You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> **CAUTION**: Do not use this mode in production, for that, use the [standard mode](#standard-default) instead.
28
+
28
29
## Installing the Chart
29
30
30
31
This chart comes in **two flavors**, `standard` and [`development`](#development).
@@ -47,17 +48,12 @@ During installation, you'll need to provide
47
48
- Connection settings for a secrets storage backend, either [Hashicorp Vault](https://www.vaultproject.io/) or [AWS Secret Manager](https://aws.amazon.com/secrets-manager)
48
49
- ECDSA (ES512) key-pair used for Controlplane <-> CAS Authentication
Instructions on how to create the ECDSA keypair can be found [here](#generate-a-ecdsa-key-pair).
58
52
59
53
#### Installation Examples
60
54
55
+
> **NOTE**: **We do not recommend passing nor storing sensitive data in plain text**. For production, please consider having your overrides encrypted with tools such as [Sops](https://github.com/mozilla/sops), [Helm Secrets](https://github.com/jkroepke/helm-secrets) or [Sealed Secrets](https://github.com/bitnami-labs/sealed-secrets).
56
+
61
57
Deploy Chainloop configured to talk to the bundled PostgreSQL an external OIDC IDp and a Vault instance.
62
58
63
59
```console
@@ -121,6 +117,8 @@ The Helm Chart in this mode includes
121
117
- A PostgreSQL dependency enabled by default
122
118
-**A pre-configured Hashicorp Vault instance running in development mode (unsealed, in-memory, insecure)**
123
119
120
+
> **CAUTION**: Do not use this mode in production, for that, use the [standard mode](#standard-default) instead.
121
+
124
122
During installation, you'll need to provide
125
123
126
124
- Open ID Connect Identity Provider (IDp) settings i.e [Auth0 settings](https://auth0.com/docs/get-started/applications/application-settings#basic-information)
Then, you can either provide it in a custom `values.yaml` file override
155
+
156
+
```yaml
157
+
casJWTPrivateKey: |-
158
+
-----BEGIN EC PRIVATE KEY-----
159
+
REDACTED
160
+
-----END EC PRIVATE KEY-----
161
+
casJWTPublicKey: |
162
+
-----BEGIN PUBLIC KEY-----
163
+
REDACTED
164
+
-----END PUBLIC KEY-----
165
+
```
166
+
167
+
or as shown before, provide them as imperative inputs during Helm Install/Upgrade `--set casJWTPrivateKey="$(cat private.ec.key)"--set casJWTPublicKey="$(cat public.pem)"`
168
+
169
+
### Enable a custom domain with TLS
170
+
171
+
Chainloop uses three endpoints so we'll need to enable the ingress resource for each one of them.
172
+
173
+
See below an example of a `values.yaml` override
174
+
175
+
```yaml
176
+
controlplane:
177
+
ingress:
178
+
enabled: true
179
+
hostname: cp.chainloop.dev
180
+
181
+
ingressAPI:
182
+
enabled: true
183
+
hostname: api.cp.chainloop.dev
184
+
185
+
cas:
186
+
ingressAPI:
187
+
enabled: true
188
+
hostname: api.cas.chainloop.dev
189
+
```
190
+
191
+
A complete setup that uses
192
+
193
+
- NGINX as ingress Controller https://kubernetes.github.io/ingress-nginx/
194
+
- [cert-manager](https://cert-manager.io/) as TLS provider
Alternatively, if you are using [Google Cloud SQL](https://cloud.google.com/sql) and you are running Chainloop in Google Kubernetes Engine. You can connect instead via [a proxy](https://cloud.google.com/sql/docs/mysql/connect-kubernetes-engine#proxy)
252
+
253
+
This method can also be easily enabled in this chart by doing
254
+
255
+
```yaml
256
+
# Disable built-in DB
257
+
postgresql:
258
+
enabled: false
259
+
260
+
# Provide with external connection
261
+
controlplane:
262
+
sqlProxy:
263
+
# Inject the proxy sidecar
264
+
enabled: true
265
+
## @param controlplane.sqlProxy.connectionName Google Cloud SQL connection name
266
+
connectionName: "my-sql-instance"
267
+
# Then you'll need to configure your DB settings to use the proxy IP address
268
+
externalDatabase:
269
+
host: [proxy-sidecar-ip-address]
270
+
port: 5432
271
+
user: chainloop
272
+
password: [REDACTED]
273
+
database: chainloop-controlplane-prod
274
+
```
141
275
276
+
### Use AWS secret manager
277
+
278
+
You can swap the secret manager backend with the following settings
0 commit comments