + name: vsecm-sentinel-secret-reader + namespace: {{ .Values.global.vsecm.namespace }} +rules: + - apiGroups: [""] + resources: ["secrets"] + verbs: ["get", "list", "watch"] + resourceNames: ["vsecm-sentinel-init-secret"] + + diff --git a/helm-charts/0.26.2/charts/sentinel/templates/RoleBinding.yaml b/helm-charts/0.26.2/charts/sentinel/templates/RoleBinding.yaml new file mode 100644 index 00000000..70e8b8fc --- /dev/null +++ b/helm-charts/0.26.2/charts/sentinel/templates/RoleBinding.yaml @@ -0,0 +1,23 @@ +# /* +# | Protect your secrets, protect your sensitive data. +# : Explore VMware Secrets Manager docs at https://vsecm.com/ +# / keep your secrets... secret +# >/ +# <>/' Copyright 2023-present VMware Secrets Manager contributors. +# >/' SPDX-License-Identifier: BSD-2-Clause +# */ + +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: read-secrets + namespace: {{ .Values.global.vsecm.namespace }} +subjects: + - kind: ServiceAccount + name: {{ include "sentinel.serviceAccountName" . }} + namespace: {{ .Values.global.vsecm.namespace }} +roleRef: + kind: Role + name: vsecm-sentinel-secret-reader + apiGroup: rbac.authorization.k8s.io \ No newline at end of file diff --git a/helm-charts/0.26.2/charts/sentinel/templates/Secret.yaml b/helm-charts/0.26.2/charts/sentinel/templates/Secret.yaml index 1f651f1d..e882fd3e 100644 --- a/helm-charts/0.26.2/charts/sentinel/templates/Secret.yaml +++ b/helm-charts/0.26.2/charts/sentinel/templates/Secret.yaml @@ -17,6 +17,8 @@ metadata: labels: {{- include "sentinel.labels" . | nindent 4 }} app.kubernetes.io/operated-by: vsecm + annotations: + kubernetes.io/service-account.name: {{ include "sentinel.serviceAccountName" . }} type: Opaque stringData: data: {{ .Values.initCommand.command | quote }} diff --git a/helm-charts/0.26.2/charts/sentinel/templates/ServiceAccount.yaml b/helm-charts/0.26.2/charts/sentinel/templates/ServiceAccount.yaml index 7e4b044d..c9d9bbe9 100644 --- a/helm-charts/0.26.2/charts/sentinel/templates/ServiceAccount.yaml +++ b/helm-charts/0.26.2/charts/sentinel/templates/ServiceAccount.yaml @@ -23,4 +23,6 @@ metadata: {{- toYaml . | nindent 4 }} {{- end }} automountServiceAccountToken: false +secrets: + - name: vsecm-sentinel-init-secret {{- end }} diff --git a/k8s/0.26.2/eks/vsecm-distroless-fips.yaml b/k8s/0.26.2/eks/vsecm-distroless-fips.yaml index 1b9d7784..09b77937 100644 --- a/k8s/0.26.2/eks/vsecm-distroless-fips.yaml +++ b/k8s/0.26.2/eks/vsecm-distroless-fips.yaml @@ -67,6 +67,8 @@ metadata: kubernetes.io/enforce-mountable-secrets: "true" kubernetes.io/mountable-secrets: vsecm-root-key automountServiceAccountToken: true +secrets: + - name: vsecm-root-key --- # Source: vsecm/charts/sentinel/templates/ServiceAccount.yaml # /* @@ -95,6 +97,8 @@ metadata: kubernetes.io/enforce-mountable-secrets: "true" kubernetes.io/mountable-secrets: vsecm-sentinel-init-secret automountServiceAccountToken: false +secrets: + - name: vsecm-sentinel-init-secret --- # Source: vsecm/charts/safe/templates/Secret.yaml # /* @@ -120,6 +124,8 @@ metadata: app.kubernetes.io/version: "0.26.2" app.kubernetes.io/managed-by: Helm app.kubernetes.io/operated-by: vsecm + annotations: + kubernetes.io/service-account.name: vsecm-safe type: Opaque data: # '{}' (e30=) is a special placeholder to tell Safe that the Secret @@ -149,6 +155,8 @@ metadata: app.kubernetes.io/version: "0.26.2" app.kubernetes.io/managed-by: Helm app.kubernetes.io/operated-by: vsecm + annotations: + kubernetes.io/service-account.name: vsecm-sentinel type: Opaque stringData: data: "exit:true\n--\n" @@ -268,6 +276,53 @@ roleRef: # ## --- +# Source: vsecm/charts/sentinel/templates/Role.yaml +# /* +# | Protect your secrets, protect your sensitive data. +# : Explore VMware Secrets Manager docs at https://vsecm.com/ +# / keep your secrets... secret +# >/ +# <>/' Copyright 2023-present VMware Secrets Manager contributors. +# >/' SPDX-License-Identifier: BSD-2-Clause +# */ + +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: vsecm-sentinel-secret-reader + namespace: vsecm-system +rules: + - apiGroups: [""] + resources: ["secrets"] + verbs: ["get", "list", "watch"] + resourceNames: ["vsecm-sentinel-init-secret"] +--- +# Source: vsecm/charts/sentinel/templates/RoleBinding.yaml +# /* +# | Protect your secrets, protect your sensitive data. +# : Explore VMware Secrets Manager docs at https://vsecm.com/ +# / keep your secrets... secret +# >/ +# <>/' Copyright 2023-present VMware Secrets Manager contributors. +# >/' SPDX-License-Identifier: BSD-2-Clause +# */ + +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: read-secrets + namespace: vsecm-system +subjects: + - kind: ServiceAccount + name: vsecm-sentinel + namespace: vsecm-system +roleRef: + kind: Role + name: vsecm-sentinel-secret-reader + apiGroup: rbac.authorization.k8s.io +--- # Source: vsecm/charts/safe/templates/Service.yaml # /* # | Protect your secrets, protect your sensitive data. diff --git a/k8s/0.26.2/eks/vsecm-distroless.yaml b/k8s/0.26.2/eks/vsecm-distroless.yaml index f26776b6..f7822bdd 100644 --- a/k8s/0.26.2/eks/vsecm-distroless.yaml +++ b/k8s/0.26.2/eks/vsecm-distroless.yaml @@ -67,6 +67,8 @@ metadata: kubernetes.io/enforce-mountable-secrets: "true" kubernetes.io/mountable-secrets: vsecm-root-key automountServiceAccountToken: true +secrets: + - name: vsecm-root-key --- # Source: vsecm/charts/sentinel/templates/ServiceAccount.yaml # /* @@ -95,6 +97,8 @@ metadata: kubernetes.io/enforce-mountable-secrets: "true" kubernetes.io/mountable-secrets: vsecm-sentinel-init-secret automountServiceAccountToken: false +secrets: + - name: vsecm-sentinel-init-secret --- # Source: vsecm/charts/safe/templates/Secret.yaml # /* @@ -120,6 +124,8 @@ metadata: app.kubernetes.io/version: "0.26.2" app.kubernetes.io/managed-by: Helm app.kubernetes.io/operated-by: vsecm + annotations: + kubernetes.io/service-account.name: vsecm-safe type: Opaque data: # '{}' (e30=) is a special placeholder to tell Safe that the Secret @@ -149,6 +155,8 @@ metadata: app.kubernetes.io/version: "0.26.2" app.kubernetes.io/managed-by: Helm app.kubernetes.io/operated-by: vsecm + annotations: + kubernetes.io/service-account.name: vsecm-sentinel type: Opaque stringData: data: "exit:true\n--\n" @@ -268,6 +276,53 @@ roleRef: # ## --- +# Source: vsecm/charts/sentinel/templates/Role.yaml +# /* +# | Protect your secrets, protect your sensitive data. +# : Explore VMware Secrets Manager docs at https://vsecm.com/ +# / keep your secrets... secret +# >/ +# <>/' Copyright 2023-present VMware Secrets Manager contributors. +# >/' SPDX-License-Identifier: BSD-2-Clause +# */ + +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: vsecm-sentinel-secret-reader + namespace: vsecm-system +rules: + - apiGroups: [""] + resources: ["secrets"] + verbs: ["get", "list", "watch"] + resourceNames: ["vsecm-sentinel-init-secret"] +--- +# Source: vsecm/charts/sentinel/templates/RoleBinding.yaml +# /* +# | Protect your secrets, protect your sensitive data. +# : Explore VMware Secrets Manager docs at https://vsecm.com/ +# / keep your secrets... secret +# >/ +# <>/' Copyright 2023-present VMware Secrets Manager contributors. +# >/' SPDX-License-Identifier: BSD-2-Clause +# */ + +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: read-secrets + namespace: vsecm-system +subjects: + - kind: ServiceAccount + name: vsecm-sentinel + namespace: vsecm-system +roleRef: + kind: Role + name: vsecm-sentinel-secret-reader + apiGroup: rbac.authorization.k8s.io +--- # Source: vsecm/charts/safe/templates/Service.yaml # /* # | Protect your secrets, protect your sensitive data. diff --git a/k8s/0.26.2/local/vsecm-distroless-fips.yaml b/k8s/0.26.2/local/vsecm-distroless-fips.yaml index a913c1cf..72410516 100644 --- a/k8s/0.26.2/local/vsecm-distroless-fips.yaml +++ b/k8s/0.26.2/local/vsecm-distroless-fips.yaml @@ -67,6 +67,8 @@ metadata: kubernetes.io/enforce-mountable-secrets: "true" kubernetes.io/mountable-secrets: vsecm-root-key automountServiceAccountToken: true +secrets: + - name: vsecm-root-key --- # Source: vsecm/charts/sentinel/templates/ServiceAccount.yaml # /* @@ -95,6 +97,8 @@ metadata: kubernetes.io/enforce-mountable-secrets: "true" kubernetes.io/mountable-secrets: vsecm-sentinel-init-secret automountServiceAccountToken: false +secrets: + - name: vsecm-sentinel-init-secret --- # Source: vsecm/charts/safe/templates/Secret.yaml # /* @@ -120,6 +124,8 @@ metadata: app.kubernetes.io/version: "0.26.2" app.kubernetes.io/managed-by: Helm app.kubernetes.io/operated-by: vsecm + annotations: + kubernetes.io/service-account.name: vsecm-safe type: Opaque data: # '{}' (e30=) is a special placeholder to tell Safe that the Secret @@ -149,6 +155,8 @@ metadata: app.kubernetes.io/version: "0.26.2" app.kubernetes.io/managed-by: Helm app.kubernetes.io/operated-by: vsecm + annotations: + kubernetes.io/service-account.name: vsecm-sentinel type: Opaque stringData: data: "exit:true\n--\n" @@ -268,6 +276,53 @@ roleRef: # ## --- +# Source: vsecm/charts/sentinel/templates/Role.yaml +# /* +# | Protect your secrets, protect your sensitive data. +# : Explore VMware Secrets Manager docs at https://vsecm.com/ +# / keep your secrets... secret +# >/ +# <>/' Copyright 2023-present VMware Secrets Manager contributors. +# >/' SPDX-License-Identifier: BSD-2-Clause +# */ + +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: vsecm-sentinel-secret-reader + namespace: vsecm-system +rules: + - apiGroups: [""] + resources: ["secrets"] + verbs: ["get", "list", "watch"] + resourceNames: ["vsecm-sentinel-init-secret"] +--- +# Source: vsecm/charts/sentinel/templates/RoleBinding.yaml +# /* +# | Protect your secrets, protect your sensitive data. +# : Explore VMware Secrets Manager docs at https://vsecm.com/ +# / keep your secrets... secret +# >/ +# <>/' Copyright 2023-present VMware Secrets Manager contributors. +# >/' SPDX-License-Identifier: BSD-2-Clause +# */ + +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: read-secrets + namespace: vsecm-system +subjects: + - kind: ServiceAccount + name: vsecm-sentinel + namespace: vsecm-system +roleRef: + kind: Role + name: vsecm-sentinel-secret-reader + apiGroup: rbac.authorization.k8s.io +--- # Source: vsecm/charts/safe/templates/Service.yaml # /* # | Protect your secrets, protect your sensitive data. diff --git a/k8s/0.26.2/local/vsecm-distroless.yaml b/k8s/0.26.2/local/vsecm-distroless.yaml index 4257a23f..b6d98968 100644 --- a/k8s/0.26.2/local/vsecm-distroless.yaml +++ b/k8s/0.26.2/local/vsecm-distroless.yaml @@ -67,6 +67,8 @@ metadata: kubernetes.io/enforce-mountable-secrets: "true" kubernetes.io/mountable-secrets: vsecm-root-key automountServiceAccountToken: true +secrets: + - name: vsecm-root-key --- # Source: vsecm/charts/sentinel/templates/ServiceAccount.yaml # /* @@ -95,6 +97,8 @@ metadata: kubernetes.io/enforce-mountable-secrets: "true" kubernetes.io/mountable-secrets: vsecm-sentinel-init-secret automountServiceAccountToken: false +secrets: + - name: vsecm-sentinel-init-secret --- # Source: vsecm/charts/safe/templates/Secret.yaml # /* @@ -120,6 +124,8 @@ metadata: app.kubernetes.io/version: "0.26.2" app.kubernetes.io/managed-by: Helm app.kubernetes.io/operated-by: vsecm + annotations: + kubernetes.io/service-account.name: vsecm-safe type: Opaque data: # '{}' (e30=) is a special placeholder to tell Safe that the Secret @@ -149,6 +155,8 @@ metadata: app.kubernetes.io/version: "0.26.2" app.kubernetes.io/managed-by: Helm app.kubernetes.io/operated-by: vsecm + annotations: + kubernetes.io/service-account.name: vsecm-sentinel type: Opaque stringData: data: "exit:true\n--\n" @@ -268,6 +276,53 @@ roleRef: # ## --- +# Source: vsecm/charts/sentinel/templates/Role.yaml +# /* +# | Protect your secrets, protect your sensitive data. +# : Explore VMware Secrets Manager docs at https://vsecm.com/ +# / keep your secrets... secret +# >/ +# <>/' Copyright 2023-present VMware Secrets Manager contributors. +# >/' SPDX-License-Identifier: BSD-2-Clause +# */ + +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: vsecm-sentinel-secret-reader + namespace: vsecm-system +rules: + - apiGroups: [""] + resources: ["secrets"] + verbs: ["get", "list", "watch"] + resourceNames: ["vsecm-sentinel-init-secret"] +--- +# Source: vsecm/charts/sentinel/templates/RoleBinding.yaml +# /* +# | Protect your secrets, protect your sensitive data. +# : Explore VMware Secrets Manager docs at https://vsecm.com/ +# / keep your secrets... secret +# >/ +# <>/' Copyright 2023-present VMware Secrets Manager contributors. +# >/' SPDX-License-Identifier: BSD-2-Clause +# */ + +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: read-secrets + namespace: vsecm-system +subjects: + - kind: ServiceAccount + name: vsecm-sentinel + namespace: vsecm-system +roleRef: + kind: Role + name: vsecm-sentinel-secret-reader + apiGroup: rbac.authorization.k8s.io +--- # Source: vsecm/charts/safe/templates/Service.yaml # /* # | Protect your secrets, protect your sensitive data. diff --git a/k8s/0.26.2/remote/vsecm-distroless-fips.yaml b/k8s/0.26.2/remote/vsecm-distroless-fips.yaml index 167552c7..4a638950 100644 --- a/k8s/0.26.2/remote/vsecm-distroless-fips.yaml +++ b/k8s/0.26.2/remote/vsecm-distroless-fips.yaml @@ -67,6 +67,8 @@ metadata: kubernetes.io/enforce-mountable-secrets: "true" kubernetes.io/mountable-secrets: vsecm-root-key automountServiceAccountToken: true +secrets: + - name: vsecm-root-key --- # Source: vsecm/charts/sentinel/templates/ServiceAccount.yaml # /* @@ -95,6 +97,8 @@ metadata: kubernetes.io/enforce-mountable-secrets: "true" kubernetes.io/mountable-secrets: vsecm-sentinel-init-secret automountServiceAccountToken: false +secrets: + - name: vsecm-sentinel-init-secret --- # Source: vsecm/charts/safe/templates/Secret.yaml # /* @@ -120,6 +124,8 @@ metadata: app.kubernetes.io/version: "0.26.2" app.kubernetes.io/managed-by: Helm app.kubernetes.io/operated-by: vsecm + annotations: + kubernetes.io/service-account.name: vsecm-safe type: Opaque data: # '{}' (e30=) is a special placeholder to tell Safe that the Secret @@ -149,6 +155,8 @@ metadata: app.kubernetes.io/version: "0.26.2" app.kubernetes.io/managed-by: Helm app.kubernetes.io/operated-by: vsecm + annotations: + kubernetes.io/service-account.name: vsecm-sentinel type: Opaque stringData: data: "exit:true\n--\n" @@ -268,6 +276,53 @@ roleRef: # ## --- +# Source: vsecm/charts/sentinel/templates/Role.yaml +# /* +# | Protect your secrets, protect your sensitive data. +# : Explore VMware Secrets Manager docs at https://vsecm.com/ +# / keep your secrets... secret +# >/ +# <>/' Copyright 2023-present VMware Secrets Manager contributors. +# >/' SPDX-License-Identifier: BSD-2-Clause +# */ + +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: vsecm-sentinel-secret-reader + namespace: vsecm-system +rules: + - apiGroups: [""] + resources: ["secrets"] + verbs: ["get", "list", "watch"] + resourceNames: ["vsecm-sentinel-init-secret"] +--- +# Source: vsecm/charts/sentinel/templates/RoleBinding.yaml +# /* +# | Protect your secrets, protect your sensitive data. +# : Explore VMware Secrets Manager docs at https://vsecm.com/ +# / keep your secrets... secret +# >/ +# <>/' Copyright 2023-present VMware Secrets Manager contributors. +# >/' SPDX-License-Identifier: BSD-2-Clause +# */ + +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: read-secrets + namespace: vsecm-system +subjects: + - kind: ServiceAccount + name: vsecm-sentinel + namespace: vsecm-system +roleRef: + kind: Role + name: vsecm-sentinel-secret-reader + apiGroup: rbac.authorization.k8s.io +--- # Source: vsecm/charts/safe/templates/Service.yaml # /* # | Protect your secrets, protect your sensitive data. diff --git a/k8s/0.26.2/remote/vsecm-distroless.yaml b/k8s/0.26.2/remote/vsecm-distroless.yaml index 96287ebd..a0836362 100644 --- a/k8s/0.26.2/remote/vsecm-distroless.yaml +++ b/k8s/0.26.2/remote/vsecm-distroless.yaml @@ -67,6 +67,8 @@ metadata: kubernetes.io/enforce-mountable-secrets: "true" kubernetes.io/mountable-secrets: vsecm-root-key automountServiceAccountToken: true +secrets: + - name: vsecm-root-key --- # Source: vsecm/charts/sentinel/templates/ServiceAccount.yaml # /* @@ -95,6 +97,8 @@ metadata: kubernetes.io/enforce-mountable-secrets: "true" kubernetes.io/mountable-secrets: vsecm-sentinel-init-secret automountServiceAccountToken: false +secrets: + - name: vsecm-sentinel-init-secret --- # Source: vsecm/charts/safe/templates/Secret.yaml # /* @@ -120,6 +124,8 @@ metadata: app.kubernetes.io/version: "0.26.2" app.kubernetes.io/managed-by: Helm app.kubernetes.io/operated-by: vsecm + annotations: + kubernetes.io/service-account.name: vsecm-safe type: Opaque data: # '{}' (e30=) is a special placeholder to tell Safe that the Secret @@ -149,6 +155,8 @@ metadata: app.kubernetes.io/version: "0.26.2" app.kubernetes.io/managed-by: Helm app.kubernetes.io/operated-by: vsecm + annotations: + kubernetes.io/service-account.name: vsecm-sentinel type: Opaque stringData: data: "exit:true\n--\n" @@ -268,6 +276,53 @@ roleRef: # ## --- +# Source: vsecm/charts/sentinel/templates/Role.yaml +# /* +# | Protect your secrets, protect your sensitive data. +# : Explore VMware Secrets Manager docs at https://vsecm.com/ +# / keep your secrets... secret +# >/ +# <>/' Copyright 2023-present VMware Secrets Manager contributors. +# >/' SPDX-License-Identifier: BSD-2-Clause +# */ + +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: vsecm-sentinel-secret-reader + namespace: vsecm-system +rules: + - apiGroups: [""] + resources: ["secrets"] + verbs: ["get", "list", "watch"] + resourceNames: ["vsecm-sentinel-init-secret"] +--- +# Source: vsecm/charts/sentinel/templates/RoleBinding.yaml +# /* +# | Protect your secrets, protect your sensitive data. +# : Explore VMware Secrets Manager docs at https://vsecm.com/ +# / keep your secrets... secret +# >/ +# <>/' Copyright 2023-present VMware Secrets Manager contributors. +# >/' SPDX-License-Identifier: BSD-2-Clause +# */ + +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: read-secrets + namespace: vsecm-system +subjects: + - kind: ServiceAccount + name: vsecm-sentinel + namespace: vsecm-system +roleRef: + kind: Role + name: vsecm-sentinel-secret-reader + apiGroup: rbac.authorization.k8s.io +--- # Source: vsecm/charts/safe/templates/Service.yaml # /* # | Protect your secrets, protect your sensitive data.