Skip to content

Commit

Permalink
Merge pull request #2 from disposab1e/release-0.0.1
Browse files Browse the repository at this point in the history
Release 0.0.1
  • Loading branch information
disposab1e committed May 18, 2020
2 parents a9fb2f1 + 6e7f7e3 commit 8b588ce
Show file tree
Hide file tree
Showing 41 changed files with 1,132 additions and 6 deletions.
7 changes: 2 additions & 5 deletions .travis.yml
Original file line number Diff line number Diff line change
Expand Up @@ -169,8 +169,6 @@ jobs:
- build/scripts/test/ocp/sealed-secret-install
- build/scripts/test/ocp/sealed-secret-uninstall
- build/scripts/test/ocp/sealed-secrets-uninstall
- build/scripts/test/ocp/sealed-secrets-oauth-install
- build/scripts/test/ocp/sealed-secrets-uninstall
- build/scripts/test/ocp/operator-manual-uninstall
after_script:
- build/scripts/test/ocp3/minishift-stop
Expand Down Expand Up @@ -199,10 +197,9 @@ jobs:
- build/scripts/test/ocp/sealed-secrets-install
- build/scripts/test/ocp/sealed-secret-install
- build/scripts/test/ocp/sealed-secret-uninstall
- build/scripts/test/ocp/sealed-secrets-uninstall
- build/scripts/test/ocp/sealed-secrets-oauth-install
- build/scripts/test/ocp/sealed-secrets-uninstall
- build/scripts/test/ocp/operator-manual-uninstall
after_script:
- build/scripts/test/ocp3/minishift-stop
- build/scripts/test/ocp3/minishift-delete


7 changes: 7 additions & 0 deletions build/scripts/test/ocp/sealed-secret-install
Original file line number Diff line number Diff line change
@@ -1,6 +1,13 @@
#!/usr/bin/env bash
set -e

if [ "$DISTRIBUTION" == "ocp3" ]; then
eval $(minishift oc-env)
MARKETPLACE_NAMESPACE=olm
else
eval $(crc oc-env)
fi

echo "======================================================"
echo "Install Master Key and Test Sealed Secrets"
echo "======================================================"
Expand Down
7 changes: 7 additions & 0 deletions build/scripts/test/ocp/sealed-secret-uninstall
Original file line number Diff line number Diff line change
@@ -1,6 +1,13 @@
#!/usr/bin/env bash
set -e

if [ "$DISTRIBUTION" == "ocp3" ]; then
eval $(minishift oc-env)
MARKETPLACE_NAMESPACE=olm
else
eval $(crc oc-env)
fi

