mirror of
https://github.com/external-secrets/external-secrets.git
synced 2024-12-15 17:51:01 +00:00
Make CRD categories useful (#3929)
* Make CRD categories useful * one category for all ES objects. * one only for generators * add missing controller label on CRDs * fix UUID description (was referring to password) Signed-off-by: Gabi Davar <grizzly.nyo@gmail.com> * missing update Signed-off-by: Gabi Davar <grizzly.nyo@gmail.com> --------- Signed-off-by: Gabi Davar <grizzly.nyo@gmail.com>
This commit is contained in:
parent
5d83bd4d93
commit
7f5e8fa9ce
31 changed files with 117 additions and 58 deletions
|
@ -235,7 +235,7 @@ type ExternalSecretStatus struct {
|
||||||
// ExternalSecret is the Schema for the external-secrets API.
|
// ExternalSecret is the Schema for the external-secrets API.
|
||||||
// +kubebuilder:subresource:status
|
// +kubebuilder:subresource:status
|
||||||
// +kubebuilder:deprecatedversion
|
// +kubebuilder:deprecatedversion
|
||||||
// +kubebuilder:resource:scope=Namespaced,categories={externalsecrets},shortName=es
|
// +kubebuilder:resource:scope=Namespaced,categories={external-secrets},shortName=es
|
||||||
// +kubebuilder:printcolumn:name="Store",type=string,JSONPath=`.spec.secretStoreRef.name`
|
// +kubebuilder:printcolumn:name="Store",type=string,JSONPath=`.spec.secretStoreRef.name`
|
||||||
// +kubebuilder:printcolumn:name="Refresh Interval",type=string,JSONPath=`.spec.refreshInterval`
|
// +kubebuilder:printcolumn:name="Refresh Interval",type=string,JSONPath=`.spec.refreshInterval`
|
||||||
// +kubebuilder:printcolumn:name="Status",type=string,JSONPath=`.status.conditions[?(@.type=="Ready")].reason`
|
// +kubebuilder:printcolumn:name="Status",type=string,JSONPath=`.status.conditions[?(@.type=="Ready")].reason`
|
||||||
|
|
|
@ -198,7 +198,8 @@ type PushSecretStatus struct {
|
||||||
// +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp"
|
// +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp"
|
||||||
// +kubebuilder:printcolumn:name="Status",type=string,JSONPath=`.status.conditions[?(@.type=="Ready")].reason`
|
// +kubebuilder:printcolumn:name="Status",type=string,JSONPath=`.status.conditions[?(@.type=="Ready")].reason`
|
||||||
// +kubebuilder:subresource:status
|
// +kubebuilder:subresource:status
|
||||||
// +kubebuilder:resource:scope=Namespaced,categories={pushsecrets}
|
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
||||||
|
// +kubebuilder:resource:scope=Namespaced,categories={external-secrets}
|
||||||
|
|
||||||
type PushSecret struct {
|
type PushSecret struct {
|
||||||
metav1.TypeMeta `json:",inline"`
|
metav1.TypeMeta `json:",inline"`
|
||||||
|
|
|
@ -136,7 +136,7 @@ type SecretStoreStatus struct {
|
||||||
// +kubebuilder:printcolumn:name="Status",type=string,JSONPath=`.status.conditions[?(@.type=="Ready")].reason`
|
// +kubebuilder:printcolumn:name="Status",type=string,JSONPath=`.status.conditions[?(@.type=="Ready")].reason`
|
||||||
// +kubebuilder:subresource:status
|
// +kubebuilder:subresource:status
|
||||||
// +kubebuilder:deprecatedversion
|
// +kubebuilder:deprecatedversion
|
||||||
// +kubebuilder:resource:scope=Namespaced,categories={externalsecrets},shortName=ss
|
// +kubebuilder:resource:scope=Namespaced,categories={external-secrets},shortName=ss
