infisical-generic-secret-store.yaml 1.9 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253
  1. apiVersion: external-secrets.io/v1
  2. kind: SecretStore
  3. metadata:
  4. name: infisical
  5. spec:
  6. provider:
  7. infisical:
  8. # Optional (default: https://app.infisical.com).
  9. #
  10. # Override this if you are using a different Infisical instance.
  11. hostAPI: https://app.infisical.com
  12. # Optional: PEM-encoded CA bundle for self-hosted instances with private CAs.
  13. # caBundle: "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0t..."
  14. # Optional: Reference to Secret or ConfigMap containing CA certificate.
  15. # Mutually exclusive with caBundle.
  16. # caProvider:
  17. # type: Secret # or ConfigMap
  18. # name: infisical-ca
  19. # key: ca.crt
  20. # # namespace is required for ClusterSecretStore
  21. # # namespace: external-secrets
  22. auth:
  23. universalAuthCredentials:
  24. clientId:
  25. key: clientId
  26. namespace: default
  27. name: universal-auth-credentials
  28. clientSecret:
  29. key: clientSecret
  30. namespace: default
  31. name: universal-auth-credentials
  32. secretsScope:
  33. projectSlug: first-project-fujo
  34. # "dev", "staging", "prod", etc.
  35. environmentSlug: dev
  36. # Optional (default: `/`).
  37. #
  38. # Secrets will only be retrieved from this path for `data` and `dataFrom` rules. When a
  39. # `data` `remoteRef` uses a path (e.g. `/foo/bar`), that reference will use an absolute
  40. # reference and disregard this default.
  41. #
  42. # If you need to prevent access to secrets outside of this path, rely on instead setting
  43. # Access Controls in Infisical.
  44. secretsPath: /
  45. # Optional (default: false).
  46. #
  47. # When recursive is enabled, secrets retrieved using `dataFrom` patterns will fetch all secrets recursive.
  48. recursive: false
  49. # optional
  50. expandSecretReferences: false # Default is true