external-secrets.io_secretstores.yaml 55 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034
  1. apiVersion: apiextensions.k8s.io/v1
  2. kind: CustomResourceDefinition
  3. metadata:
  4. annotations:
  5. controller-gen.kubebuilder.io/version: v0.5.0
  6. creationTimestamp: null
  7. name: secretstores.external-secrets.io
  8. spec:
  9. group: external-secrets.io
  10. names:
  11. categories:
  12. - externalsecrets
  13. kind: SecretStore
  14. listKind: SecretStoreList
  15. plural: secretstores
  16. shortNames:
  17. - ss
  18. singular: secretstore
  19. scope: Namespaced
  20. versions:
  21. - additionalPrinterColumns:
  22. - jsonPath: .metadata.creationTimestamp
  23. name: AGE
  24. type: date
  25. name: v1alpha1
  26. schema:
  27. openAPIV3Schema:
  28. description: SecretStore represents a secure external location for storing
  29. secrets, which can be referenced as part of `storeRef` fields.
  30. properties:
  31. apiVersion:
  32. description: 'APIVersion defines the versioned schema of this representation
  33. of an object. Servers should convert recognized schemas to the latest
  34. internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
  35. type: string
  36. kind:
  37. description: 'Kind is a string value representing the REST resource this
  38. object represents. Servers may infer this from the endpoint the client
  39. submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
  40. type: string
  41. metadata:
  42. type: object
  43. spec:
  44. description: SecretStoreSpec defines the desired state of SecretStore.
  45. properties:
  46. controller:
  47. description: 'Used to select the correct KES controller (think: ingress.ingressClassName)
  48. The KES controller is instantiated with a specific controller name
  49. and filters ES based on this property'
  50. type: string
  51. provider:
  52. description: Used to configure the provider. Only one provider may
  53. be set
  54. maxProperties: 1
  55. minProperties: 1
  56. properties:
  57. akeyless:
  58. description: Akeyless configures this store to sync secrets using
  59. Akeyless Vault provider
  60. properties:
  61. akeylessGWApiURL:
  62. description: Akeyless GW API Url from which the secrets to
  63. be fetched from.
  64. type: string
  65. authSecretRef:
  66. description: Auth configures how the operator authenticates
  67. with Akeyless.
  68. properties:
  69. secretRef:
  70. description: 'AkeylessAuthSecretRef AKEYLESS_ACCESS_TYPE_PARAM:
  71. AZURE_OBJ_ID OR GCP_AUDIENCE OR ACCESS_KEY OR KUB_CONFIG_NAME.'
  72. properties:
  73. accessID:
  74. description: The SecretAccessID is used for authentication
  75. properties:
  76. key:
  77. description: The key of the entry in the Secret
  78. resource's `data` field to be used. Some instances
  79. of this field may be defaulted, in others it
  80. may be required.
  81. type: string
  82. name:
  83. description: The name of the Secret resource being
  84. referred to.
  85. type: string
  86. namespace:
  87. description: Namespace of the resource being referred
  88. to. Ignored if referent is not cluster-scoped.
  89. cluster-scoped defaults to the namespace of
  90. the referent.
  91. type: string
  92. type: object
  93. accessType:
  94. description: A reference to a specific 'key' within
  95. a Secret resource, In some instances, `key` is a
  96. required field.
  97. properties:
  98. key:
  99. description: The key of the entry in the Secret
  100. resource's `data` field to be used. Some instances
  101. of this field may be defaulted, in others it
  102. may be required.
  103. type: string
  104. name:
  105. description: The name of the Secret resource being
  106. referred to.
  107. type: string
  108. namespace:
  109. description: Namespace of the resource being referred
  110. to. Ignored if referent is not cluster-scoped.
  111. cluster-scoped defaults to the namespace of
  112. the referent.
  113. type: string
  114. type: object
  115. accessTypeParam:
  116. description: A reference to a specific 'key' within
  117. a Secret resource, In some instances, `key` is a
  118. required field.