|
||||||
type SecretStore struct {
|
type SecretStore struct {
|
||||||
metav1.TypeMeta `json:",inline"`
|
metav1.TypeMeta `json:",inline"`
|
||||||
metav1.ObjectMeta `json:"metadata,omitempty"`
|
metav1.ObjectMeta `json:"metadata,omitempty"`
|
||||||
|
@ -161,7 +161,7 @@ type SecretStoreList struct {
|
||||||
// +kubebuilder:printcolumn:name="Status",type=string,JSONPath=`.status.conditions[?(@.type=="Ready")].reason`
|
// +kubebuilder:printcolumn:name="Status",type=string,JSONPath=`.status.conditions[?(@.type=="Ready")].reason`
|
||||||
// +kubebuilder:deprecatedversion
|
// +kubebuilder:deprecatedversion
|
||||||
// +kubebuilder:subresource:status
|
// +kubebuilder:subresource:status
|
||||||
// +kubebuilder:resource:scope=Cluster,categories={externalsecrets},shortName=css
|
// +kubebuilder:resource:scope=Cluster,categories={external-secrets},shortName=css
|
||||||
type ClusterSecretStore struct {
|
type ClusterSecretStore struct {
|
||||||
metav1.TypeMeta `json:",inline"`
|
metav1.TypeMeta `json:",inline"`
|
||||||
metav1.ObjectMeta `json:"metadata,omitempty"`
|
metav1.ObjectMeta `json:"metadata,omitempty"`
|
||||||
|
|
|
@ -100,7 +100,7 @@ type ClusterExternalSecretStatus struct {
|
||||||
|
|
||||||
// +kubebuilder:object:root=true
|
// +kubebuilder:object:root=true
|
||||||
// +kubebuilder:storageversion
|
// +kubebuilder:storageversion
|
||||||
// +kubebuilder:resource:scope=Cluster,categories={externalsecrets},shortName=ces
|
// +kubebuilder:resource:scope=Cluster,categories={external-secrets},shortName=ces
|
||||||
// +kubebuilder:subresource:status
|
// +kubebuilder:subresource:status
|
||||||
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
||||||
// +kubebuilder:printcolumn:name="Store",type=string,JSONPath=`.spec.externalSecretSpec.secretStoreRef.name`
|
// +kubebuilder:printcolumn:name="Store",type=string,JSONPath=`.spec.externalSecretSpec.secretStoreRef.name`
|
||||||
|
|
|
@ -454,7 +454,7 @@ type ExternalSecretStatus struct {
|
||||||
// ExternalSecret is the Schema for the external-secrets API.
|
// ExternalSecret is the Schema for the external-secrets API.
|
||||||
// +kubebuilder:subresource:status
|
// +kubebuilder:subresource:status
|
||||||
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
||||||
// +kubebuilder:resource:scope=Namespaced,categories={externalsecrets},shortName=es
|
// +kubebuilder:resource:scope=Namespaced,categories={external-secrets},shortName=es
|
||||||
// +kubebuilder:printcolumn:name="Store",type=string,JSONPath=`.spec.secretStoreRef.name`
|
// +kubebuilder:printcolumn:name="Store",type=string,JSONPath=`.spec.secretStoreRef.name`
|
||||||
// +kubebuilder:printcolumn:name="Refresh Interval",type=string,JSONPath=`.spec.refreshInterval`
|
// +kubebuilder:printcolumn:name="Refresh Interval",type=string,JSONPath=`.spec.refreshInterval`
|
||||||
// +kubebuilder:printcolumn:name="Status",type=string,JSONPath=`.status.conditions[?(@.type=="Ready")].reason`
|
// +kubebuilder:printcolumn:name="Status",type=string,JSONPath=`.status.conditions[?(@.type=="Ready")].reason`
|
||||||
|
|
|
@ -280,7 +280,7 @@ type SecretStoreStatus struct {
|
||||||
// +kubebuilder:printcolumn:name="Ready",type=string,JSONPath=`.status.conditions[?(@.type=="Ready")].status`
|
