API specification

Packages:

external-secrets.io/v1alpha1

Package v1alpha1 contains resources for external-secrets

Resource Types:

    AWSAuth

    (Appears on: AWSProvider)

    AWSAuth tells the controller how to do authentication with aws. Only one of secretRef or jwt can be specified. if none is specified the controller will load credentials using the aws sdk defaults.

    Field Description
    secretRef
    AWSAuthSecretRef
    (Optional)
    jwt
    AWSJWTAuth
    (Optional)

    AWSAuthSecretRef

    (Appears on: AWSAuth)

    AWSAuthSecretRef holds secret references for AWS credentials both AccessKeyID and SecretAccessKey must be defined in order to properly authenticate.

    Field Description
    accessKeyIDSecretRef
    github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector

    The AccessKeyID is used for authentication

    secretAccessKeySecretRef
    github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector

    The SecretAccessKey is used for authentication

    AWSJWTAuth

    (Appears on: AWSAuth)

    Authenticate against AWS using service account tokens.

    Field Description
    serviceAccountRef
    github.com/external-secrets/external-secrets/apis/meta/v1.ServiceAccountSelector

    AWSProvider

    (Appears on: SecretStoreProvider)

    AWSProvider configures a store to sync secrets with AWS.

    Field Description
    service
    AWSServiceType

    Service defines which service should be used to fetch the secrets

    auth
    AWSAuth
    (Optional)

    Auth defines the information necessary to authenticate against AWS if not set aws sdk will infer credentials from your environment see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials

    role
    string
    (Optional)

    Role is a Role ARN which the SecretManager provider will assume

    region
    string

    AWS Region to be used for the provider

    AWSServiceType (string alias)

    (Appears on: AWSProvider)

    AWSServiceType is a enum that defines the service/API that is used to fetch the secrets.

    Value Description

    "ParameterStore"

    AWSServiceParameterStore is the AWS SystemsManager ParameterStore. see: https://docs.aws.amazon.com/systems-manager/latest/userguide/systems-manager-parameter-store.html

    "SecretsManager"

    AWSServiceSecretsManager is the AWS SecretsManager. see: https://docs.aws.amazon.com/secretsmanager/latest/userguide/intro.html

    AkeylessAuth

    (Appears on: AkeylessProvider)

    Field Description
    secretRef
    AkeylessAuthSecretRef

    AkeylessAuthSecretRef

    (Appears on: AkeylessAuth)

    AkeylessAuthSecretRef AKEYLESS_ACCESS_TYPE_PARAM: AZURE_OBJ_ID OR GCP_AUDIENCE OR ACCESS_KEY OR KUB_CONFIG_NAME.

    Field Description
    accessID
    github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector

    The SecretAccessID is used for authentication

    accessType
    github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector
    accessTypeParam
    github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector

    AkeylessProvider

    (Appears on: SecretStoreProvider)

    AkeylessProvider Configures an store to sync secrets using Akeyless KV.

    Field Description
    akeylessGWApiURL
    string

    Akeyless GW API Url from which the secrets to be fetched from.

    authSecretRef
    AkeylessAuth

    Auth configures how the operator authenticates with Akeyless.

    AlibabaAuth

    (Appears on: AlibabaProvider)

    AlibabaAuth contains a secretRef for credentials.

    Field Description
    secretRef
    AlibabaAuthSecretRef

    AlibabaAuthSecretRef

    (Appears on: AlibabaAuth)

    AlibabaAuthSecretRef holds secret references for Alibaba credentials.

    Field Description
    accessKeyIDSecretRef
    github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector

    The AccessKeyID is used for authentication

    accessKeySecretSecretRef
    github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector

    The AccessKeySecret is used for authentication

    AlibabaProvider

    (Appears on: SecretStoreProvider)

    AlibabaProvider configures a store to sync secrets using the Alibaba Secret Manager provider.

    Field Description
    auth
    AlibabaAuth
    endpoint
    string
    (Optional)
    regionID
    string

    Alibaba Region to be used for the provider

    AuthType (string alias)

    (Appears on: AzureKVProvider)

    AuthType describes how to authenticate to the Azure Keyvault Only one of the following auth types may be specified. If none of the following auth type is specified, the default one is ServicePrincipal.

    Value Description

    "ManagedIdentity"

    Using Managed Identity to authenticate. Used with aad-pod-identity instelled in the clister.

    "ServicePrincipal"

    Using service principal to authenticate, which needs a tenantId, a clientId and a clientSecret.

    AzureKVAuth

    (Appears on: AzureKVProvider)

    Configuration used to authenticate with Azure.

    Field Description
    clientId
    github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector

    The Azure clientId of the service principle used for authentication.

    clientSecret
    github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector

    The Azure ClientSecret of the service principle used for authentication.

    AzureKVProvider

    (Appears on: SecretStoreProvider)

    Configures an store to sync secrets using Azure KV.

    Field Description
    authType
    AuthType
    (Optional)

    Auth type defines how to authenticate to the keyvault service. Valid values are: - “ServicePrincipal” (default): Using a service principal (tenantId, clientId, clientSecret) - “ManagedIdentity”: Using Managed Identity assigned to the pod (see aad-pod-identity)

    vaultUrl
    string

    Vault Url from which the secrets to be fetched from.

    tenantId
    string
    (Optional)

    TenantID configures the Azure Tenant to send requests to. Required for ServicePrincipal auth type.

    authSecretRef
    AzureKVAuth
    (Optional)

    Auth configures how the operator authenticates with Azure. Required for ServicePrincipal auth type.

    identityId
    string
    (Optional)

    If multiple Managed Identity is assigned to the pod, you can select the one to be used

    CAProvider

    (Appears on: VaultProvider)

    Defines a location to fetch the cert for the vault provider from.

    Field Description
    type
    CAProviderType

    The type of provider to use such as “Secret”, or “ConfigMap”.

    name
    string

    The name of the object located at the provider type.

    key
    string

    The key the value inside of the provider type to use, only used with “Secret” type

    namespace
    string
    (Optional)

    The namespace the Provider type is in.

    CAProviderType (string alias)

    (Appears on: CAProvider)

    Value Description

    "ConfigMap"

    "Secret"

    ClusterSecretStore

    ClusterSecretStore represents a secure external location for storing secrets, which can be referenced as part of storeRef fields.

    Field Description
    metadata
    Kubernetes meta/v1.ObjectMeta
    Refer to the Kubernetes API documentation for the fields of the metadata field.
    spec
    SecretStoreSpec


    controller
    string
    (Optional)

    Used to select the correct KES controller (think: ingress.ingressClassName) The KES controller is instantiated with a specific controller name and filters ES based on this property

    provider
    SecretStoreProvider

    Used to configure the provider. Only one provider may be set

    retrySettings
    SecretStoreRetrySettings
    (Optional)

    Used to configure http retries if failed

    status
    SecretStoreStatus

    ExternalSecret

    ExternalSecret is the Schema for the external-secrets API.

    Field Description
    metadata
    Kubernetes meta/v1.ObjectMeta
    Refer to the Kubernetes API documentation for the fields of the metadata field.
    spec
    ExternalSecretSpec


    secretStoreRef
    SecretStoreRef
    target
    ExternalSecretTarget
    refreshInterval
    Kubernetes meta/v1.Duration

    RefreshInterval is the amount of time before the values are read again from the SecretStore provider Valid time units are “ns”, “us” (or “µs”), “ms”, “s”, “m”, “h” May be set to zero to fetch and create it once. Defaults to 1h.

    data
    []ExternalSecretData
    (Optional)

    Data defines the connection between the Kubernetes Secret keys and the Provider data

    dataFrom
    []ExternalSecretDataRemoteRef
    (Optional)

    DataFrom is used to fetch all properties from a specific Provider data If multiple entries are specified, the Secret keys are merged in the specified order

    status
    ExternalSecretStatus

    ExternalSecretConditionType (string alias)

    (Appears on: ExternalSecretStatusCondition)

    Value Description

    "Deleted"

    "Ready"

    ExternalSecretCreationPolicy (string alias)

    (Appears on: ExternalSecretTarget)

    ExternalSecretCreationPolicy defines rules on how to create the resulting Secret.

    Value Description

    "Merge"

    Merge does not create the Secret, but merges the data fields to the Secret.

    "None"

    None does not create a Secret (future use with injector).

    "Owner"

    Owner creates the Secret and sets .metadata.ownerReferences to the ExternalSecret resource.

