generator-acr.yaml 1.2 KB

12345678910111213141516171819202122232425262728293031323334353637383940
  1. apiVersion: generators.external-secrets.io/v1alpha1
  2. kind: ACRAccessToken
  3. metadata:
  4. name: my-azurecr
  5. spec:
  6. tenantId: 11111111-2222-3333-4444-111111111111
  7. registry: example.azurecr.io
  8. # optional; scope token down to a single repository/action
  9. # if set, it will generate an access token instead of an refresh token.
  10. scope: "repository:foo:pull,push"
  11. # Specify Azure cloud type, defaults to PublicCloud.
  12. # This is used for authenticating with Microsoft Entra ID.
  13. # available options: PublicCloud, USGovernmentCloud, ChinaCloud, GermanCloud
  14. environmentType: "PublicCloud"
  15. # choose one authentication method
  16. auth:
  17. # option 1: point to a secret that contains a client-id and client-secret
  18. servicePrincipal:
  19. secretRef:
  20. clientSecret:
  21. name: az-secret
  22. key: clientsecret
  23. clientId:
  24. name: az-secret
  25. key: clientid
  26. # option 2: use a managed identity Client ID
  27. managedIdentity:
  28. identityId: 11111111-2222-3333-4444-111111111111
  29. # option 3:
  30. workloadIdentity:
  31. # note: you can reference service accounts across namespaces.
  32. serviceAccountRef:
  33. name: "my-service-account"
  34. audiences: []