mirror of
https://github.com/external-secrets/external-secrets.git
synced 2024-12-14 11:57:59 +00:00
standardize condition and remove phase
This commit is contained in:
parent
04394dfbe3
commit
64efdffd72
1 changed files with 20 additions and 17 deletions
37
Spec.md
37
Spec.md
|
@ -183,20 +183,21 @@ spec:
|
||||||
property: provider-key-property
|
property: provider-key-property
|
||||||
|
|
||||||
status:
|
status:
|
||||||
# Represents the current phase of the secret sync:
|
# refreshTime is the time and date the external secret was fetched and
|
||||||
# * Pending | ES created, controller did not yet sync the ES or other dependencies are missing (e.g. secret store or configmap template)
|
# the target secret updated
|
||||||
# * Syncing | ES is being actively synced according to spec
|
refreshTime: "2019-08-12T12:33:02Z"
|
||||||
# * Failing | Secret can not be synced, this might require user intervention
|
# Standard condition schema
|
||||||
# * Failed | ES can not be synced right now and will not able to
|
|
||||||
# * Completed | ES was synced successfully (one-time use only)
|
|
||||||
phase: Syncing
|
|
||||||
conditions:
|
conditions:
|
||||||
- type: InSync
|
# ExternalSecret ready condition indicates the secret is ready for use.
|
||||||
status: "True" # False if last sync was not successful
|
# This is defined as:
|
||||||
|
# - The target secret exists
|
||||||
|
# - The target secret has been refreshed within the last refreshInterval
|
||||||
|
# - The target secret content is up-to-date based on any target templates
|
||||||
|
- type: Ready
|
||||||
|
status: "True" # False if last refresh was not successful
|
||||||
reason: "SecretSynced"
|
reason: "SecretSynced"
|
||||||
message: "Secret was synced"
|
message: "Secret was synced"
|
||||||
lastTransitionTime: "2019-08-12T12:33:02Z"
|
lastTransitionTime: "2019-08-12T12:33:02Z"
|
||||||
lastSyncTime: "2020-09-23T16:27:53Z"
|
|
||||||
|
|
||||||
```
|
```
|
||||||
|
|
||||||
|
@ -223,11 +224,11 @@ spec:
|
||||||
controller: dev
|
controller: dev
|
||||||
|
|
||||||
# provider field contains the configuration to access the provider which contains the secret
|
# provider field contains the configuration to access the provider which contains the secret
|
||||||
# exactly one provider must be configured.
|
# exactly one provider must be configured.
|
||||||
provider:
|
provider:
|
||||||
# AWSSM configures this store to sync secrets using AWS Secret Manager provider
|
# AWSSM configures this store to sync secrets using AWS Secret Manager provider
|
||||||
awssm:
|
awssm:
|
||||||
# Auth defines the information necessary to authenticate against AWS by
|
# Auth defines the information necessary to authenticate against AWS by
|
||||||
# getting the accessKeyID and secretAccessKey from an already created Kubernetes Secret
|
# getting the accessKeyID and secretAccessKey from an already created Kubernetes Secret
|
||||||
auth:
|
auth:
|
||||||
secretRef:
|
secretRef:
|
||||||
|
@ -246,14 +247,16 @@ spec:
|
||||||
region: eu-central-1
|
region: eu-central-1
|
||||||
|
|
||||||
status:
|
status:
|
||||||
# * Pending: e.g. referenced secret containing credentials is missing
|
# Standard condition schema
|
||||||
# * Running: all dependencies are met, sync
|
|
||||||
phase: Running
|
|
||||||
conditions:
|
conditions:
|
||||||
|
# SecretStore ready condition indicates the given store is in ready
|
||||||
|
# state and able to referenced by ExternalSecrets
|
||||||
|
# If the `status` of this condition is `False`, ExternalSecret controllers
|
||||||
|
# should prevent attempts to fetch secrets
|
||||||
- type: Ready
|
- type: Ready
|
||||||
status: "False"
|
status: "False"
|
||||||
reason: "ErrorConfig"
|
reason: "ConfigError"
|
||||||
message: "Unable to assume role arn:xxxx"
|
message: "SecretStore validation failed"
|
||||||
lastTransitionTime: "2019-08-12T12:33:02Z"
|
lastTransitionTime: "2019-08-12T12:33:02Z"
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue