|
| 1 | +# Backends and Authentication Types |
| 2 | + |
| 3 | +This document provides a comprehensive overview of the supported backends, authentication types, and backend configurations in the Helm Values Manager. |
| 4 | + |
| 5 | +## Supported Backends |
| 6 | + |
| 7 | +The Helm Values Manager supports the following backend types for storing values: |
| 8 | + |
| 9 | +| Backend Type | Description | Use Case | Status | |
| 10 | +|--------------|-------------|----------|--------| |
| 11 | +| `git-secret` | Uses git-secret for encrypting sensitive values | Local development, small teams | Planned | |
| 12 | +| `aws` | Uses AWS Secrets Manager for storing sensitive values | AWS-based deployments | Planned | |
| 13 | +| `azure` | Uses Azure Key Vault for storing sensitive values | Azure-based deployments | Planned | |
| 14 | +| `gcp` | Uses Google Secret Manager for storing sensitive values | GCP-based deployments | Planned | |
| 15 | + |
| 16 | +### Backend Selection Criteria |
| 17 | + |
| 18 | +When selecting a backend, consider: |
| 19 | + |
| 20 | +1. **Security Requirements**: Different backends offer varying levels of security, audit capabilities, and compliance features. |
| 21 | +2. **Cloud Provider**: Select the backend that aligns with your cloud infrastructure. |
| 22 | +3. **Team Size**: For small teams, simpler backends like `git-secret` may be sufficient. |
| 23 | +4. **Operational Complexity**: Some backends require more setup and maintenance than others. |
| 24 | + |
| 25 | +## Authentication Types |
| 26 | + |
| 27 | +Each backend supports multiple authentication methods: |
| 28 | + |
| 29 | +| Auth Type | Description | Required Parameters | Supported Backends | |
| 30 | +|-----------|-------------|---------------------|-------------------| |
| 31 | +| `direct` | Direct credential input | `credentials` object | All | |
| 32 | +| `env` | Environment variable-based authentication | `env_prefix` | All | |
| 33 | +| `file` | File-based authentication | `path` to auth file | All | |
| 34 | +| `managed_identity` | Cloud provider managed identity | None | `aws`, `azure`, `gcp` | |
| 35 | + |
| 36 | +### Authentication Type Details |
| 37 | + |
| 38 | +#### Direct Authentication (`direct`) |
| 39 | + |
| 40 | +Credentials are provided directly in the configuration file. This is suitable for testing but not recommended for production use. |
| 41 | + |
| 42 | +**Required Parameters:** |
| 43 | +- `credentials`: An object containing backend-specific credentials |
| 44 | + |
| 45 | +**Example:** |
| 46 | +```json |
| 47 | +"auth": { |
| 48 | + "type": "direct", |
| 49 | + "credentials": { |
| 50 | + "token": "your-token-here" |
| 51 | + } |
| 52 | +} |
| 53 | +``` |
| 54 | + |
| 55 | +#### Environment Variable Authentication (`env`) |
| 56 | + |
| 57 | +Credentials are read from environment variables. This is suitable for CI/CD pipelines and containerized deployments. |
| 58 | + |
| 59 | +**Required Parameters:** |
| 60 | +- `env_prefix`: Prefix for environment variables |
| 61 | + |
| 62 | +**Example:** |
| 63 | +```json |
| 64 | +"auth": { |
| 65 | + "type": "env", |
| 66 | + "env_prefix": "AWS_" |
| 67 | +} |
| 68 | +``` |
| 69 | + |
| 70 | +#### File Authentication (`file`) |
| 71 | + |
| 72 | +Credentials are read from a file. This is suitable for local development and when credentials are managed by external systems. |
| 73 | + |
| 74 | +**Required Parameters:** |
| 75 | +- `path`: Path to the authentication file |
| 76 | + |
| 77 | +**Example:** |
| 78 | +```json |
| 79 | +"auth": { |
| 80 | + "type": "file", |
| 81 | + "path": "~/.aws/credentials" |
| 82 | +} |
| 83 | +``` |
| 84 | + |