// +kubebuilder:printcolumn:name="Ready",type=string,JSONPath=`.status.conditions[?(@.type=="Ready")].status`
|
||||||
// +kubebuilder:subresource:status
|
// +kubebuilder:subresource:status
|
||||||
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
||||||
// +kubebuilder:resource:scope=Namespaced,categories={externalsecrets},shortName=ss
|
// +kubebuilder:resource:scope=Namespaced,categories={external-secrets},shortName=ss
|
||||||
type SecretStore struct {
|
type SecretStore struct {
|
||||||
metav1.TypeMeta `json:",inline"`
|
metav1.TypeMeta `json:",inline"`
|
||||||
metav1.ObjectMeta `json:"metadata,omitempty"`
|
metav1.ObjectMeta `json:"metadata,omitempty"`
|
||||||
|
@ -308,7 +308,7 @@ type SecretStoreList struct {
|
||||||
// +kubebuilder:printcolumn:name="Ready",type=string,JSONPath=`.status.conditions[?(@.type=="Ready")].status`
|
// +kubebuilder:printcolumn:name="Ready",type=string,JSONPath=`.status.conditions[?(@.type=="Ready")].status`
|
||||||
// +kubebuilder:subresource:status
|
// +kubebuilder:subresource:status
|
||||||
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
||||||
// +kubebuilder:resource:scope=Cluster,categories={externalsecrets},shortName=css
|
// +kubebuilder:resource:scope=Cluster,categories={external-secrets},shortName=css
|
||||||
type ClusterSecretStore struct {
|
type ClusterSecretStore struct {
|
||||||
metav1.TypeMeta `json:",inline"`
|
metav1.TypeMeta `json:",inline"`
|
||||||
metav1.ObjectMeta `json:"metadata,omitempty"`
|
metav1.ObjectMeta `json:"metadata,omitempty"`
|
||||||
|
|
|
@ -105,7 +105,7 @@ type AzureACRServicePrincipalAuthSecretRef struct {
|
||||||
// +kubebuilder:storageversion
|
// +kubebuilder:storageversion
|
||||||
// +kubebuilder:subresource:status
|
// +kubebuilder:subresource:status
|
||||||
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
||||||
// +kubebuilder:resource:scope=Namespaced,categories={acraccesstoken},shortName=acraccesstoken
|
// +kubebuilder:resource:scope=Namespaced,categories={external-secrets, external-secrets-generators},shortName=acraccesstoken
|
||||||
type ACRAccessToken struct {
|
type ACRAccessToken struct {
|
||||||
metav1.TypeMeta `json:",inline"`
|
metav1.TypeMeta `json:",inline"`
|
||||||
metav1.ObjectMeta `json:"metadata,omitempty"`
|
metav1.ObjectMeta `json:"metadata,omitempty"`
|
||||||
|
|
|
@ -75,7 +75,7 @@ type AWSJWTAuth struct {
|
||||||
// +kubebuilder:storageversion
|
// +kubebuilder:storageversion
|
||||||
// +kubebuilder:subresource:status
|
// +kubebuilder:subresource:status
|
||||||
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
||||||
// +kubebuilder:resource:scope=Namespaced,categories={ecrauthorizationtoken},shortName=ecrauthorizationtoken
|
// +kubebuilder:resource:scope=Namespaced,categories={external-secrets, external-secrets-generators},shortName=ecrauthorizationtoken
|
||||||
type ECRAuthorizationToken struct {
|
type ECRAuthorizationToken struct {
|
||||||
metav1.TypeMeta `json:",inline"`
|
metav1.TypeMeta `json:",inline"`
|
||||||
metav1.ObjectMeta `json:"metadata,omitempty"`
|
metav1.ObjectMeta `json:"metadata,omitempty"`
|
||||||
|
|
|
@ -36,7 +36,7 @@ type FakeSpec struct {
|
||||||
// +kubebuilder:storageversion
|
// +kubebuilder:storageversion
|
||||||
// +kubebuilder:subresource:status
|
// +kubebuilder:subresource:status
|
||||||
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
||||||
// +kubebuilder:resource:scope=Namespaced,categories={fake},shortName=fake
|
// +kubebuilder:resource:scope=Namespaced,categories={external-secrets, external-secrets-generators},shortName=fake
|
||||||
type Fake struct {
|
type Fake struct {
|
||||||
metav1.TypeMeta `json:",inline"`
|
metav1.TypeMeta `json:",inline"`
|
||||||
metav1.ObjectMeta `json:"metadata,omitempty"`
|
metav1.ObjectMeta `json:"metadata,omitempty"`
|
||||||
|
|
|
@ -53,7 +53,7 @@ type GCPWorkloadIdentity struct {
|
||||||
// +kubebuilder:storageversion
|
// +kubebuilder:storageversion
|
||||||
// +kubebuilder:subresource:status
|
// +kubebuilder:subresource:status
|
||||||
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
||||||
// +kubebuilder:resource:scope=Namespaced,categories={gcraccesstoken},shortName=gcraccesstoken
|
// +kubebuilder:resource:scope=Namespaced,categories={external-secrets, external-secrets-generators},shortName=gcraccesstoken
|
||||||
type GCRAccessToken struct {
|
type GCRAccessToken struct {
|
||||||
metav1.TypeMeta `json:",inline"`
|
metav1.TypeMeta `json:",inline"`
|
||||||
metav1.ObjectMeta `json:"metadata,omitempty"`
|
metav1.ObjectMeta `json:"metadata,omitempty"`
|
||||||
|
|
|
@ -42,7 +42,7 @@ type GithubSecretRef struct {
|
||||||
// +kubebuilder:storageversion
|
// +kubebuilder:storageversion
|
||||||
// +kubebuilder:subresource:status
|
// +kubebuilder:subresource:status
|
||||||
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
||||||
// +kubebuilder:resource:scope=Namespaced,categories={githubaccesstoken},shortName=githubaccesstoken
|
// +kubebuilder:resource:scope=Namespaced,categories={external-secrets, external-secrets-generators},shortName=githubaccesstoken
|
||||||
type GithubAccessToken struct {
|
type GithubAccessToken struct {
|
||||||
metav1.TypeMeta `json:",inline"`
|
metav1.TypeMeta `json:",inline"`
|
||||||
metav1.ObjectMeta `json:"metadata,omitempty"`
|
metav1.ObjectMeta `json:"metadata,omitempty"`
|
||||||
|
|
|
@ -53,7 +53,7 @@ type PasswordSpec struct {
|
||||||
// +kubebuilder:storageversion
|
// +kubebuilder:storageversion
|
||||||
// +kubebuilder:subresource:status
|
// +kubebuilder:subresource:status
|
||||||
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
||||||
// +kubebuilder:resource:scope=Namespaced,categories={password},shortName=password
|
// +kubebuilder:resource:scope=Namespaced,categories={external-secrets, external-secrets-generators},shortName=password
|
||||||
type Password struct {
|
type Password struct {
|
||||||
metav1.TypeMeta `json:",inline"`
|
metav1.TypeMeta `json:",inline"`
|
||||||
metav1.ObjectMeta `json:"metadata,omitempty"`
|
metav1.ObjectMeta `json:"metadata,omitempty"`
|
||||||
|
|
|
@ -21,13 +21,12 @@ import (
|
||||||
// UUIDSpec controls the behavior of the uuid generator.
|
// UUIDSpec controls the behavior of the uuid generator.
|
||||||
type UUIDSpec struct{}
|
type UUIDSpec struct{}
|
||||||
|
|
||||||
// Password generates a random password based on the
|
// UUID generates a version 1 UUID (e56657e3-764f-11ef-a397-65231a88c216).
|
||||||
// configuration parameters in spec.
|
|
||||||
// You can specify the length, characterset and other attributes.