echo "======================================================"
echo "Uninstall Sealed Secrets"
echo "======================================================"
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
apiVersion: apiextensions.k8s.io/v1beta1
kind: CustomResourceDefinition
metadata:
name: sealedsecretcontrollers.bitnami.com
spec:
group: bitnami.com
names:
kind: SealedSecretController
listKind: SealedSecretControllerList
plural: sealedsecretcontrollers
singular: sealedsecretcontroller
scope: Namespaced
subresources:
status: {}
version: v1alpha1
versions:
- name: v1alpha1
served: true
storage: true
Original file line number Diff line number Diff line change
@@ -0,0 +1,250 @@
apiVersion: operators.coreos.com/v1alpha1
kind: ClusterServiceVersion
metadata:
annotations:
alm-examples: |-
[
{
"apiVersion": "bitnami.com/v1alpha1",
"kind": "SealedSecretController",
"metadata": {
"name": "SealedSecretController"
},
"spec": {
"image": {
"repository": "quay.io/bitnami/sealed-secrets-controller",
"tag": "v0.12.3",
"pullPolicy": "IfNotPresent"
},
"resources": {
},
"nodeSelector": {
},
"tolerations": [
],
"affinity": {
},
"controller": {
"create": true
},
"serviceAccount": {
"create": true,
"name": ""
},
"rbac": {
"create": true,
"pspEnabled": false
},
"secretName": "sealed-secrets-key",
"ingress": {
"enabled": false,
"annotations": {
},
"path": "/v1/cert.pem",
"hosts": [
"chart-example.local"
],
"tls": [
]
},
"crd": {
"create": true,
"keep": true
},
"networkPolicy": false,
"securityContext": {
"runAsUser": 1001,
"fsGroup": 65534
},
"podAnnotations": {
},
"podLabels": {
},
"priorityClassName": ""
}
}
]
capabilities: Basic Install
createdAt: 2020-05-16 01:01:01
categories: "Security"
description: A Kubernetes controller and tool for one-way encrypted Secrets.
certified: "false"
containerImage: quay.io/disposab1e/sealed-secrets-operator-helm:v0.0.1
support: Community
repository: https://github.com/disposab1e/sealed-secrets-operator-helm.git
name: sealed-secrets-operator-helm.v0.0.1
namespace: placeholder
spec:
apiservicedefinitions: {}
customresourcedefinitions:
owned:
- kind: SealedSecretController
displayName: SealedSecretController
name: sealedsecretcontrollers.bitnami.com
version: v1alpha1
description: 'Represents the Sealed Secret Controller installation.'
description: |
[Sealed Secrets](https://github.com/bitnami-labs/sealed-secrets) is a Kubernetes controller and tool for one-way encrypted Secrets.
### Overview
This **community maintained** [Sealed Secrets Operator (Helm)](https://github.com/disposab1e/sealed-secrets-operator-helm) is based on the **community maintained** [Sealed Secrets Helm Chart](https://hub.kubeapps.com/charts/stable/sealed-secrets) and installs [Sealed Secrets](https://github.com/bitnami-labs/sealed-secrets) in Kubernetes.
### Features
* Easy configuration and installation
### Install
The operator shares all [configuration values](https://github.com/disposab1e/sealed-secrets-operator-helm/blob/release-0.0.1/helm-charts/sealed-secrets/README.md)
from the Sealed Secrets Helm Chart and manages a single namespace installation of Sealed Secrets.
Therefore you have to install the operator and Sealed Secrets in the same namespace.
For simplicity we recommend creating a namespace **sealed-secrets**.
To install Sealed Secrets create a new [SealedSecretController resource](https://github.com/disposab1e/sealed-secrets-operator-helm/blob/release-0.0.1/examples/k8s.yaml)
with your own customizations or use the provided example from the Web UI.
### kubeseal
Install the kubeseal command line interface by downloading the binary from Sealed Secrets [releases](https://github.com/bitnami-labs/sealed-secrets/releases) and read about kubeseal usage on Sealed Secrets [docs](https://github.com/bitnami-labs/sealed-secrets#usage).
### Documentation
See the [documentation](https://sealed-secrets-operator-helm.readthedocs.io/en/0.0.1/)
and [examples](https://github.com/disposab1e/sealed-secrets-operator-helm/blob/release-0.0.1/examples/)
or visit the [official github repository](https://github.com/disposab1e/sealed-secrets-operator-helm) for more information.
displayName: Sealed Secrets Operator (Helm)
links:
- name: Sealed Secrets
url: https://github.com/bitnami-labs/sealed-secrets/
- name: GitHub
url: https://github.com/disposab1e/sealed-secrets-operator-helm.git
- name: Read the Docs
url: https://sealed-secrets-operator-helm.rtfd.io
icon:
- base64data: iVBORw0KGgoAAAANSUhEUgAAAH8AAAB/CAIAAABJ34pEAAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAAALxJREFUeNrs0EEBAAAEBDD073xi8NgirJMUR0aBffvYt499+9i3j3372LePffvYt499+9i3j3372LePffv2sW8f+/axbx/79rFvH/v2sW8f+/axbx/79rFvH/v27WPfPvbtY98+9u1j3z727WPfPvbtY98+9u1j3z727WPfvn3s28e+fezbx7597NvHvn3s28e+fezbx7597NvHvn372LePffvYt499+9i3j3372LePffvYt499+9h/ZgUYAC87A/u7uacYAAAAAElFTkSuQmCC
mediatype: image/png
maintainers:
- name: Disposable Zone
email: disposable.source@icloud.com
install:
spec:
clusterPermissions:
- rules:
- apiGroups:
- ""
resources:
- namespaces
- pods
- services
- services/finalizers
- endpoints
- events
- configmaps
- secrets
- serviceaccounts
verbs:
- '*'
- apiGroups:
- apps
resources:
- deployments
- replicasets
verbs:
- '*'
- apiGroups:
- apps
resourceNames:
- sealed-secrets-operator-helm
resources:
- deployments/finalizers
verbs:
- update
- apiGroups:
- ""
resources:
- pods
verbs:
- get
- apiGroups:
- apps
resources:
- replicasets
verbs:
- get
- apiGroups:
- bitnami.com
resources:
- '*'
verbs:
- '*'
- apiGroups:
- apiextensions.k8s.io
resources:
- customresourcedefinitions
verbs:
- '*'
- apiGroups:
- monitoring.coreos.com
resources:
- prometheuses
- servicemonitors
verbs:
- '*'
- apiGroups:
- rbac.authorization.k8s.io
resources:
- clusterrolebindings
- clusterroles
- rolebindings
- roles
verbs:
- '*'
serviceAccountName: sealed-secrets-operator-helm
deployments:
- name: sealed-secrets-operator-helm
spec:
replicas: 1
selector:
matchLabels:
name: sealed-secrets-operator-helm
strategy: {}
template:
metadata:
labels:
name: sealed-secrets-operator-helm
spec:
containers:
- env:
- name: WATCH_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.annotations['olm.targetNamespaces']
- name: POD_NAME
valueFrom:
fieldRef:
fieldPath: metadata.name
- name: OPERATOR_NAME
value: sealed-secrets-operator-helm
image: quay.io/disposab1e/sealed-secrets-operator-helm:v0.0.1
imagePullPolicy: Always
name: sealed-secrets-operator-helm
resources: {}
serviceAccountName: sealed-secrets-operator-helm
strategy: deployment
installModes:
- supported: true
type: OwnNamespace
- supported: true
type: SingleNamespace
- supported: false
type: MultiNamespace
- supported: false
type: AllNamespaces
maturity: alpha
version: 0.0.1
provider:
name: Disposable Zone
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
channels:
- currentCSV: sealed-secrets-operator-helm.v0.0.1
name: alpha
defaultChannel: alpha
packageName: sealed-secrets-operator-helm

Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
apiVersion: apiextensions.k8s.io/v1beta1
kind: CustomResourceDefinition
metadata:
name: sealedsecretcontrollers.bitnami.com
spec:
group: bitnami.com
names:
kind: SealedSecretController
listKind: SealedSecretControllerList
plural: sealedsecretcontrollers
singular: sealedsecretcontroller
scope: Namespaced
subresources:
status: {}
version: v1alpha1
versions:
- name: v1alpha1
served: true
storage: true

0 comments on commit 8b588ce

Please sign in to comment.