  119. properties:
  120. key:
  121. description: The key of the entry in the Secret
  122. resource's `data` field to be used. Some instances
  123. of this field may be defaulted, in others it
  124. may be required.
  125. type: string
  126. name:
  127. description: The name of the Secret resource being
  128. referred to.
  129. type: string
  130. namespace:
  131. description: Namespace of the resource being referred
  132. to. Ignored if referent is not cluster-scoped.
  133. cluster-scoped defaults to the namespace of
  134. the referent.
  135. type: string
  136. type: object
  137. type: object
  138. required:
  139. - secretRef
  140. type: object
  141. required:
  142. - akeylessGWApiURL
  143. - authSecretRef
  144. type: object
  145. alibaba:
  146. description: Alibaba configures this store to sync secrets using
  147. Alibaba Cloud provider
  148. properties:
  149. auth:
  150. description: AlibabaAuth contains a secretRef for credentials.
  151. properties:
  152. secretRef:
  153. description: AlibabaAuthSecretRef holds secret references
  154. for Alibaba credentials.
  155. properties:
  156. accessKeyIDSecretRef:
  157. description: The AccessKeyID is used for authentication
  158. properties:
  159. key:
  160. description: The key of the entry in the Secret
  161. resource's `data` field to be used. Some instances
  162. of this field may be defaulted, in others it
  163. may be required.
  164. type: string
  165. name:
  166. description: The name of the Secret resource being
  167. referred to.
  168. type: string
  169. namespace:
  170. description: Namespace of the resource being referred
  171. to. Ignored if referent is not cluster-scoped.
  172. cluster-scoped defaults to the namespace of
  173. the referent.
  174. type: string
  175. type: object
  176. accessKeySecretSecretRef:
  177. description: The AccessKeySecret is used for authentication
  178. properties:
  179. key:
  180. description: The key of the entry in the Secret
  181. resource's `data` field to be used. Some instances
  182. of this field may be defaulted, in others it
  183. may be required.
  184. type: string
  185. name:
  186. description: The name of the Secret resource being
  187. referred to.
  188. type: string
  189. namespace:
  190. description: Namespace of the resource being referred
  191. to. Ignored if referent is not cluster-scoped.
  192. cluster-scoped defaults to the namespace of
  193. the referent.
  194. type: string
  195. type: object
  196. required:
  197. - accessKeyIDSecretRef
  198. - accessKeySecretSecretRef
  199. type: object
  200. required:
  201. - secretRef
  202. type: object
  203. endpoint:
  204. type: string
  205. regionID:
  206. description: Alibaba Region to be used for the provider
  207. type: string
  208. required:
  209. - auth
  210. - regionID
  211. type: object
  212. aws:
  213. description: AWS configures this store to sync secrets using AWS
  214. Secret Manager provider
  215. properties:
  216. auth:
  217. description: 'Auth defines the information necessary to authenticate
  218. against AWS if not set aws sdk will infer credentials from
  219. your environment see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials'
  220. properties:
  221. jwt:
  222. description: Authenticate against AWS using service account
  223. tokens.
  224. properties:
  225. serviceAccountRef:
  226. description: A reference to a ServiceAccount resource.
  227. properties:
  228. name:
  229. description: The name of the ServiceAccount resource
  230. being referred to.
  231. type: string
  232. namespace:
  233. description: Namespace of the resource being referred
  234. to. Ignored if referent is not cluster-scoped.
  235. cluster-scoped defaults to the namespace of
  236. the referent.
  237. type: string
  238. required:
  239. - name
  240. type: object
  241. type: object
  242. secretRef:
  243. description: AWSAuthSecretRef holds secret references
  244. for AWS credentials both AccessKeyID and SecretAccessKey
  245. must be defined in order to properly authenticate.
