external-secrets.io_clustersecretstores.yaml 45 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835
  1. apiVersion: apiextensions.k8s.io/v1
  2. kind: CustomResourceDefinition
  3. metadata:
  4. annotations:
  5. controller-gen.kubebuilder.io/version: v0.5.0
  6. creationTimestamp: null
  7. name: clustersecretstores.external-secrets.io
  8. spec:
  9. group: external-secrets.io
  10. names:
  11. categories:
  12. - externalsecrets
  13. kind: ClusterSecretStore
  14. listKind: ClusterSecretStoreList
  15. plural: clustersecretstores
  16. shortNames:
  17. - css
  18. singular: clustersecretstore
  19. scope: Cluster
  20. versions:
  21. - additionalPrinterColumns:
  22. - jsonPath: .metadata.creationTimestamp
  23. name: AGE
  24. type: date
  25. name: v1alpha1
  26. schema:
  27. openAPIV3Schema:
  28. description: ClusterSecretStore represents a secure external location for
  29. storing secrets, which can be referenced as part of `storeRef` fields.
  30. properties:
  31. apiVersion:
  32. description: 'APIVersion defines the versioned schema of this representation
  33. of an object. Servers should convert recognized schemas to the latest
  34. internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
  35. type: string
  36. kind:
  37. description: 'Kind is a string value representing the REST resource this
  38. object represents. Servers may infer this from the endpoint the client
  39. submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
  40. type: string
  41. metadata:
  42. type: object
  43. spec:
  44. description: SecretStoreSpec defines the desired state of SecretStore.
  45. properties:
  46. controller:
  47. description: 'Used to select the correct KES controller (think: ingress.ingressClassName)
  48. The KES controller is instantiated with a specific controller name
  49. and filters ES based on this property'
  50. type: string
  51. provider:
  52. description: Used to configure the provider. Only one provider may
  53. be set
  54. maxProperties: 1
  55. minProperties: 1
  56. properties:
  57. alibaba:
  58. description: Alibaba configures this store to sync secrets using
  59. Alibaba Cloud provider
  60. properties:
  61. auth:
  62. description: AlibabaAuth contains a secretRef for credentials.
  63. properties:
  64. secretRef:
  65. description: AlibabaAuthSecretRef holds secret references
  66. for Alibaba credentials.
  67. properties:
  68. accessKeyIDSecretRef:
  69. description: The AccessKeyID is used for authentication
  70. properties:
  71. key:
  72. description: The key of the entry in the Secret
  73. resource's `data` field to be used. Some instances
  74. of this field may be defaulted, in others it
  75. may be required.
  76. type: string
  77. name:
  78. description: The name of the Secret resource being
  79. referred to.
  80. type: string
  81. namespace:
  82. description: Namespace of the resource being referred
  83. to. Ignored if referent is not cluster-scoped.
  84. cluster-scoped defaults to the namespace of
  85. the referent.
  86. type: string
  87. type: object
  88. accessKeySecretSecretRef:
  89. description: The AccessKeySecret is used for authentication
  90. properties:
  91. key:
  92. description: The key of the entry in the Secret
  93. resource's `data` field to be used. Some instances
  94. of this field may be defaulted, in others it
  95. may be required.
  96. type: string
  97. name:
  98. description: The name of the Secret resource being
  99. referred to.
  100. type: string
  101. namespace:
  102. description: Namespace of the resource being referred
  103. to. Ignored if referent is not cluster-scoped.
  104. cluster-scoped defaults to the namespace of
  105. the referent.
  106. type: string
  107. type: object
  108. required:
  109. - accessKeyIDSecretRef
  110. - accessKeySecretSecretRef
  111. type: object
  112. required:
  113. - secretRef
  114. type: object
  115. endpoint:
  116. type: string
  117. regionID:
  118. description: Alibaba Region to be used for the provider
  119. type: string
  120. required:
  121. - auth
  122. - regionID
  123. type: object
  124. aws:
  125. description: AWS configures this store to sync secrets using AWS
  126. Secret Manager provider
  127. properties:
  128. auth:
  129. description: 'Auth defines the information necessary to authenticate
  130. against AWS if not set aws sdk will infer credentials from
  131. your environment see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials'
  132. properties:
  133. jwt:
  134. description: Authenticate against AWS using service account
  135. tokens.
