Context
Self-hosted Corveil reads a signed RS256 JWT at boot (see corveil issue: self-hosted license verification). The chart needs a clean way to materialize the license in the pod, either via a Secret the deployer creates or a values-provided raw JWT.
Goal
A license.* values block + a templates/license-secret.yaml + a Deployment volume mount so Corveil finds the license at /etc/corveil/license.jwt.
Work items
Acceptance
helm install with license.enabled=true + license.jwt=<valid> renders the Secret and mounts it; Corveil boots and logs license loaded.
helm install with defaults boots Corveil in community mode (no license mount, no Secret).
Dependencies
- Corveil product ticket for license verification.
Key files
values.yaml
templates/license-secret.yaml (new)
templates/deployment.yaml (volume mount)
README.md (licensing section)
Context
Self-hosted Corveil reads a signed RS256 JWT at boot (see corveil issue: self-hosted license verification). The chart needs a clean way to materialize the license in the pod, either via a Secret the deployer creates or a values-provided raw JWT.
Goal
A
license.*values block + atemplates/license-secret.yaml+ a Deployment volume mount so Corveil finds the license at/etc/corveil/license.jwt.Work items
values.yaml:license.enabled && license.jwt, atemplates/license-secret.yamlrenders a Secret named{{ include "corveil.fullname" . }}-licensewith keylicense.jwt.license.enabled, Deployment mounts the Secret (fromexistingSecretor the rendered one) at/etc/corveil/license.jwtread-only.Acceptance
helm installwithlicense.enabled=true+license.jwt=<valid>renders the Secret and mounts it; Corveil boots and logslicense loaded.helm installwith defaults boots Corveil in community mode (no license mount, no Secret).Dependencies
Key files
values.yamltemplates/license-secret.yaml(new)templates/deployment.yaml(volume mount)README.md(licensing section)