  246. properties:
  247. accessKeyIDSecretRef:
  248. description: The AccessKeyID is used for authentication
  249. properties:
  250. key:
  251. description: The key of the entry in the Secret
  252. resource's `data` field to be used. Some instances
  253. of this field may be defaulted, in others it
  254. may be required.
  255. type: string
  256. name:
  257. description: The name of the Secret resource being
  258. referred to.
  259. type: string
  260. namespace:
  261. description: Namespace of the resource being referred
  262. to. Ignored if referent is not cluster-scoped.
  263. cluster-scoped defaults to the namespace of
  264. the referent.
  265. type: string
  266. type: object
  267. secretAccessKeySecretRef:
  268. description: The SecretAccessKey is used for authentication
  269. properties:
  270. key:
  271. description: The key of the entry in the Secret
  272. resource's `data` field to be used. Some instances
  273. of this field may be defaulted, in others it
  274. may be required.
  275. type: string
  276. name:
  277. description: The name of the Secret resource being
  278. referred to.
  279. type: string
  280. namespace:
  281. description: Namespace of the resource being referred
  282. to. Ignored if referent is not cluster-scoped.
  283. cluster-scoped defaults to the namespace of
  284. the referent.
  285. type: string
  286. type: object
  287. type: object
  288. type: object
  289. region:
  290. description: AWS Region to be used for the provider
  291. type: string
  292. role:
  293. description: Role is a Role ARN which the SecretManager provider
  294. will assume
  295. type: string
  296. service:
  297. description: Service defines which service should be used
  298. to fetch the secrets
  299. enum:
  300. - SecretsManager
  301. - ParameterStore
  302. type: string
  303. required:
  304. - region
  305. - service
  306. type: object
  307. azurekv:
  308. description: AzureKV configures this store to sync secrets using
  309. Azure Key Vault provider
  310. properties:
  311. authSecretRef:
  312. description: Auth configures how the operator authenticates
  313. with Azure. Required for ServicePrincipal auth type.
  314. properties:
  315. clientId:
  316. description: The Azure clientId of the service principle
  317. used for authentication.
  318. properties:
  319. key:
  320. description: The key of the entry in the Secret resource's
  321. `data` field to be used. Some instances of this
  322. field may be defaulted, in others it may be required.
  323. type: string
  324. name:
  325. description: The name of the Secret resource being
  326. referred to.
  327. type: string
  328. namespace:
  329. description: Namespace of the resource being referred
  330. to. Ignored if referent is not cluster-scoped. cluster-scoped
  331. defaults to the namespace of the referent.
  332. type: string
  333. type: object
  334. clientSecret:
  335. description: The Azure ClientSecret of the service principle
  336. used for authentication.
  337. properties:
  338. key:
  339. description: The key of the entry in the Secret resource's
  340. `data` field to be used. Some instances of this
  341. field may be defaulted, in others it may be required.
  342. type: string
  343. name:
  344. description: The name of the Secret resource being
  345. referred to.
  346. type: string
  347. namespace:
  348. description: Namespace of the resource being referred
  349. to. Ignored if referent is not cluster-scoped. cluster-scoped
  350. defaults to the namespace of the referent.
  351. type: string
  352. type: object
  353. required:
  354. - clientId
  355. - clientSecret
  356. type: object
  357. authType:
  358. default: ServicePrincipal
  359. description: 'Auth type defines how to authenticate to the
  360. keyvault service. Valid values are: - "ServicePrincipal"
  361. (default): Using a service principal (tenantId, clientId,
  362. clientSecret) - "ManagedIdentity": Using Managed Identity
  363. assigned to the pod (see aad-pod-identity)'
  364. enum:
  365. - ServicePrincipal
  366. - ManagedIdentity
  367. type: string
  368. identityId:
  369. description: If multiple Managed Identity is assigned to the
  370. pod, you can select the one to be used
  371. type: string
  372. tenantId:
  373. description: TenantID configures the Azure Tenant to send
  374. requests to. Required for ServicePrincipal auth type.
