You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: app/artifact-cas/README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ Its structure contains the following top to down layers.
20
20
21
21
## System Dependencies
22
22
23
-
The CAS proxy **has only one running dependency**. A secret storage backend to retrieve the OCI repository credentials. Currently, we support [Hashicorp Vault](https://www.vaultproject.io/), [AWS Secret Manager](https://aws.amazon.com/secrets-manager/) AND [GCP Secret Manager](https://cloud.google.com/secret-manager).
23
+
The CAS proxy **has only one running dependency**. A secret storage backend to retrieve the OCI repository credentials. Currently, we support [Hashicorp Vault](https://www.vaultproject.io/), [AWS Secrets Manager](https://aws.amazon.com/secrets-manager/) AND [GCP Secret Manager](https://cloud.google.com/secret-manager).
24
24
25
25
This secret backend is used to download OCI repository credentials (repository path + key pair) during upload/downloads. This makes the Artifact CAS multi-tenant by default since the destination OCI backend gets selected at runtime.
Copy file name to clipboardExpand all lines: deployment/chainloop/README.md
+39-8Lines changed: 39 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ The Helm Chart in this mode includes
50
50
During installation, you'll need to provide
51
51
52
52
- Open ID Connect Identity Provider (IDp) settings i.e [Auth0 settings](https://auth0.com/docs/get-started/applications/application-settings#basic-information)
53
-
- Connection settings for a secrets storage backend, either [Hashicorp Vault](https://www.vaultproject.io/) or [AWS Secret Manager](https://aws.amazon.com/secrets-manager)
53
+
- Connection settings for a secrets storage backend, either [Hashicorp Vault](https://www.vaultproject.io/) or [AWS Secrets Manager](https://aws.amazon.com/secrets-manager)
54
54
- ECDSA (ES512) key-pair used for Controlplane <-> CAS Authentication
55
55
56
56
Instructions on how to create the ECDSA keypair can be found [here](#generate-a-ecdsa-key-pair).
Connect to an external PostgreSQL database instead
108
124
109
125
```console
@@ -142,7 +158,7 @@ The Helm Chart in this mode includes
142
158
During installation, you'll need to provide
143
159
144
160
- Open ID Connect Identity Provider (IDp) settings i.e [Auth0 settings](https://auth0.com/docs/get-started/applications/application-settings#basic-information)
145
-
-~~Connection settings for a secrets storage backend, either [Hashicorp Vault](https://www.vaultproject.io/) or [AWS Secret Manager](https://aws.amazon.com/secrets-manager)~~
161
+
-~~Connection settings for a secrets storage backend, either [Hashicorp Vault](https://www.vaultproject.io/) or [AWS Secrets Manager](https://aws.amazon.com/secrets-manager)~~
146
162
-~~ECDSA (ES512) key-pair used for Controlplane <-> CAS Authentication~~
147
163
148
164
#### Installation Examples
@@ -309,9 +325,9 @@ controlplane:
309
325
database: chainloop-controlplane-prod
310
326
```
311
327
312
-
### Use AWS secret manager
328
+
### Use AWS secrets manager
313
329
314
-
You can swap the secret manager backend with the following settings
330
+
Instead of using [Hashicorp Vault](https://www.vaultproject.io/) (default), you can use [AWS Secrets Manager](https://aws.amazon.com/secrets-manager/) by adding these settings in your `values.yaml` file
315
331
316
332
```yaml
317
333
secretsBackend:
@@ -324,7 +340,7 @@ secretsBackend:
324
340
325
341
### Use GCP secret manager
326
342
327
-
You can swap the secretmanager backend with the following settings
343
+
Or [Google Cloud Secret Manager](https://cloud.google.com/secret-manager) with the following settings
328
344
329
345
```yaml
330
346
secretsBackend:
@@ -334,6 +350,21 @@ secretsBackend:
334
350
serviceAccountKey: [KEY]
335
351
```
336
352
353
+
### Use Azure KeyVault
354
+
355
+
[Azure KeyVault](https://azure.microsoft.com/en-us/products/key-vault/) is also supported
356
+
357
+
```yaml
358
+
secretsBackend:
359
+
backend: azureKeyVault
360
+
azureKeyVault:
361
+
tenantID: [TENANT_ID] # Active Directory Tenant ID
362
+
clientID: [CLIENT_ID] # Registered application / service principal client ID
363
+
clientSecret: [CLIENT_SECRET] # Service principal client secret
364
+
vaultURI: [VAULT URI] # Azure Key Vault URL
365
+
366
+
```
367
+
337
368
### Send exceptions to Sentry
338
369
339
370
You can configure different sentry projects for both the controlplane and the artifact CAS
0 commit comments