|
|
||||||
// +kubebuilder:object:root=true
|
// +kubebuilder:object:root=true
|
||||||
// +kubebuilder:storageversion
|
// +kubebuilder:storageversion
|
||||||
// +kubebuilder:subresource:status
|
// +kubebuilder:subresource:status
|
||||||
// +kubebuilder:resource:scope=Namespaced,categories={password},shortName=uuids
|
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
||||||
|
// +kubebuilder:resource:scope=Namespaced,categories={external-secrets, external-secrets-generators},shortName=uuids
|
||||||
type UUID struct {
|
type UUID struct {
|
||||||
metav1.TypeMeta `json:",inline"`
|
metav1.TypeMeta `json:",inline"`
|
||||||
metav1.ObjectMeta `json:"metadata,omitempty"`
|
metav1.ObjectMeta `json:"metadata,omitempty"`
|
||||||
|
|
|
@ -60,7 +60,7 @@ const (
|
||||||
// +kubebuilder:storageversion
|
// +kubebuilder:storageversion
|
||||||
// +kubebuilder:subresource:status
|
// +kubebuilder:subresource:status
|
||||||
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
||||||
// +kubebuilder:resource:scope=Namespaced,categories={vaultdynamicsecret},shortName=vaultdynamicsecret
|
// +kubebuilder:resource:scope=Namespaced,categories={external-secrets, external-secrets-generators},shortName=vaultdynamicsecret
|
||||||
type VaultDynamicSecret struct {
|
type VaultDynamicSecret struct {
|
||||||
metav1.TypeMeta `json:",inline"`
|
metav1.TypeMeta `json:",inline"`
|
||||||
metav1.ObjectMeta `json:"metadata,omitempty"`
|
metav1.ObjectMeta `json:"metadata,omitempty"`
|
||||||
|
|
|
@ -113,7 +113,7 @@ type SecretKeySelector struct {
|
||||||
// +kubebuilder:storageversion
|
// +kubebuilder:storageversion
|
||||||
// +kubebuilder:subresource:status
|
// +kubebuilder:subresource:status
|
||||||
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
// +kubebuilder:metadata:labels="external-secrets.io/component=controller"
|
||||||
// +kubebuilder:resource:scope=Namespaced,categories={webhook},shortName=webhookl
|
// +kubebuilder:resource:scope=Namespaced,categories={external-secrets, external-secrets-generators},shortName=webhookl
|
||||||
type Webhook struct {
|
type Webhook struct {
|
||||||
metav1.TypeMeta `json:",inline"`
|
metav1.TypeMeta `json:",inline"`
|
||||||
metav1.ObjectMeta `json:"metadata,omitempty"`
|
metav1.ObjectMeta `json:"metadata,omitempty"`
|
||||||
|
|
|
@ -10,7 +10,7 @@ spec:
|
||||||
group: external-secrets.io
|
group: external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- externalsecrets
|
- external-secrets
|
||||||
kind: ClusterExternalSecret
|
kind: ClusterExternalSecret
|
||||||
listKind: ClusterExternalSecretList
|
listKind: ClusterExternalSecretList
|
||||||
plural: clusterexternalsecrets
|
plural: clusterexternalsecrets
|
||||||
|
|
|
@ -10,7 +10,7 @@ spec:
|
||||||
group: external-secrets.io
|
group: external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- externalsecrets
|
- external-secrets
|
||||||
kind: ClusterSecretStore
|
kind: ClusterSecretStore
|
||||||
listKind: ClusterSecretStoreList
|
listKind: ClusterSecretStoreList
|
||||||
plural: clustersecretstores
|
plural: clustersecretstores
|
||||||
|
|
|
@ -10,7 +10,7 @@ spec:
|
||||||
group: external-secrets.io
|
group: external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- externalsecrets
|
- external-secrets
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
listKind: ExternalSecretList
|
listKind: ExternalSecretList
|
||||||
plural: externalsecrets
|
plural: externalsecrets