  375. type: string
  376. vaultUrl:
  377. description: Vault Url from which the secrets to be fetched
  378. from.
  379. type: string
  380. required:
  381. - vaultUrl
  382. type: object
  383. gcpsm:
  384. description: GCPSM configures this store to sync secrets using
  385. Google Cloud Platform Secret Manager provider
  386. properties:
  387. auth:
  388. description: Auth defines the information necessary to authenticate
  389. against GCP
  390. properties:
  391. secretRef:
  392. properties:
  393. secretAccessKeySecretRef:
  394. description: The SecretAccessKey is used for authentication
  395. properties:
  396. key:
  397. description: The key of the entry in the Secret
  398. resource's `data` field to be used. Some instances
  399. of this field may be defaulted, in others it
  400. may be required.
  401. type: string
  402. name:
  403. description: The name of the Secret resource being
  404. referred to.
  405. type: string
  406. namespace:
  407. description: Namespace of the resource being referred
  408. to. Ignored if referent is not cluster-scoped.
  409. cluster-scoped defaults to the namespace of
  410. the referent.
  411. type: string
  412. type: object
  413. type: object
  414. workloadIdentity:
  415. properties:
  416. clusterLocation:
  417. type: string
  418. clusterName:
  419. type: string
  420. serviceAccountRef:
  421. description: A reference to a ServiceAccount resource.
  422. properties:
  423. name:
  424. description: The name of the ServiceAccount resource
  425. being referred to.
  426. type: string
  427. namespace:
  428. description: Namespace of the resource being referred
  429. to. Ignored if referent is not cluster-scoped.
  430. cluster-scoped defaults to the namespace of
  431. the referent.
  432. type: string
  433. required:
  434. - name
  435. type: object
  436. required:
  437. - clusterLocation
  438. - clusterName
  439. - serviceAccountRef
  440. type: object
  441. type: object
  442. projectID:
  443. description: ProjectID project where secret is located
  444. type: string
  445. type: object
  446. gitlab:
  447. description: GItlab configures this store to sync secrets using
  448. Gitlab Variables provider
  449. properties:
  450. auth:
  451. description: Auth configures how secret-manager authenticates
  452. with a GitLab instance.
  453. properties:
  454. SecretRef:
  455. properties:
  456. accessToken:
  457. description: AccessToken is used for authentication.
  458. properties:
  459. key:
  460. description: The key of the entry in the Secret
  461. resource's `data` field to be used. Some instances
  462. of this field may be defaulted, in others it
  463. may be required.
  464. type: string
  465. name:
  466. description: The name of the Secret resource being
  467. referred to.
  468. type: string
  469. namespace:
  470. description: Namespace of the resource being referred
  471. to. Ignored if referent is not cluster-scoped.
  472. cluster-scoped defaults to the namespace of
  473. the referent.
  474. type: string
  475. type: object
  476. type: object
  477. required:
  478. - SecretRef
  479. type: object
  480. projectID:
  481. description: ProjectID specifies a project where secrets are
  482. located.
  483. type: string
  484. url:
  485. description: URL configures the GitLab instance URL. Defaults
  486. to https://gitlab.com/.
  487. type: string
  488. required:
  489. - auth
  490. type: object
  491. ibm:
  492. description: IBM configures this store to sync secrets using IBM
  493. Cloud provider
  494. properties:
  495. auth:
  496. description: Auth configures how secret-manager authenticates
  497. with the IBM secrets manager.
  498. properties:
  499. secretRef:
  500. properties:
  501. secretApiKeySecretRef:
  502. description: The SecretAccessKey is used for authentication
  503. properties:
  504. key:
  505. description: The key of the entry in the Secret
  506. resource's `data` field to be used. Some instances
  507. of this field may be defaulted, in others it
  508. may be required.
  509. type: string
  510. name:
  511. description: The name of the Secret resource being
  512. referred to.