| 85 | +#### Managed Identity Authentication (`managed_identity`) |
| 86 | + |
| 87 | +Uses cloud provider's managed identity service. This is the recommended approach for production deployments in cloud environments. |
| 88 | + |
| 89 | +**Required Parameters:** |
| 90 | +- None |
| 91 | + |
| 92 | +**Example:** |
| 93 | +```json |
| 94 | +"auth": { |
| 95 | + "type": "managed_identity" |
| 96 | +} |
| 97 | +``` |
| 98 | + |
| 99 | +## Backend Configurations |
| 100 | + |
| 101 | +Each backend may require additional configuration parameters: |
| 102 | + |
| 103 | +### Git Secret Backend (`git-secret`) |
| 104 | + |
| 105 | +| Parameter | Description | Required | Default | |
| 106 | +|-----------|-------------|----------|---------| |
| 107 | +| None | No additional configuration required | - | - | |
| 108 | + |
| 109 | +### AWS Secrets Manager Backend (`aws`) |
| 110 | + |
| 111 | +| Parameter | Description | Required | Default | |
| 112 | +|-----------|-------------|----------|---------| |
| 113 | +| `region` | AWS region | Yes | - | |
| 114 | +| `prefix` | Prefix for secret names | No | Empty string | |
| 115 | +| `endpoint` | Custom endpoint URL | No | AWS default endpoint | |
| 116 | + |
| 117 | +**Example:** |
| 118 | +```json |
| 119 | +"backend_config": { |
| 120 | + "region": "us-west-2", |
| 121 | + "prefix": "myapp/" |
| 122 | +} |
| 123 | +``` |
| 124 | + |
| 125 | +### Azure Key Vault Backend (`azure`) |
| 126 | + |
| 127 | +| Parameter | Description | Required | Default | |
| 128 | +|-----------|-------------|----------|---------| |
| 129 | +| `vault_url` | Key Vault URL | Yes | - | |
| 130 | +| `prefix` | Prefix for secret names | No | Empty string | |
| 131 | + |
| 132 | +**Example:** |
| 133 | +```json |
| 134 | +"backend_config": { |
| 135 | + "vault_url": "https://myvault.vault.azure.net/", |
| 136 | + "prefix": "myapp-" |
| 137 | +} |
| 138 | +``` |
| 139 | + |
| 140 | +### Google Secret Manager Backend (`gcp`) |
| 141 | + |
| 142 | +| Parameter | Description | Required | Default | |
| 143 | +|-----------|-------------|----------|---------| |
| 144 | +| `project_id` | GCP Project ID | Yes | - | |
| 145 | +| `prefix` | Prefix for secret names | No | Empty string | |
| 146 | + |
| 147 | +**Example:** |
| 148 | +```json |
| 149 | +"backend_config": { |
| 150 | + "project_id": "my-gcp-project", |
| 151 | + "prefix": "myapp_" |
| 152 | +} |
| 153 | +``` |
| 154 | + |
| 155 | +## Implementation Status |
| 156 | + |
| 157 | +For the MVP release, the following components are implemented: |
| 158 | + |
| 159 | +1. **Command Interface**: |
| 160 | + - `add-deployment`: Command interface implemented |
| 161 | + - Backend validation: Interface defined, implementation pending |
| 162 | + |
| 163 | +2. **Backends**: |
| 164 | + - All backends: Interface defined, implementation pending |
| 165 | + |
| 166 | +3. **Authentication Types**: |
| 167 | + - All auth types: Interface defined, implementation pending |
| 168 | + |
| 169 | +4. **Backend Configurations**: |
| 170 | + - Basic validation implemented |
| 171 | + - Backend-specific validation defined in the command interface |
| 172 | + |
| 173 | +## Future Enhancements |
| 174 | + |
| 175 | +1. **Additional Backends**: |
| 176 | + - HashiCorp Vault |
| 177 | + - Kubernetes Secrets |
| 178 | + - Custom backends via plugins |
| 179 | + |
| 180 | +2. **Enhanced Authentication**: |
| 181 | + - OIDC support |
| 182 | + - Role-based access for cloud providers |
| 183 | + - Multi-factor authentication integration |
| 184 | + |
| 185 | +3. **Configuration Extensions**: |
| 186 | + - Rotation policies |
| 187 | + - Versioning support |
| 188 | + - Audit logging |
0 commit comments