|
||||||
|
|
|
@ -3,12 +3,14 @@ kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
annotations:
|
||||||
controller-gen.kubebuilder.io/version: v0.16.3
|
controller-gen.kubebuilder.io/version: v0.16.3
|
||||||
|
labels:
|
||||||
|
external-secrets.io/component: controller
|
||||||
name: pushsecrets.external-secrets.io
|
name: pushsecrets.external-secrets.io
|
||||||
spec:
|
spec:
|
||||||
group: external-secrets.io
|
group: external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- pushsecrets
|
- external-secrets
|
||||||
kind: PushSecret
|
kind: PushSecret
|
||||||
listKind: PushSecretList
|
listKind: PushSecretList
|
||||||
plural: pushsecrets
|
plural: pushsecrets
|
||||||
|
|
|
@ -10,7 +10,7 @@ spec:
|
||||||
group: external-secrets.io
|
group: external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- externalsecrets
|
- external-secrets
|
||||||
kind: SecretStore
|
kind: SecretStore
|
||||||
listKind: SecretStoreList
|
listKind: SecretStoreList
|
||||||
plural: secretstores
|
plural: secretstores
|
||||||
|
|
|
@ -10,7 +10,8 @@ spec:
|
||||||
group: generators.external-secrets.io
|
group: generators.external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- acraccesstoken
|
- external-secrets
|
||||||
|
- external-secrets-generators
|
||||||
kind: ACRAccessToken
|
kind: ACRAccessToken
|
||||||
listKind: ACRAccessTokenList
|
listKind: ACRAccessTokenList
|
||||||
plural: acraccesstokens
|
plural: acraccesstokens
|
||||||
|
|
|
@ -10,7 +10,8 @@ spec:
|
||||||
group: generators.external-secrets.io
|
group: generators.external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- ecrauthorizationtoken
|
- external-secrets
|
||||||
|
- external-secrets-generators
|
||||||
kind: ECRAuthorizationToken
|
kind: ECRAuthorizationToken
|
||||||
listKind: ECRAuthorizationTokenList
|
listKind: ECRAuthorizationTokenList
|
||||||
plural: ecrauthorizationtokens
|
plural: ecrauthorizationtokens
|
||||||
|
|
|
@ -10,7 +10,8 @@ spec:
|
||||||
group: generators.external-secrets.io
|
group: generators.external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- fake
|
- external-secrets
|
||||||
|
- external-secrets-generators
|
||||||
kind: Fake
|
kind: Fake
|
||||||
listKind: FakeList
|
listKind: FakeList
|
||||||
plural: fakes
|
plural: fakes
|
||||||
|
|
|
@ -10,7 +10,8 @@ spec:
|
||||||
group: generators.external-secrets.io
|
group: generators.external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- gcraccesstoken
|
- external-secrets
|
||||||
|
- external-secrets-generators
|
||||||
kind: GCRAccessToken
|
kind: GCRAccessToken
|
||||||
listKind: GCRAccessTokenList
|
listKind: GCRAccessTokenList
|
||||||
plural: gcraccesstokens
|
plural: gcraccesstokens
|
||||||
|
|
|
@ -10,7 +10,8 @@ spec:
|
||||||
group: generators.external-secrets.io
|
group: generators.external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- githubaccesstoken
|
- external-secrets
|
||||||
|
- external-secrets-generators
|
||||||
kind: GithubAccessToken
|
kind: GithubAccessToken
|
||||||
listKind: GithubAccessTokenList
|
listKind: GithubAccessTokenList
|
||||||
plural: githubaccesstokens
|
plural: githubaccesstokens
|
||||||
|
|
|
@ -10,7 +10,8 @@ spec:
|
||||||
group: generators.external-secrets.io
|
group: generators.external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- password
|
- external-secrets
|
||||||
|
- external-secrets-generators
|
||||||
kind: Password
|
kind: Password
|
||||||
listKind: PasswordList
|
listKind: PasswordList
|
||||||
plural: passwords
|
plural: passwords
|
||||||
|
|
|
@ -3,12 +3,15 @@ kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
annotations:
|
||||||
controller-gen.kubebuilder.io/version: v0.16.3
|
controller-gen.kubebuilder.io/version: v0.16.3
|
||||||
|
labels:
|
||||||
|
external-secrets.io/component: controller
|
||||||
name: uuids.generators.external-secrets.io
|
name: uuids.generators.external-secrets.io
|
||||||
spec:
|
spec:
|
||||||
group: generators.external-secrets.io
|
group: generators.external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- password
|
- external-secrets
|
||||||
|
- external-secrets-generators
|
||||||
kind: UUID
|
kind: UUID
|
||||||
listKind: UUIDList
|
listKind: UUIDList
|
||||||
plural: uuids
|
plural: uuids
|
||||||
|
@ -20,10 +23,7 @@ spec:
|
||||||
- name: v1alpha1
|
- name: v1alpha1
|
||||||
schema:
|
schema:
|
||||||
openAPIV3Schema:
|
openAPIV3Schema:
|
||||||
description: |-
|
description: UUID generates a version 1 UUID (e56657e3-764f-11ef-a397-65231a88c216).
|
||||||
Password generates a random password based on the
|
|
||||||
configuration parameters in spec.
|
|
||||||
You can specify the length, characterset and other attributes.
|
|
||||||
properties:
|
properties:
|
||||||
apiVersion:
|
apiVersion:
|
||||||
description: |-
|
description: |-
|
||||||
|
|
|
@ -10,7 +10,8 @@ spec:
|
||||||
group: generators.external-secrets.io
|
group: generators.external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- vaultdynamicsecret
|
- external-secrets
|
||||||
|
- external-secrets-generators
|
||||||
kind: VaultDynamicSecret
|
kind: VaultDynamicSecret
|
||||||
listKind: VaultDynamicSecretList
|
listKind: VaultDynamicSecretList
|
||||||
plural: vaultdynamicsecrets
|
plural: vaultdynamicsecrets
|
||||||
|
|
|
@ -10,7 +10,8 @@ spec:
|
||||||
group: generators.external-secrets.io
|
group: generators.external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- webhook
|
- external-secrets
|
||||||
|
- external-secrets-generators
|
||||||
kind: Webhook
|
kind: Webhook
|
||||||
listKind: WebhookList
|
listKind: WebhookList
|
||||||
plural: webhooks
|
plural: webhooks
|
||||||
|
|
|
@ -22,7 +22,7 @@ should match snapshot of default values:
|
||||||
group: external-secrets.io
|
group: external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- externalsecrets
|
- external-secrets
|
||||||
kind: SecretStore
|
kind: SecretStore
|
||||||
listKind: SecretStoreList
|
listKind: SecretStoreList
|
||||||
plural: secretstores
|
plural: secretstores
|
||||||
|
@ -3518,6 +3518,41 @@ should match snapshot of default values:
|
||||||
- database
|
- database
|
||||||
- host
|
- host
|
||||||
type: object
|
type: object
|
||||||
|
previder:
|
||||||
|
description: Previder configures this store to sync secrets using the Previder provider
|
||||||
|
properties:
|
||||||
|
auth:
|
||||||
|
description: PreviderAuth contains a secretRef for credentials.
|
||||||
|
properties:
|
||||||
|
secretRef:
|
||||||
|
description: PreviderAuthSecretRef holds secret references for Previder Vault credentials.
|
||||||
|
properties:
|
||||||
|
accessToken:
|
||||||
|
description: The AccessToken is used for authentication
|
||||||
|
properties:
|
||||||
|
key:
|
||||||
|
description: |-
|
||||||
|
The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be
|
||||||
|
defaulted, in others it may be required.
