Skip to content

Conversation

@mimartin12
Copy link
Collaborator

@mimartin12 mimartin12 commented Jan 8, 2026

🎟️ Tracking

📔 Objective

This change allows users to set all secrets used in the Self-host deployment, including bringing their own identity.pfx certificate.

This aims to provide more flexibility for installations that rely on secrets sourced from a secret management system as well as deployments managed by platforms such as Argo CD or Flux.
#401

Today, the chart does support some user provided secrets as shown here https://github.com/bitwarden/helm-charts/blob/main/charts/self-host/README.md#secrets. In this configuration the chart will generate additional secrets using Kubernetes jobs:

Using this new configuration, a user can opt out of the generated secrets and provide the name of their own secrets. This effectively skips all secret generation and uses the two secretName values.

secrets:
  secretName: custom-secret
  secretKeys:
    generate: false
  identityCertificate:
    generate: false
    secretName: custom-certificate

📸 Screenshots

⏰ Reminders before review

  • Contributor guidelines followed
  • All formatters and local linters executed and passed
  • Written new unit and / or integration tests where applicable
  • Protected functional changes with optionality (feature flags)
  • Used internationalization (i18n) for all UI strings
  • CI builds passed
  • Communicated to DevOps any deployment requirements
  • Updated any necessary documentation (Confluence, contributing docs) or informed the documentation team

🦮 Reviewer guidelines

  • 👍 (:+1:) or similar for great changes
  • 📝 (:memo:) or ℹ️ (:information_source:) for notes or general info
  • ❓ (:question:) for questions
  • 🤔 (:thinking:) or 💭 (:thought_balloon:) for more open inquiry that's not quite a confirmed issue and could potentially benefit from discussion
  • 🎨 (:art:) for suggestions / improvements
  • ❌ (:x:) or ⚠️ (:warning:) for more significant problems or concerns needing attention
  • 🌱 (:seedling:) or ♻️ (:recycle:) for future improvements or indications of technical debt
  • ⛏ (:pick:) for minor or nitpick changes

@github-actions
Copy link
Contributor

github-actions bot commented Jan 8, 2026

Logo
Checkmarx One – Scan Summary & Details3ee284a7-27d2-4473-bf03-6202cc64c89c

Great job! No new security vulnerabilities introduced in this pull request

- Support user provided certificates and keys.
- Add tests
- Update README

- Set defaults

Update README
- Add required inputs
- Update schema

Update schema
- Drop test file

Lint
- Drop testing annotation

Move certificate password to certificate secret

Switch from "autoGenerate" to "generate"
- After sleeping on it, I like just "generate"
- Updates README with more concise steps
- Brings the .pfx passphrase into the .pfx secret itself.
@mimartin12 mimartin12 force-pushed the BRE-992-user-provided-secrets branch from a377d5b to f921e81 Compare January 9, 2026 17:25
@mimartin12 mimartin12 changed the title BRE-992-BYOS BRE-992: Extend user provided secrets and certificate Jan 12, 2026
Update comment to clarify keys secret name generation
@mimartin12 mimartin12 marked this pull request as ready for review January 13, 2026 21:00
@mimartin12 mimartin12 requested a review from a team as a code owner January 13, 2026 21:00
@mimartin12 mimartin12 requested review from a team and gitclonebrian and removed request for a team January 13, 2026 21:00
openssl rand -hex 64 # Repeat three times
```

1. Generate a `identity.pfx` certificate for the identity service. You can use OpenSSL or using a tool to generate a self-signed certificate.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
1. Generate a `identity.pfx` certificate for the identity service. You can use OpenSSL or using a tool to generate a self-signed certificate.
1. Generate a `identity.pfx` certificate for the identity service. You can use OpenSSL or any other certificate tool to generate a self-signed certificate.

Copy link

@gitclonebrian gitclonebrian left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

✅ 🚀

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants