feat: Add Helm chart for keylocker deployment #9
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This commit introduces a Helm chart for deploying the keylocker Python application to Kubernetes. The chart is designed to facilitate debugging and running keylocker as a CLI tool or for Python applications using the keylocker library.
Key changes include:
keylocker-chart/):values.yamlto provide flexible configuration for theimage, command/arguments, secret management (KEYLOCKER_SECRET_KEY,
VAULT_ADDR, VAULT_TOKEN via Kubernetes Secrets), and mounting of
custom configuration files or Python scripts via ConfigMaps.
templates/deployment.yamlto dynamically configure thedeployment based on
values.yaml, including environment variables,secret sourcing, command overrides, and volume mounts.
templates/NOTES.txtto offer detailedguidance on chart installation, configuration, secret management,
and usage examples for keylocker.
service.yaml,ingress.yaml, andhpa.yamlwhich are not relevant for a CLI tool by default.templates/tests/test-connection.yamlwith a moreappropriate test for a CLI application (verifies
keylocker --help).helm lintpasses for the chart.README.mdfor the chart is intended (content prepared).This chart allows you to run keylocker in your Kubernetes environment for processing YAML files with !SEC, !ENV, and !VAULT tags, or for running your own Python scripts that leverage the keylocker library for secret management.