full-secret-store.yaml 3.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112
  1. apiVersion: external-secrets.io/v1alpha1
  2. kind: SecretStore
  3. metadata:
  4. name: example
  5. namespace: example-ns
  6. spec:
  7. # Used to select the correct ESO controller (think: ingress.ingressClassName)
  8. # The ESO controller is instantiated with a specific controller name
  9. # and filters ES based on this property
  10. # Optional
  11. controller: dev
  12. # provider field contains the configuration to access the provider
  13. # which contains the secret exactly one provider must be configured.
  14. provider:
  15. # (1): AWS Secrets Manager
  16. # aws configures this store to sync secrets using AWS Secret Manager provider
  17. aws:
  18. service: SecretsManager
  19. # Role is a Role ARN which the SecretManager provider will assume
  20. role: iam-role
  21. # AWS Region to be used for the provider
  22. region: eu-central-1
  23. # Auth defines the information necessary to authenticate against AWS by
  24. # getting the accessKeyID and secretAccessKey from an already created Kubernetes Secret
  25. auth:
  26. secretRef:
  27. accessKeyID:
  28. name: awssm-secret
  29. key: access-key
  30. secretAccessKey:
  31. name: awssm-secret
  32. key: secret-access-key
  33. vault:
  34. server: "https://vault.acme.org"
  35. # Path is the mount path of the Vault KV backend endpoint
  36. path: "secret"
  37. # Version is the Vault KV secret engine version.
  38. # This can be either "v1" or "v2", defaults to "v2"
  39. version: "v2"
  40. # vault enterprise namespace: https://www.vaultproject.io/docs/enterprise/namespaces
  41. namespace: "a-team"
  42. # base64 encoded string of certificate
  43. caBundle: "..."
  44. # Instead of caBundle you can also specify a caProvider
  45. # this will retrieve the cert from a Secret or ConfigMap
  46. caProvider:
  47. # Can be Secret or ConfigMap
  48. type: "Secret"
  49. # This is optional, if not specified will be 'Default'
  50. namespace: "my-cert-secret-namespace"
  51. name: "my-cert-secret"
  52. key: "cert-key"
  53. auth:
  54. # static token: https://www.vaultproject.io/docs/auth/token
  55. tokenSecretRef:
  56. name: "my-secret"
  57. namespace: "secret-admin"
  58. key: "vault-token"
  59. # AppRole auth: https://www.vaultproject.io/docs/auth/approle
  60. appRole:
  61. path: "approle"
  62. roleId: "db02de05-fa39-4855-059b-67221c5c2f63"
  63. secretRef:
  64. name: "my-secret"
  65. namespace: "secret-admin"
  66. key: "vault-token"
  67. # Kubernetes auth: https://www.vaultproject.io/docs/auth/kubernetes
  68. kubernetes:
  69. mountPath: "kubernetes"
  70. role: "demo"
  71. # Optional service account reference
  72. serviceAccountRef:
  73. name: "my-sa"
  74. namespace: "secret-admin"
  75. # Optional secret field containing a Kubernetes ServiceAccount JWT
  76. # used for authenticating with Vault
  77. secretRef:
  78. name: "my-secret"
  79. namespace: "secret-admin"
  80. key: "vault"
  81. # (2): GCP Secret Manager
  82. gcpsm:
  83. # Auth defines the information necessary to authenticate against GCP by getting
  84. # the credentials from an already created Kubernetes Secret.
  85. auth:
  86. secretRef:
  87. secretAccessKeySecretRef:
  88. name: gcpsm-secret
  89. key: secret-access-credentials
  90. projectID: myproject
  91. # (TODO): add more provider examples here
  92. status:
  93. # Standard condition schema
  94. conditions:
  95. # SecretStore ready condition indicates the given store is in ready
  96. # state and able to referenced by ExternalSecrets
  97. # If the `status` of this condition is `False`, ExternalSecret controllers
  98. # should prevent attempts to fetch secrets
  99. - type: Ready
  100. status: "False"
  101. reason: "ConfigError"
  102. message: "SecretStore validation failed"
  103. lastTransitionTime: "2019-08-12T12:33:02Z"