  136. properties:
  137. serviceAccountRef:
  138. description: A reference to a ServiceAccount resource.
  139. properties:
  140. name:
  141. description: The name of the ServiceAccount resource
  142. being referred to.
  143. type: string
  144. namespace:
  145. description: Namespace of the resource being referred
  146. to. Ignored if referent is not cluster-scoped.
  147. cluster-scoped defaults to the namespace of
  148. the referent.
  149. type: string
  150. required:
  151. - name
  152. type: object
  153. type: object
  154. secretRef:
  155. description: AWSAuthSecretRef holds secret references
  156. for AWS credentials both AccessKeyID and SecretAccessKey
  157. must be defined in order to properly authenticate.
  158. properties:
  159. accessKeyIDSecretRef:
  160. description: The AccessKeyID is used for authentication
  161. properties:
  162. key:
  163. description: The key of the entry in the Secret
  164. resource's `data` field to be used. Some instances
  165. of this field may be defaulted, in others it
  166. may be required.
  167. type: string
  168. name:
  169. description: The name of the Secret resource being
  170. referred to.
  171. type: string
  172. namespace:
  173. description: Namespace of the resource being referred
  174. to. Ignored if referent is not cluster-scoped.
  175. cluster-scoped defaults to the namespace of
  176. the referent.
  177. type: string
  178. type: object
  179. secretAccessKeySecretRef:
  180. description: The SecretAccessKey is used for authentication
  181. properties:
  182. key:
  183. description: The key of the entry in the Secret
  184. resource's `data` field to be used. Some instances
  185. of this field may be defaulted, in others it
  186. may be required.
  187. type: string
  188. name:
  189. description: The name of the Secret resource being
  190. referred to.
  191. type: string
  192. namespace:
  193. description: Namespace of the resource being referred
  194. to. Ignored if referent is not cluster-scoped.
  195. cluster-scoped defaults to the namespace of
  196. the referent.
  197. type: string
  198. type: object
  199. type: object
  200. type: object
  201. region:
  202. description: AWS Region to be used for the provider
  203. type: string
  204. role:
  205. description: Role is a Role ARN which the SecretManager provider
  206. will assume
  207. type: string
  208. service:
  209. description: Service defines which service should be used
  210. to fetch the secrets
  211. enum:
  212. - SecretsManager
  213. - ParameterStore
  214. type: string
  215. required:
  216. - region
  217. - service
  218. type: object
  219. azurekv:
  220. description: AzureKV configures this store to sync secrets using
  221. Azure Key Vault provider
  222. properties:
  223. authSecretRef:
  224. description: Auth configures how the operator authenticates
  225. with Azure.
  226. properties:
  227. clientId:
  228. description: The Azure clientId of the service principle
  229. used for authentication.
  230. properties:
  231. key:
  232. description: The key of the entry in the Secret resource's
  233. `data` field to be used. Some instances of this
  234. field may be defaulted, in others it may be required.
  235. type: string
  236. name:
  237. description: The name of the Secret resource being
  238. referred to.
  239. type: string
  240. namespace:
  241. description: Namespace of the resource being referred
  242. to. Ignored if referent is not cluster-scoped. cluster-scoped
  243. defaults to the namespace of the referent.
  244. type: string
  245. type: object
  246. clientSecret:
  247. description: The Azure ClientSecret of the service principle
  248. used for authentication.
  249. properties:
  250. key:
  251. description: The key of the entry in the Secret resource's
  252. `data` field to be used. Some instances of this
  253. field may be defaulted, in others it may be required.
  254. type: string
  255. name:
  256. description: The name of the Secret resource being
  257. referred to.
  258. type: string
  259. namespace:
  260. description: Namespace of the resource being referred
  261. to. Ignored if referent is not cluster-scoped. cluster-scoped
  262. defaults to the namespace of the referent.
  263. type: string
  264. type: object
  265. required:
  266. - clientId
  267. - clientSecret
  268. type: object
  269. tenantId:
  270. description: TenantID configures the Azure Tenant to send
  271. requests to.
