@@ -89,6 +89,20 @@ helm install [RELEASE_NAME] oci://ghcr.io/chainloop-dev/charts/chainloop \
89
89
# ...
90
90
```
91
91
92
+ Deploy using GCP secret manager instead of Vault
93
+
94
+ ``` console
95
+ helm install [RELEASE_NAME] oci://ghcr.io/chainloop-dev/charts/chainloop \
96
+ # Open ID Connect (OIDC)
97
+ # ...
98
+ # Secrets backend
99
+ --set secretsBackend.backend=gcpSecretManager \
100
+ --set secretsBackend.gcpSecretManager.projectId=[GCP Project ID] \
101
+ --set secretsBackend.gcpSecretManager.authKey=[GCP Auth KEY] \
102
+ # Server Auth KeyPair
103
+ # ...
104
+ ```
105
+
92
106
Connect to an external PostgreSQL database instead
93
107
94
108
``` console
@@ -292,6 +306,19 @@ secretsBackend:
292
306
secretKey: [SECRET]
293
307
region: [REGION]
294
308
` ` `
309
+
310
+ # ## Use GCP secret manager
311
+
312
+ You can swap the secret manager backend with the following settings
313
+
314
+ ` ` ` yaml
315
+ secretsBackend:
316
+ backend: gcpSecretManager
317
+ gcpSecretManager:
318
+ projectId: [PROJECT_ID]
319
+ authKey: [KEY]
320
+ ` ` `
321
+
295
322
# ## Send exceptions to Sentry
296
323
297
324
` ` ` yaml
@@ -332,15 +359,17 @@ chainloop config save \
332
359
333
360
### Secrets Backend
334
361
335
- | Name | Description | Value |
336
- | ------------------------------------------- | -------------------------------------------------------------------- | ----------- |
337
- | `secretsBackend.backend` | Secrets backend type ("vault" or "awsSecretManager") | `vault` |
338
- | `secretsBackend.secretPrefix` | Prefix that will be pre-pended to all secrets in the storage backend | `chainloop` |
339
- | `secretsBackend.vault.address` | Vault address | |
340
- | `secretsBackend.vault.token` | Vault authentication token | |
341
- | `secretsBackend.awsSecretManager.accessKey` | AWS Access KEY ID | |
342
- | `secretsBackend.awsSecretManager.secretKey` | AWS Secret Key | |
343
- | `secretsBackend.awsSecretManager.region` | AWS Secret Manager Region | |
362
+ | Name | Description | Value |
363
+ | ------------------------------------------- | --------------------------------------------------------------------- | ----------- |
364
+ | `secretsBackend.backend` | Secrets backend type ("vault", "awsSecretManager", "gcpSecretManager")| `vault` |
365
+ | `secretsBackend.secretPrefix` | Prefix that will be pre-pended to all secrets in the storage backend | `chainloop` |
366
+ | `secretsBackend.vault.address` | Vault address | |
367
+ | `secretsBackend.vault.token` | Vault authentication token | |
368
+ | `secretsBackend.awsSecretManager.accessKey` | AWS Access KEY ID | |
369
+ | `secretsBackend.awsSecretManager.secretKey` | AWS Secret Key | |
370
+ | `secretsBackend.awsSecretManager.region` | AWS Secret Manager Region | |
371
+ | `secretsBackend.gcpSecretManager.projectId` | GCP Project ID | |
372
+ | `secretsBackend.gcpSecretManager.authKey` | GCP Auth Key | |
344
373
345
374
### Authentication
346
375
@@ -508,4 +537,4 @@ Unless required by applicable law or agreed to in writing, software
508
537
distributed under the License is distributed on an "AS IS" BASIS,
509
538
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
510
539
See the License for the specific language governing permissions and
511
- limitations under the License.
540
+ limitations under the License.
0 commit comments