    ExternalSecretData

    (Appears on: ExternalSecretSpec)

    ExternalSecretData defines the connection between the Kubernetes Secret key (spec.data.) and the Provider data.

    Field Description
    secretKey
    string
    remoteRef
    ExternalSecretDataRemoteRef

    ExternalSecretDataRemoteRef

    (Appears on: ExternalSecretData, ExternalSecretSpec)

    ExternalSecretDataRemoteRef defines Provider data location.

    Field Description
    key
    string

    Key is the key used in the Provider, mandatory

    version
    string
    (Optional)

    Used to select a specific version of the Provider value, if supported

    property
    string
    (Optional)

    Used to select a specific property of the Provider value (if a map), if supported

    ExternalSecretSpec

    (Appears on: ExternalSecret)

    ExternalSecretSpec defines the desired state of ExternalSecret.

    Field Description
    secretStoreRef
    SecretStoreRef
    target
    ExternalSecretTarget
    refreshInterval
    Kubernetes meta/v1.Duration

    RefreshInterval is the amount of time before the values are read again from the SecretStore provider Valid time units are “ns”, “us” (or “µs”), “ms”, “s”, “m”, “h” May be set to zero to fetch and create it once. Defaults to 1h.

    data
    []ExternalSecretData
    (Optional)

    Data defines the connection between the Kubernetes Secret keys and the Provider data

    dataFrom
    []ExternalSecretDataRemoteRef
    (Optional)

    DataFrom is used to fetch all properties from a specific Provider data If multiple entries are specified, the Secret keys are merged in the specified order

    ExternalSecretStatus

    (Appears on: ExternalSecret)

    Field Description
    refreshTime
    Kubernetes meta/v1.Time

    refreshTime is the time and date the external secret was fetched and the target secret updated

    syncedResourceVersion
    string

    SyncedResourceVersion keeps track of the last synced version

    conditions
    []ExternalSecretStatusCondition
    (Optional)

    ExternalSecretStatusCondition

    (Appears on: ExternalSecretStatus)

    Field Description
    type
    ExternalSecretConditionType
    status
    Kubernetes core/v1.ConditionStatus
    reason
    string
    (Optional)
    message
    string
    (Optional)
    lastTransitionTime
    Kubernetes meta/v1.Time
    (Optional)

    ExternalSecretTarget

    (Appears on: ExternalSecretSpec)

    ExternalSecretTarget defines the Kubernetes Secret to be created There can be only one target per ExternalSecret.

    Field Description
    name
    string
    (Optional)

    Name defines the name of the Secret resource to be managed This field is immutable Defaults to the .metadata.name of the ExternalSecret resource

    creationPolicy
    ExternalSecretCreationPolicy
    (Optional)

    CreationPolicy defines rules on how to create the resulting Secret Defaults to ‘Owner’

    template
    ExternalSecretTemplate
    (Optional)

    Template defines a blueprint for the created Secret resource.

    immutable
    bool
    (Optional)

    Immutable defines if the final secret will be immutable

    ExternalSecretTemplate

    (Appears on: ExternalSecretTarget)

    ExternalSecretTemplate defines a blueprint for the created Secret resource. we can not use native corev1.Secret, it will have empty ObjectMeta values: https://github.com/kubernetes-sigs/controller-tools/issues/448

    Field Description
    type
    Kubernetes core/v1.SecretType
    (Optional)
    engineVersion
    TemplateEngineVersion

    EngineVersion specifies the template engine version that should be used to compile/execute the template specified in .data and .templateFrom[].

    metadata
    ExternalSecretTemplateMetadata
    (Optional)
    data
    map[string]string
    (Optional)
    templateFrom
    []TemplateFrom
    (Optional)

    ExternalSecretTemplateMetadata

    (Appears on: ExternalSecretTemplate)

    ExternalSecretTemplateMetadata defines metadata fields for the Secret blueprint.

    Field Description
    annotations
    map[string]string
    (Optional)
    labels
    map[string]string
    (Optional)

    FakeProvider

    (Appears on: SecretStoreProvider)

    FakeProvider configures a fake provider that returns static values.