  513. type: string
  514. namespace:
  515. description: Namespace of the resource being referred
  516. to. Ignored if referent is not cluster-scoped.
  517. cluster-scoped defaults to the namespace of
  518. the referent.
  519. type: string
  520. type: object
  521. type: object
  522. required:
  523. - secretRef
  524. type: object
  525. serviceUrl:
  526. description: ServiceURL is the Endpoint URL that is specific
  527. to the Secrets Manager service instance
  528. type: string
  529. required:
  530. - auth
  531. type: object
  532. oracle:
  533. description: Oracle configures this store to sync secrets using
  534. Oracle Vault provider
  535. properties:
  536. auth:
  537. description: Auth configures how secret-manager authenticates
  538. with the Oracle Vault.
  539. properties:
  540. secretRef:
  541. description: SecretRef to pass through sensitive information.
  542. properties:
  543. fingerprint:
  544. description: projectID is an access token specific
  545. to the secret.
  546. properties:
  547. key:
  548. description: The key of the entry in the Secret
  549. resource's `data` field to be used. Some instances
  550. of this field may be defaulted, in others it
  551. may be required.
  552. type: string
  553. name:
  554. description: The name of the Secret resource being
  555. referred to.
  556. type: string
  557. namespace:
  558. description: Namespace of the resource being referred
  559. to. Ignored if referent is not cluster-scoped.
  560. cluster-scoped defaults to the namespace of
  561. the referent.
  562. type: string
  563. type: object
  564. privatekey:
  565. description: The Access Token is used for authentication
  566. properties:
  567. key:
  568. description: The key of the entry in the Secret
  569. resource's `data` field to be used. Some instances
  570. of this field may be defaulted, in others it
  571. may be required.
  572. type: string
  573. name:
  574. description: The name of the Secret resource being
  575. referred to.
  576. type: string
  577. namespace:
  578. description: Namespace of the resource being referred
  579. to. Ignored if referent is not cluster-scoped.
  580. cluster-scoped defaults to the namespace of
  581. the referent.
  582. type: string
  583. type: object
  584. type: object
  585. required:
  586. - secretRef
  587. type: object
  588. region:
  589. description: projectID is an access token specific to the
  590. secret.
  591. type: string
  592. tenancy:
  593. description: projectID is an access token specific to the
  594. secret.
  595. type: string
  596. user:
  597. description: User is an access OCID specific to the account.
  598. type: string
  599. required:
  600. - auth
  601. type: object
  602. vault:
  603. description: Vault configures this store to sync secrets using
  604. Hashi provider
  605. properties:
  606. auth:
  607. description: Auth configures how secret-manager authenticates
  608. with the Vault server.
  609. properties:
  610. appRole:
  611. description: AppRole authenticates with Vault using the
  612. App Role auth mechanism, with the role and secret stored
  613. in a Kubernetes Secret resource.
  614. properties:
  615. path:
  616. default: approle
  617. description: 'Path where the App Role authentication
  618. backend is mounted in Vault, e.g: "approle"'
  619. type: string
  620. roleId:
  621. description: RoleID configured in the App Role authentication
  622. backend when setting up the authentication backend
  623. in Vault.
  624. type: string
  625. secretRef:
  626. description: Reference to a key in a Secret that contains
  627. the App Role secret used to authenticate with Vault.
  628. The `key` field must be specified and denotes which
  629. entry within the Secret resource is used as the
  630. app role secret.
  631. properties:
  632. key:
  633. description: The key of the entry in the Secret
  634. resource's `data` field to be used. Some instances
  635. of this field may be defaulted, in others it
  636. may be required.
  637. type: string
  638. name:
  639. description: The name of the Secret resource being
  640. referred to.
  641. type: string
  642. namespace:
  643. description: Namespace of the resource being referred
  644. to. Ignored if referent is not cluster-scoped.
  645. cluster-scoped defaults to the namespace of
  646. the referent.