  272. type: string
  273. vaultUrl:
  274. description: Vault Url from which the secrets to be fetched
  275. from.
  276. type: string
  277. required:
  278. - authSecretRef
  279. - tenantId
  280. - vaultUrl
  281. type: object
  282. gcpsm:
  283. description: GCPSM configures this store to sync secrets using
  284. Google Cloud Platform Secret Manager provider
  285. properties:
  286. auth:
  287. description: Auth defines the information necessary to authenticate
  288. against GCP
  289. properties:
  290. secretRef:
  291. properties:
  292. secretAccessKeySecretRef:
  293. description: The SecretAccessKey is used for authentication
  294. properties:
  295. key:
  296. description: The key of the entry in the Secret
  297. resource's `data` field to be used. Some instances
  298. of this field may be defaulted, in others it
  299. may be required.
  300. type: string
  301. name:
  302. description: The name of the Secret resource being
  303. referred to.
  304. type: string
  305. namespace:
  306. description: Namespace of the resource being referred
  307. to. Ignored if referent is not cluster-scoped.
  308. cluster-scoped defaults to the namespace of
  309. the referent.
  310. type: string
  311. type: object
  312. type: object
  313. required:
  314. - secretRef
  315. type: object
  316. projectID:
  317. description: ProjectID project where secret is located
  318. type: string
  319. type: object
  320. gitlab:
  321. description: GItlab configures this store to sync secrets using
  322. Gitlab Variables provider
  323. properties:
  324. auth:
  325. description: Auth configures how secret-manager authenticates
  326. with a GitLab instance.
  327. properties:
  328. SecretRef:
  329. properties:
  330. accessToken:
  331. description: AccessToken is used for authentication.
  332. properties:
  333. key:
  334. description: The key of the entry in the Secret
  335. resource's `data` field to be used. Some instances
  336. of this field may be defaulted, in others it
  337. may be required.
  338. type: string
  339. name:
  340. description: The name of the Secret resource being
  341. referred to.
  342. type: string
  343. namespace:
  344. description: Namespace of the resource being referred
  345. to. Ignored if referent is not cluster-scoped.
  346. cluster-scoped defaults to the namespace of
  347. the referent.
  348. type: string
  349. type: object
  350. type: object
  351. required:
  352. - SecretRef
  353. type: object
  354. projectID:
  355. description: ProjectID specifies a project where secrets are
  356. located.
  357. type: string
  358. url:
  359. description: URL configures the GitLab instance URL. Defaults
  360. to https://gitlab.com/.
  361. type: string
  362. required:
  363. - auth
  364. type: object
  365. ibm:
  366. description: IBM configures this store to sync secrets using IBM
  367. Cloud provider
  368. properties:
  369. auth:
  370. description: Auth configures how secret-manager authenticates
  371. with the IBM secrets manager.
  372. properties:
  373. secretRef:
  374. properties:
  375. secretApiKeySecretRef:
  376. description: The SecretAccessKey is used for authentication
  377. properties:
  378. key:
  379. description: The key of the entry in the Secret
  380. resource's `data` field to be used. Some instances
  381. of this field may be defaulted, in others it
  382. may be required.
  383. type: string
  384. name:
  385. description: The name of the Secret resource being
  386. referred to.
  387. type: string
  388. namespace:
  389. description: Namespace of the resource being referred
  390. to. Ignored if referent is not cluster-scoped.
  391. cluster-scoped defaults to the namespace of
  392. the referent.
  393. type: string
  394. type: object
  395. type: object
  396. required:
  397. - secretRef
  398. type: object
  399. serviceUrl:
  400. description: ServiceURL is the Endpoint URL that is specific
  401. to the Secrets Manager service instance
  402. type: string
  403. required:
  404. - auth
  405. type: object
  406. oracle:
  407. description: Oracle configures this store to sync secrets using
  408. Oracle Vault provider
  409. properties:
  410. auth:
  411. description: Auth configures how secret-manager authenticates
  412. with the Oracle Vault.
  413. properties:
  414. secretRef:
  415. description: SecretRef to pass through sensitive information.
  416. properties:
  417. fingerprint:
  418. description: projectID is an access token specific
  419. to the secret.
  420. properties:
  421. key:
  422. description: The key of the entry in the Secret
  423. resource's `data` field to be used. Some instances
  424. of this field may be defaulted, in others it
  425. may be required.
  426. type: string
  427. name:
  428. description: The name of the Secret resource being
  429. referred to.
  430. type: string
  431. namespace:
  432. description: Namespace of the resource being referred
  433. to. Ignored if referent is not cluster-scoped.
  434. cluster-scoped defaults to the namespace of
  435. the referent.
  436. type: string
  437. type: object
  438. privatekey:
  439. description: The Access Token is used for authentication
  440. properties:
  441. key:
  442. description: The key of the entry in the Secret
  443. resource's `data` field to be used. Some instances
  444. of this field may be defaulted, in others it
  445. may be required.
  446. type: string
  447. name:
  448. description: The name of the Secret resource being
  449. referred to.
  450. type: string
  451. namespace:
  452. description: Namespace of the resource being referred
  453. to. Ignored if referent is not cluster-scoped.
  454. cluster-scoped defaults to the namespace of
  455. the referent.
  456. type: string
  457. type: object
  458. type: object
  459. required:
  460. - secretRef
  461. type: object
  462. region:
  463. description: projectID is an access token specific to the
  464. secret.
  465. type: string
  466. tenancy:
  467. description: projectID is an access token specific to the
  468. secret.
  469. type: string
  470. user:
  471. description: User is an access OCID specific to the account.
  472. type: string
  473. required:
  474. - auth
  475. type: object
  476. vault:
  477. description: Vault configures this store to sync secrets using
  478. Hashi provider
  479. properties:
  480. auth:
  481. description: Auth configures how secret-manager authenticates
  482. with the Vault server.
  483. properties:
  484. appRole:
  485. description: AppRole authenticates with Vault using the
  486. App Role auth mechanism, with the role and secret stored
  487. in a Kubernetes Secret resource.
  488. properties:
  489. path:
  490. default: approle
  491. description: 'Path where the App Role authentication
  492. backend is mounted in Vault, e.g: "approle"'
  493. type: string
  494. roleId:
  495. description: RoleID configured in the App Role authentication
  496. backend when setting up the authentication backend
  497. in Vault.
  498. type: string
  499. secretRef:
  500. description: Reference to a key in a Secret that contains
  501. the App Role secret used to authenticate with Vault.
  502. The `key` field must be specified and denotes which
  503. entry within the Secret resource is used as the
  504. app role secret.
  505. properties:
  506. key:
  507. description: The key of the entry in the Secret
  508. resource's `data` field to be used. Some instances
  509. of this field may be defaulted, in others it
  510. may be required.
  511. type: string
  512. name:
  513. description: The name of the Secret resource being
  514. referred to.
  515. type: string
  516. namespace:
  517. description: Namespace of the resource being referred
  518. to. Ignored if referent is not cluster-scoped.
  519. cluster-scoped defaults to the namespace of
  520. the referent.
  521. type: string
  522. type: object
  523. required:
  524. - path
  525. - roleId
  526. - secretRef
  527. type: object
  528. cert:
  529. description: Cert authenticates with TLS Certificates
  530. by passing client certificate, private key and ca certificate
  531. Cert authentication method
  532. properties:
  533. clientCert:
  534. description: ClientCert is a certificate to authenticate
  535. using the Cert Vault authentication method
  536. properties:
  537. key:
  538. description: The key of the entry in the Secret
  539. resource's `data` field to be used. Some instances
  540. of this field may be defaulted, in others it
  541. may be required.
  542. type: string
  543. name:
  544. description: The name of the Secret resource being
  545. referred to.
  546. type: string
  547. namespace:
  548. description: Namespace of the resource being referred
  549. to. Ignored if referent is not cluster-scoped.
  550. cluster-scoped defaults to the namespace of
  551. the referent.
  552. type: string
  553. type: object
  554. secretRef:
  555. description: SecretRef to a key in a Secret resource
  556. containing client private key to authenticate with
  557. Vault using the Cert authentication method
  558. properties:
  559. key:
  560. description: The key of the entry in the Secret
  561. resource's `data` field to be used. Some instances
  562. of this field may be defaulted, in others it
  563. may be required.
  564. type: string
  565. name:
  566. description: The name of the Secret resource being
  567. referred to.
  568. type: string
  569. namespace:
  570. description: Namespace of the resource being referred
  571. to. Ignored if referent is not cluster-scoped.
  572. cluster-scoped defaults to the namespace of
  573. the referent.
  574. type: string
  575. type: object
  576. type: object
  577. jwt:
  578. description: Jwt authenticates with Vault by passing role
  579. and JWT token using the JWT/OIDC authentication method
  580. properties:
  581. role:
  582. description: Role is a JWT role to authenticate using
  583. the JWT/OIDC Vault authentication method
  584. type: string
  585. secretRef:
  586. description: SecretRef to a key in a Secret resource
  587. containing JWT token to authenticate with Vault
  588. using the JWT/OIDC authentication method
  589. properties:
  590. key:
  591. description: The key of the entry in the Secret
  592. resource's `data` field to be used. Some instances
  593. of this field may be defaulted, in others it
  594. may be required.
  595. type: string
  596. name:
  597. description: The name of the Secret resource being
  598. referred to.
  599. type: string
  600. namespace:
  601. description: Namespace of the resource being referred
  602. to. Ignored if referent is not cluster-scoped.
  603. cluster-scoped defaults to the namespace of
  604. the referent.
  605. type: string
  606. type: object
  607. type: object
  608. kubernetes:
  609. description: Kubernetes authenticates with Vault by passing
  610. the ServiceAccount token stored in the named Secret
  611. resource to the Vault server.
  612. properties:
  613. mountPath:
  614. default: kubernetes
  615. description: 'Path where the Kubernetes authentication
  616. backend is mounted in Vault, e.g: "kubernetes"'
  617. type: string
  618. role:
  619. description: A required field containing the Vault
  620. Role to assume. A Role binds a Kubernetes ServiceAccount
  621. with a set of Vault policies.
  622. type: string
  623. secretRef:
  624. description: Optional secret field containing a Kubernetes
  625. ServiceAccount JWT used for authenticating with
  626. Vault. If a name is specified without a key, `token`
  627. is the default. If one is not specified, the one
  628. bound to the controller will be used.
  629. properties:
  630. key:
  631. description: The key of the entry in the Secret
  632. resource's `data` field to be used. Some instances
  633. of this field may be defaulted, in others it
  634. may be required.
  635. type: string
  636. name:
  637. description: The name of the Secret resource being
  638. referred to.
  639. type: string
  640. namespace:
  641. description: Namespace of the resource being referred
  642. to. Ignored if referent is not cluster-scoped.
  643. cluster-scoped defaults to the namespace of
  644. the referent.
  645. type: string
  646. type: object
  647. serviceAccountRef:
  648. description: Optional service account field containing
  649. the name of a kubernetes ServiceAccount. If the
  650. service account is specified, the service account
  651. secret token JWT will be used for authenticating
  652. with Vault. If the service account selector is not
  653. supplied, the secretRef will be used instead.
  654. properties:
  655. name:
  656. description: The name of the ServiceAccount resource
  657. being referred to.
  658. type: string
  659. namespace:
  660. description: Namespace of the resource being referred
  661. to. Ignored if referent is not cluster-scoped.
  662. cluster-scoped defaults to the namespace of
  663. the referent.
  664. type: string
  665. required:
  666. - name
  667. type: object
  668. required:
  669. - mountPath
  670. - role
  671. type: object
  672. ldap:
  673. description: Ldap authenticates with Vault by passing
  674. username/password pair using the LDAP authentication
  675. method
  676. properties:
  677. secretRef:
  678. description: SecretRef to a key in a Secret resource
  679. containing password for the LDAP user used to authenticate
  680. with Vault using the LDAP authentication method
  681. properties:
  682. key:
  683. description: The key of the entry in the Secret
  684. resource's `data` field to be used. Some instances
  685. of this field may be defaulted, in others it
  686. may be required.
  687. type: string
  688. name:
  689. description: The name of the Secret resource being
  690. referred to.
  691. type: string
  692. namespace:
  693. description: Namespace of the resource being referred
  694. to. Ignored if referent is not cluster-scoped.
  695. cluster-scoped defaults to the namespace of
  696. the referent.
  697. type: string
  698. type: object
  699. username:
  700. description: Username is a LDAP user name used to
  701. authenticate using the LDAP Vault authentication
  702. method
  703. type: string
  704. required:
  705. - username
  706. type: object
  707. tokenSecretRef:
  708. description: TokenSecretRef authenticates with Vault by
  709. presenting a token.
  710. properties:
  711. key:
  712. description: The key of the entry in the Secret resource's
  713. `data` field to be used. Some instances of this
  714. field may be defaulted, in others it may be required.
  715. type: string
  716. name:
  717. description: The name of the Secret resource being
  718. referred to.
  719. type: string
  720. namespace:
  721. description: Namespace of the resource being referred
  722. to. Ignored if referent is not cluster-scoped. cluster-scoped
  723. defaults to the namespace of the referent.
  724. type: string
  725. type: object
  726. type: object
  727. caBundle:
  728. description: PEM encoded CA bundle used to validate Vault
  729. server certificate. Only used if the Server URL is using
  730. HTTPS protocol. This parameter is ignored for plain HTTP
  731. protocol connection. If not set the system root certificates
  732. are used to validate the TLS connection.
  733. format: byte
  734. type: string
  735. namespace:
  736. description: 'Name of the vault namespace. Namespaces is a
  737. set of features within Vault Enterprise that allows Vault
  738. environments to support Secure Multi-tenancy. e.g: "ns1".
  739. More about namespaces can be found here https://www.vaultproject.io/docs/enterprise/namespaces'
  740. type: string
  741. path:
  742. description: 'Path is the mount path of the Vault KV backend
  743. endpoint, e.g: "secret". The v2 KV secret engine version
  744. specific "/data" path suffix for fetching secrets from Vault
  745. is optional and will be appended if not present in specified
  746. path.'
  747. type: string
  748. server:
  749. description: 'Server is the connection address for the Vault
  750. server, e.g: "https://vault.example.com:8200".'
  751. type: string
  752. version:
  753. default: v2
  754. description: Version is the Vault KV secret engine version.
  755. This can be either "v1" or "v2". Version defaults to "v2".
  756. enum:
  757. - v1
  758. - v2
  759. type: string
  760. required:
  761. - auth
  762. - path
  763. - server
  764. type: object
  765. yandexlockbox:
  766. description: YandexLockbox configures this store to sync secrets
  767. using Yandex Lockbox provider
  768. properties:
  769. apiEndpoint:
  770. description: Yandex.Cloud API endpoint (e.g. 'api.cloud.yandex.net:443')
  771. type: string
  772. auth:
  773. description: Auth defines the information necessary to authenticate
  774. against Yandex Lockbox
  775. properties:
  776. authorizedKeySecretRef:
  777. description: The authorized key used for authentication
  778. properties:
  779. key:
  780. description: The key of the entry in the Secret resource's
  781. `data` field to be used. Some instances of this
  782. field may be defaulted, in others it may be required.
  783. type: string
  784. name:
  785. description: The name of the Secret resource being
  786. referred to.
  787. type: string
  788. namespace:
  789. description: Namespace of the resource being referred
  790. to. Ignored if referent is not cluster-scoped. cluster-scoped
  791. defaults to the namespace of the referent.
  792. type: string
  793. type: object
  794. type: object
  795. required:
  796. - auth
  797. type: object
  798. type: object
  799. required:
  800. - provider
  801. type: object
  802. status:
  803. description: SecretStoreStatus defines the observed state of the SecretStore.
  804. properties:
  805. conditions:
  806. items:
  807. properties:
  808. lastTransitionTime:
  809. format: date-time
  810. type: string
  811. message:
  812. type: string
  813. reason:
  814. type: string
  815. status:
  816. type: string
  817. type:
  818. type: string
  819. required:
  820. - status
  821. - type
  822. type: object
  823. type: array
  824. type: object
  825. type: object
  826. served: true
  827. storage: true
  828. subresources:
  829. status: {}
  830. status:
  831. acceptedNames:
  832. kind: ""
  833. plural: ""
  834. conditions: []
  835. storedVersions: []