    Field Description
    data
    []FakeProviderData

    FakeProviderData

    (Appears on: FakeProvider)

    Field Description
    key
    string
    value
    string
    valueMap
    map[string]string
    version
    string

    GCPSMAuth

    (Appears on: GCPSMProvider)

    Field Description
    secretRef
    GCPSMAuthSecretRef
    (Optional)
    workloadIdentity
    GCPWorkloadIdentity
    (Optional)

    GCPSMAuthSecretRef

    (Appears on: GCPSMAuth)

    Field Description
    secretAccessKeySecretRef
    github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector
    (Optional)

    The SecretAccessKey is used for authentication

    GCPSMProvider

    (Appears on: SecretStoreProvider)

    GCPSMProvider Configures a store to sync secrets using the GCP Secret Manager provider.

    Field Description
    auth
    GCPSMAuth
    (Optional)

    Auth defines the information necessary to authenticate against GCP

    projectID
    string

    ProjectID project where secret is located

    GCPWorkloadIdentity

    (Appears on: GCPSMAuth)

    Field Description
    serviceAccountRef
    github.com/external-secrets/external-secrets/apis/meta/v1.ServiceAccountSelector
    clusterLocation
    string
    clusterName
    string

    GenericStore

    GenericStore is a common interface for interacting with ClusterSecretStore or a namespaced SecretStore.

    GitlabAuth

    (Appears on: GitlabProvider)

    Field Description
    SecretRef
    GitlabSecretRef

    GitlabProvider

    (Appears on: SecretStoreProvider)

    Configures a store to sync secrets with a GitLab instance.

    Field Description
    url
    string

    URL configures the GitLab instance URL. Defaults to https://gitlab.com/.

    auth
    GitlabAuth

    Auth configures how secret-manager authenticates with a GitLab instance.

    projectID
    string

    ProjectID specifies a project where secrets are located.

    GitlabSecretRef

    (Appears on: GitlabAuth)

    Field Description
    accessToken
    github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector

    AccessToken is used for authentication.

    IBMAuth

    (Appears on: IBMProvider)

    Field Description
    secretRef
    IBMAuthSecretRef

    IBMAuthSecretRef

    (Appears on: IBMAuth)

    Field Description
    secretApiKeySecretRef
    github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector
    (Optional)

    The SecretAccessKey is used for authentication

    IBMProvider

    (Appears on: SecretStoreProvider)

    Configures an store to sync secrets using a IBM Cloud Secrets Manager backend.

    Field Description
    auth
    IBMAuth

    Auth configures how secret-manager authenticates with the IBM secrets manager.

    serviceUrl
    string

    ServiceURL is the Endpoint URL that is specific to the Secrets Manager service instance

    OracleAuth

    (Appears on: OracleProvider)

    Field Description
    tenancy
    string

    Tenancy is the tenancy OCID where user is located.

    user
    string

    User is an access OCID specific to the account.

    secretRef
    OracleSecretRef

    SecretRef to pass through sensitive information.

    OracleProvider

    (Appears on: SecretStoreProvider)

    Configures an store to sync secrets using a Oracle Vault backend.

    Field Description
    region
    string

    Region is the region where vault is located.

    vault
    string

    Vault is the vault’s OCID of the specific vault where secret is located.

    auth
    OracleAuth
    (Optional)

    Auth configures how secret-manager authenticates with the Oracle Vault. If empty, use the instance principal, otherwise the user credentials specified in Auth.

    OracleSecretRef

    (Appears on: OracleAuth)

    Field Description
    privatekey
    github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector

    PrivateKey is the user’s API Signing Key in PEM format, used for authentication.

    fingerprint
    github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector

    Fingerprint is the fingerprint of the API private key.

    SecretStore

    SecretStore represents a secure external location for storing secrets, which can be referenced as part of storeRef fields.

    Field Description
    metadata
    Kubernetes meta/v1.ObjectMeta
    Refer to the Kubernetes API documentation for the fields of the metadata field.
    spec
    SecretStoreSpec


    controller
    string
    (Optional)

    Used to select the correct KES controller (think: ingress.ingressClassName) The KES controller is instantiated with a specific controller name and filters ES based on this property

    provider
    SecretStoreProvider

    Used to configure the provider. Only one provider may be set

    retrySettings
    SecretStoreRetrySettings
    (Optional)

    Used to configure http retries if failed

    status
    SecretStoreStatus

    SecretStoreConditionType (string alias)

    (Appears on: SecretStoreStatusCondition)

    Value Description

    "Ready"

    SecretStoreProvider

    (Appears on: SecretStoreSpec)

    SecretStoreProvider contains the provider-specific configration.

    Field Description
    aws
    AWSProvider
    (Optional)

    AWS configures this store to sync secrets using AWS Secret Manager provider

    azurekv
    AzureKVProvider
    (Optional)

    AzureKV configures this store to sync secrets using Azure Key Vault provider

    akeyless
    AkeylessProvider
    (Optional)

    Akeyless configures this store to sync secrets using Akeyless Vault provider

    vault
    VaultProvider
    (Optional)

    Vault configures this store to sync secrets using Hashi provider

    gcpsm
    GCPSMProvider
    (Optional)

    GCPSM configures this store to sync secrets using Google Cloud Platform Secret Manager provider

    oracle
    OracleProvider
    (Optional)

    Oracle configures this store to sync secrets using Oracle Vault provider

    ibm
    IBMProvider
    (Optional)

    IBM configures this store to sync secrets using IBM Cloud provider

    yandexlockbox
    YandexLockboxProvider
    (Optional)

    YandexLockbox configures this store to sync secrets using Yandex Lockbox provider

    gitlab
    GitlabProvider
    (Optional)

    GItlab configures this store to sync secrets using Gitlab Variables provider

    alibaba
    AlibabaProvider
    (Optional)

    Alibaba configures this store to sync secrets using Alibaba Cloud provider

    webhook
    WebhookProvider
    (Optional)

    Webhook configures this store to sync secrets using a generic templated webhook

    fake
    FakeProvider
    (Optional)

    Fake configures a store with static key/value pairs

    SecretStoreRef

    (Appears on: ExternalSecretSpec)

    SecretStoreRef defines which SecretStore to fetch the ExternalSecret data.

    Field Description
    name
    string

    Name of the SecretStore resource

    kind
    string
    (Optional)

    Kind of the SecretStore resource (SecretStore or ClusterSecretStore) Defaults to SecretStore

    SecretStoreRetrySettings

    (Appears on: SecretStoreSpec)

    Field Description
    maxRetries
    int32
    retryInterval
    string

    SecretStoreSpec

    (Appears on: ClusterSecretStore, SecretStore)

    SecretStoreSpec defines the desired state of SecretStore.

    Field Description
    controller
    string
    (Optional)

    Used to select the correct KES controller (think: ingress.ingressClassName) The KES controller is instantiated with a specific controller name and filters ES based on this property

    provider
    SecretStoreProvider

    Used to configure the provider. Only one provider may be set

    retrySettings
    SecretStoreRetrySettings
    (Optional)

    Used to configure http retries if failed

    SecretStoreStatus

    (Appears on: ClusterSecretStore, SecretStore)

    SecretStoreStatus defines the observed state of the SecretStore.

    Field Description
    conditions
    []SecretStoreStatusCondition
    (Optional)

    SecretStoreStatusCondition

    (Appears on: SecretStoreStatus)

    Field Description
    type
    SecretStoreConditionType
    status
    Kubernetes core/v1.ConditionStatus
    reason
    string
    (Optional)
    message
    string
    (Optional)
    lastTransitionTime
    Kubernetes meta/v1.Time
    (Optional)

    TemplateEngineVersion (string alias)

    (Appears on: ExternalSecretTemplate)

    Value Description

    "v1"

    "v2"

    TemplateFrom

    (Appears on: ExternalSecretTemplate)

    Field Description
    configMap
    TemplateRef
    secret
    TemplateRef

    TemplateRef

    (Appears on: TemplateFrom)

    Field Description
    name
    string
    items
    []TemplateRefItem

    TemplateRefItem

    (Appears on: TemplateRef)

    Field Description
    key
    string

    VaultAppRole

    (Appears on: VaultAuth)

    VaultAppRole authenticates with Vault using the App Role auth mechanism, with the role and secret stored in a Kubernetes Secret resource.

    Field Description
    path
    string

    Path where the App Role authentication backend is mounted in Vault, e.g: “approle”

    roleId
    string

    RoleID configured in the App Role authentication backend when setting up the authentication backend in Vault.

    secretRef
    github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector

    Reference to a key in a Secret that contains the App Role secret used to authenticate with Vault. The key field must be specified and denotes which entry within the Secret resource is used as the app role secret.

    VaultAuth

    (Appears on: VaultProvider)

    VaultAuth is the configuration used to authenticate with a Vault server. Only one of tokenSecretRef, appRole, kubernetes, ldap, jwt or cert can be specified.

    Field Description
    tokenSecretRef
    github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector
    (Optional)

    TokenSecretRef authenticates with Vault by presenting a token.

    appRole
    VaultAppRole
    (Optional)

    AppRole authenticates with Vault using the App Role auth mechanism, with the role and secret stored in a Kubernetes Secret resource.

    kubernetes
    VaultKubernetesAuth
    (Optional)

    Kubernetes authenticates with Vault by passing the ServiceAccount token stored in the named Secret resource to the Vault server.

    ldap
    VaultLdapAuth
    (Optional)

    Ldap authenticates with Vault by passing username/password pair using the LDAP authentication method

    jwt
    VaultJwtAuth
    (Optional)

    Jwt authenticates with Vault by passing role and JWT token using the JWT/OIDC authentication method

    cert
    VaultCertAuth
    (Optional)

    Cert authenticates with TLS Certificates by passing client certificate, private key and ca certificate Cert authentication method

    VaultCertAuth

    (Appears on: VaultAuth)

    VaultJwtAuth authenticates with Vault using the JWT/OIDC authentication method, with the role name and token stored in a Kubernetes Secret resource.

    Field Description
    clientCert
    github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector
    (Optional)

    ClientCert is a certificate to authenticate using the Cert Vault authentication method

    secretRef
    github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector

    SecretRef to a key in a Secret resource containing client private key to authenticate with Vault using the Cert authentication method

    VaultJwtAuth

    (Appears on: VaultAuth)

    VaultJwtAuth authenticates with Vault using the JWT/OIDC authentication method, with the role name and token stored in a Kubernetes Secret resource.

    Field Description
    path
    string

    Path where the JWT authentication backend is mounted in Vault, e.g: “jwt”

    role
    string
    (Optional)

    Role is a JWT role to authenticate using the JWT/OIDC Vault authentication method

    secretRef
    github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector

    SecretRef to a key in a Secret resource containing JWT token to authenticate with Vault using the JWT/OIDC authentication method

    VaultKVStoreVersion (string alias)

    (Appears on: VaultProvider)

    Value Description

    "v1"

    "v2"

    VaultKubernetesAuth

    (Appears on: VaultAuth)

    Authenticate against Vault using a Kubernetes ServiceAccount token stored in a Secret.

    Field Description
    mountPath
    string

    Path where the Kubernetes authentication backend is mounted in Vault, e.g: “kubernetes”

    serviceAccountRef
    github.com/external-secrets/external-secrets/apis/meta/v1.ServiceAccountSelector
    (Optional)

    Optional service account field containing the name of a kubernetes ServiceAccount. If the service account is specified, the service account secret token JWT will be used for authenticating with Vault. If the service account selector is not supplied, the secretRef will be used instead.

    secretRef
    github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector
    (Optional)

    Optional secret field containing a Kubernetes ServiceAccount JWT used for authenticating with Vault. If a name is specified without a key, token is the default. If one is not specified, the one bound to the controller will be used.

    role
    string

    A required field containing the Vault Role to assume. A Role binds a Kubernetes ServiceAccount with a set of Vault policies.

    VaultLdapAuth

    (Appears on: VaultAuth)

    VaultLdapAuth authenticates with Vault using the LDAP authentication method, with the username and password stored in a Kubernetes Secret resource.

    Field Description
    path
    string

    Path where the LDAP authentication backend is mounted in Vault, e.g: “ldap”

    username
    string

    Username is a LDAP user name used to authenticate using the LDAP Vault authentication method

    secretRef
    github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector

    SecretRef to a key in a Secret resource containing password for the LDAP user used to authenticate with Vault using the LDAP authentication method

    VaultProvider

    (Appears on: SecretStoreProvider)

    Configures an store to sync secrets using a HashiCorp Vault KV backend.

    Field Description
    auth
    VaultAuth

    Auth configures how secret-manager authenticates with the Vault server.

    server
    string

    Server is the connection address for the Vault server, e.g: “https://vault.example.com:8200”.

    path
    string
    (Optional)

    Path is the mount path of the Vault KV backend endpoint, e.g: “secret”. The v2 KV secret engine version specific “/data” path suffix for fetching secrets from Vault is optional and will be appended if not present in specified path.

    version
    VaultKVStoreVersion

    Version is the Vault KV secret engine version. This can be either “v1” or “v2”. Version defaults to “v2”.

    namespace
    string
    (Optional)

    Name of the vault namespace. Namespaces is a set of features within Vault Enterprise that allows Vault environments to support Secure Multi-tenancy. e.g: “ns1”. More about namespaces can be found here https://www.vaultproject.io/docs/enterprise/namespaces

    caBundle
    []byte
    (Optional)

    PEM encoded CA bundle used to validate Vault server certificate. Only used if the Server URL is using HTTPS protocol. This parameter is ignored for plain HTTP protocol connection. If not set the system root certificates are used to validate the TLS connection.

    caProvider
    CAProvider
    (Optional)

    The provider for the CA bundle to use to validate Vault server certificate.

    readYourWrites
    bool
    (Optional)

    ReadYourWrites ensures isolated read-after-write semantics by providing discovered cluster replication states in each request. More information about eventual consistency in Vault can be found here https://www.vaultproject.io/docs/enterprise/consistency

    forwardInconsistent
    bool
    (Optional)

    ForwardInconsistent tells Vault to forward read-after-write requests to the Vault leader instead of simply retrying within a loop. This can increase performance if the option is enabled serverside. https://www.vaultproject.io/docs/configuration/replication#allow_forwarding_via_header

    WebhookCAProvider

    (Appears on: WebhookProvider)

    Defines a location to fetch the cert for the webhook provider from.

    Field Description
    type
    WebhookCAProviderType

    The type of provider to use such as “Secret”, or “ConfigMap”.

    name
    string

    The name of the object located at the provider type.

    key
    string

    The key the value inside of the provider type to use, only used with “Secret” type

    namespace
    string
    (Optional)

    The namespace the Provider type is in.

    WebhookCAProviderType (string alias)

    (Appears on: WebhookCAProvider)

    Value Description

    "ConfigMap"

    "Secret"

    WebhookProvider

    (Appears on: SecretStoreProvider)

    AkeylessProvider Configures an store to sync secrets using Akeyless KV.

    Field Description
    method
    string

    Webhook Method

    url
    string

    Webhook url to call

    headers
    map[string]string
    (Optional)

    Headers

    body
    string
    (Optional)

    Body

    timeout
    Kubernetes meta/v1.Duration
    (Optional)

    Timeout

    result
    WebhookResult

    Result formatting

    secrets
    []WebhookSecret
    (Optional)

    Secrets to fill in templates These secrets will be passed to the templating function as key value pairs under the given name

    caBundle
    []byte
    (Optional)

    PEM encoded CA bundle used to validate webhook server certificate. Only used if the Server URL is using HTTPS protocol. This parameter is ignored for plain HTTP protocol connection. If not set the system root certificates are used to validate the TLS connection.

    caProvider
    WebhookCAProvider
    (Optional)

    The provider for the CA bundle to use to validate webhook server certificate.

    WebhookResult

    (Appears on: WebhookProvider)

    Field Description
    jsonPath
    string
    (Optional)

    Json path of return value

    WebhookSecret

    (Appears on: WebhookProvider)

    Field Description
    name
    string

    Name of this secret in templates

    secretRef
    github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector

    Secret ref to fill in credentials

    YandexLockboxAuth

    (Appears on: YandexLockboxProvider)

    Field Description
    authorizedKeySecretRef
    github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector
    (Optional)

    The authorized key used for authentication

    YandexLockboxCAProvider

    (Appears on: YandexLockboxProvider)

    Field Description
    certSecretRef
    github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector

    YandexLockboxProvider

    (Appears on: SecretStoreProvider)

    YandexLockboxProvider Configures a store to sync secrets using the Yandex Lockbox provider.

    Field Description
    apiEndpoint
    string
    (Optional)

    Yandex.Cloud API endpoint (e.g. ‘api.cloud.yandex.net:443’)

    auth
    YandexLockboxAuth

    Auth defines the information necessary to authenticate against Yandex Lockbox

    caProvider
    YandexLockboxCAProvider
    (Optional)

    The provider for the CA bundle to use to validate Yandex.Cloud server certificate.


    Generated with gen-crd-api-reference-docs.