  647. type: string
  648. type: object
  649. required:
  650. - path
  651. - roleId
  652. - secretRef
  653. type: object
  654. cert:
  655. description: Cert authenticates with TLS Certificates
  656. by passing client certificate, private key and ca certificate
  657. Cert authentication method
  658. properties:
  659. clientCert:
  660. description: ClientCert is a certificate to authenticate
  661. using the Cert Vault authentication method
  662. properties:
  663. key:
  664. description: The key of the entry in the Secret
  665. resource's `data` field to be used. Some instances
  666. of this field may be defaulted, in others it
  667. may be required.
  668. type: string
  669. name:
  670. description: The name of the Secret resource being
  671. referred to.
  672. type: string
  673. namespace:
  674. description: Namespace of the resource being referred
  675. to. Ignored if referent is not cluster-scoped.
  676. cluster-scoped defaults to the namespace of
  677. the referent.
  678. type: string
  679. type: object
  680. secretRef:
  681. description: SecretRef to a key in a Secret resource
  682. containing client private key to authenticate with
  683. Vault using the Cert authentication method
  684. properties:
  685. key:
  686. description: The key of the entry in the Secret
  687. resource's `data` field to be used. Some instances
  688. of this field may be defaulted, in others it
  689. may be required.
  690. type: string
  691. name:
  692. description: The name of the Secret resource being
  693. referred to.
  694. type: string
  695. namespace:
  696. description: Namespace of the resource being referred
  697. to. Ignored if referent is not cluster-scoped.
  698. cluster-scoped defaults to the namespace of
  699. the referent.
  700. type: string
  701. type: object
  702. type: object
  703. jwt:
  704. description: Jwt authenticates with Vault by passing role
  705. and JWT token using the JWT/OIDC authentication method
  706. properties:
  707. path:
  708. default: jwt
  709. description: 'Path where the JWT authentication backend
  710. is mounted in Vault, e.g: "jwt"'
  711. type: string
  712. role:
  713. description: Role is a JWT role to authenticate using
  714. the JWT/OIDC Vault authentication method
  715. type: string
  716. secretRef:
  717. description: SecretRef to a key in a Secret resource
  718. containing JWT token to authenticate with Vault
  719. using the JWT/OIDC authentication method
  720. properties:
  721. key:
  722. description: The key of the entry in the Secret
  723. resource's `data` field to be used. Some instances
  724. of this field may be defaulted, in others it
  725. may be required.
  726. type: string
  727. name:
  728. description: The name of the Secret resource being
  729. referred to.
  730. type: string
  731. namespace:
  732. description: Namespace of the resource being referred
  733. to. Ignored if referent is not cluster-scoped.
  734. cluster-scoped defaults to the namespace of
  735. the referent.
  736. type: string
  737. type: object
  738. required:
  739. - path
  740. type: object
  741. kubernetes:
  742. description: Kubernetes authenticates with Vault by passing
  743. the ServiceAccount token stored in the named Secret
  744. resource to the Vault server.
  745. properties:
  746. mountPath:
  747. default: kubernetes
  748. description: 'Path where the Kubernetes authentication
  749. backend is mounted in Vault, e.g: "kubernetes"'
  750. type: string
  751. role:
  752. description: A required field containing the Vault
  753. Role to assume. A Role binds a Kubernetes ServiceAccount
  754. with a set of Vault policies.
  755. type: string
  756. secretRef:
  757. description: Optional secret field containing a Kubernetes
  758. ServiceAccount JWT used for authenticating with
  759. Vault. If a name is specified without a key, `token`
  760. is the default. If one is not specified, the one
  761. bound to the controller will be used.
  762. properties:
  763. key:
  764. description: The key of the entry in the Secret
  765. resource's `data` field to be used. Some instances
  766. of this field may be defaulted, in others it
  767. may be required.
  768. type: string
  769. name:
  770. description: The name of the Secret resource being
  771. referred to.
  772. type: string
  773. namespace:
  774. description: Namespace of the resource being referred
  775. to. Ignored if referent is not cluster-scoped.
  776. cluster-scoped defaults to the namespace of
  777. the referent.
  778. type: string
  779. type: object
  780. serviceAccountRef:
  781. description: Optional service account field containing
  782. the name of a kubernetes ServiceAccount. If the
  783. service account is specified, the service account
  784. secret token JWT will be used for authenticating
  785. with Vault. If the service account selector is not
  786. supplied, the secretRef will be used instead.
  787. properties:
  788. name:
  789. description: The name of the ServiceAccount resource
  790. being referred to.
  791. type: string
  792. namespace:
  793. description: Namespace of the resource being referred
  794. to. Ignored if referent is not cluster-scoped.
  795. cluster-scoped defaults to the namespace of
  796. the referent.
  797. type: string
  798. required:
  799. - name
  800. type: object
  801. required:
  802. - mountPath
  803. - role
  804. type: object
  805. ldap:
  806. description: Ldap authenticates with Vault by passing
  807. username/password pair using the LDAP authentication
  808. method
  809. properties:
  810. path:
  811. default: ldap
  812. description: 'Path where the LDAP authentication backend
  813. is mounted in Vault, e.g: "ldap"'
  814. type: string
  815. secretRef:
  816. description: SecretRef to a key in a Secret resource
  817. containing password for the LDAP user used to authenticate
  818. with Vault using the LDAP authentication method
  819. properties:
  820. key:
  821. description: The key of the entry in the Secret
  822. resource's `data` field to be used. Some instances
  823. of this field may be defaulted, in others it
  824. may be required.
  825. type: string
  826. name:
  827. description: The name of the Secret resource being
  828. referred to.
  829. type: string
  830. namespace:
  831. description: Namespace of the resource being referred
  832. to. Ignored if referent is not cluster-scoped.
  833. cluster-scoped defaults to the namespace of
  834. the referent.
  835. type: string
  836. type: object
  837. username:
  838. description: Username is a LDAP user name used to
  839. authenticate using the LDAP Vault authentication
  840. method
  841. type: string
  842. required:
  843. - path
  844. - username
  845. type: object
  846. tokenSecretRef:
  847. description: TokenSecretRef authenticates with Vault by
  848. presenting a token.
  849. properties:
  850. key:
  851. description: The key of the entry in the Secret resource's
  852. `data` field to be used. Some instances of this
  853. field may be defaulted, in others it may be required.
  854. type: string
  855. name:
  856. description: The name of the Secret resource being
  857. referred to.
  858. type: string
  859. namespace:
  860. description: Namespace of the resource being referred
  861. to. Ignored if referent is not cluster-scoped. cluster-scoped
  862. defaults to the namespace of the referent.
  863. type: string
  864. type: object
  865. type: object
  866. caBundle:
  867. description: PEM encoded CA bundle used to validate Vault
  868. server certificate. Only used if the Server URL is using
  869. HTTPS protocol. This parameter is ignored for plain HTTP
  870. protocol connection. If not set the system root certificates
  871. are used to validate the TLS connection.
  872. format: byte
  873. type: string
  874. caProvider:
  875. description: The provider for the CA bundle to use to validate
  876. Vault server certificate.
  877. properties:
  878. key:
  879. description: The key the value inside of the provider
  880. type to use, only used with "Secret" type
  881. type: string
  882. name:
  883. description: The name of the object located at the provider
  884. type.
  885. type: string
  886. namespace:
  887. description: The namespace the Provider type is in.
  888. type: string
  889. type:
  890. description: The type of provider to use such as "Secret",
  891. or "ConfigMap".
  892. enum:
  893. - Secret
  894. - ConfigMap
  895. type: string
  896. required:
  897. - name
  898. - type
  899. type: object
  900. namespace:
  901. description: 'Name of the vault namespace. Namespaces is a
  902. set of features within Vault Enterprise that allows Vault
  903. environments to support Secure Multi-tenancy. e.g: "ns1".
  904. More about namespaces can be found here https://www.vaultproject.io/docs/enterprise/namespaces'
  905. type: string
  906. path:
  907. description: 'Path is the mount path of the Vault KV backend
  908. endpoint, e.g: "secret". The v2 KV secret engine version
  909. specific "/data" path suffix for fetching secrets from Vault
  910. is optional and will be appended if not present in specified
  911. path.'
  912. type: string
  913. server:
  914. description: 'Server is the connection address for the Vault
  915. server, e.g: "https://vault.example.com:8200".'
  916. type: string
  917. version:
  918. default: v2
  919. description: Version is the Vault KV secret engine version.
  920. This can be either "v1" or "v2". Version defaults to "v2".
  921. enum:
  922. - v1
  923. - v2
  924. type: string
  925. required:
  926. - auth
  927. - path
  928. - server
  929. type: object
  930. yandexlockbox:
  931. description: YandexLockbox configures this store to sync secrets
  932. using Yandex Lockbox provider
  933. properties:
  934. apiEndpoint:
  935. description: Yandex.Cloud API endpoint (e.g. 'api.cloud.yandex.net:443')
  936. type: string
  937. auth:
  938. description: Auth defines the information necessary to authenticate
  939. against Yandex Lockbox
  940. properties:
  941. authorizedKeySecretRef:
  942. description: The authorized key used for authentication
  943. properties:
  944. key:
  945. description: The key of the entry in the Secret resource's
  946. `data` field to be used. Some instances of this
  947. field may be defaulted, in others it may be required.
  948. type: string
  949. name:
  950. description: The name of the Secret resource being
  951. referred to.
  952. type: string
  953. namespace:
  954. description: Namespace of the resource being referred
  955. to. Ignored if referent is not cluster-scoped. cluster-scoped
  956. defaults to the namespace of the referent.
  957. type: string
  958. type: object
  959. type: object
  960. caProvider:
  961. description: The provider for the CA bundle to use to validate
  962. Yandex.Cloud server certificate.
  963. properties:
  964. certSecretRef:
  965. description: A reference to a specific 'key' within a
  966. Secret resource, In some instances, `key` is a required
  967. field.
  968. properties:
  969. key:
  970. description: The key of the entry in the Secret resource's
  971. `data` field to be used. Some instances of this
  972. field may be defaulted, in others it may be required.
  973. type: string
  974. name:
  975. description: The name of the Secret resource being
  976. referred to.
  977. type: string
  978. namespace:
  979. description: Namespace of the resource being referred
  980. to. Ignored if referent is not cluster-scoped. cluster-scoped
  981. defaults to the namespace of the referent.
  982. type: string
  983. type: object
  984. type: object
  985. required:
  986. - auth
  987. type: object
  988. type: object
  989. retrySettings:
  990. description: Used to configure http retries if failed
  991. properties:
  992. maxRetries:
  993. format: int32
  994. type: integer
  995. retryInterval:
  996. type: string
  997. type: object
  998. required:
  999. - provider
  1000. type: object
  1001. status:
  1002. description: SecretStoreStatus defines the observed state of the SecretStore.
  1003. properties:
  1004. conditions:
  1005. items:
  1006. properties:
  1007. lastTransitionTime:
  1008. format: date-time
  1009. type: string
  1010. message:
  1011. type: string
  1012. reason:
  1013. type: string
  1014. status:
  1015. type: string
  1016. type:
  1017. type: string
  1018. required:
  1019. - status
  1020. - type
  1021. type: object
  1022. type: array
  1023. type: object
  1024. type: object
  1025. served: true
  1026. storage: true
  1027. subresources:
  1028. status: {}
  1029. status:
  1030. acceptedNames:
  1031. kind: ""
  1032. plural: ""
  1033. conditions: []
  1034. storedVersions: []