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
description: The name of the Secret resource being referred to.
|
||||||
|
type: string
|
||||||
|
namespace:
|
||||||
|
description: |-
|
||||||
|
Namespace of the resource being referred to. Ignored if referent is not cluster-scoped. cluster-scoped defaults
|
||||||
|
to the namespace of the referent.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- accessToken
|
||||||
|
type: object
|
||||||
|
type: object
|
||||||
|
baseUri:
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- auth
|
||||||
|
type: object
|
||||||
pulumi:
|
pulumi:
|
||||||
description: Pulumi configures this store to sync secrets using the Pulumi provider
|
description: Pulumi configures this store to sync secrets using the Pulumi provider
|
||||||
properties:
|
properties:
|
||||||
|
@ -3543,7 +3578,7 @@ should match snapshot of default values:
|
||||||
type: object
|
type: object
|
||||||
type: object
|
type: object
|
||||||
apiUrl:
|
apiUrl:
|
||||||
default: https://api.pulumi.com/api/preview
|
default: https://api.pulumi.com/api/esc
|
||||||
description: APIURL is the URL of the Pulumi API.
|
description: APIURL is the URL of the Pulumi API.
|
||||||
type: string
|
type: string
|
||||||
environment:
|
environment:
|
||||||
|
@ -3558,10 +3593,14 @@ should match snapshot of default values:
|
||||||
Organization are a space to collaborate on shared projects and stacks.
|
Organization are a space to collaborate on shared projects and stacks.
|
||||||
To create a new organization, visit https://app.pulumi.com/ and click "New Organization".
|
To create a new organization, visit https://app.pulumi.com/ and click "New Organization".
|
||||||
type: string
|
type: string
|
||||||
|
project:
|
||||||
|
description: Project is the name of the Pulumi ESC project the environment belongs to.
|
||||||
|
type: string
|
||||||
required:
|
required:
|
||||||
- accessToken
|
- accessToken
|
||||||
- environment
|
- environment
|
||||||
- organization
|
- organization
|
||||||
|
- project
|
||||||
type: object
|
type: object
|
||||||
scaleway:
|
scaleway:
|
||||||
description: Scaleway
|
description: Scaleway
|
||||||
|
|
|
@ -10,7 +10,7 @@ spec:
|
||||||
group: external-secrets.io
|
group: external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- externalsecrets
|
- external-secrets
|
||||||
kind: ClusterExternalSecret
|
kind: ClusterExternalSecret
|
||||||
listKind: ClusterExternalSecretList
|
listKind: ClusterExternalSecretList
|
||||||
plural: clusterexternalsecrets
|
plural: clusterexternalsecrets
|
||||||
|
@ -667,7 +667,7 @@ spec:
|
||||||
group: external-secrets.io
|
group: external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- externalsecrets
|
- external-secrets
|
||||||
kind: ClusterSecretStore
|
kind: ClusterSecretStore
|
||||||
listKind: ClusterSecretStoreList
|
listKind: ClusterSecretStoreList
|
||||||
plural: clustersecretstores
|
plural: clustersecretstores
|
||||||
|
@ -5298,7 +5298,7 @@ spec:
|
||||||
group: external-secrets.io
|
group: external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- externalsecrets
|
- external-secrets
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
listKind: ExternalSecretList
|
listKind: ExternalSecretList
|
||||||
plural: externalsecrets
|
plural: externalsecrets
|
||||||
|
@ -6102,12 +6102,14 @@ kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
annotations:
|
||||||
controller-gen.kubebuilder.io/version: v0.16.3
|
controller-gen.kubebuilder.io/version: v0.16.3
|
||||||
|
labels:
|
||||||
|
external-secrets.io/component: controller
|
||||||
name: pushsecrets.external-secrets.io
|
name: pushsecrets.external-secrets.io
|
||||||
spec:
|
spec:
|
||||||
group: external-secrets.io
|
group: external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- pushsecrets
|
- external-secrets
|
||||||
kind: PushSecret
|
kind: PushSecret
|
||||||
listKind: PushSecretList
|
listKind: PushSecretList
|
||||||
plural: pushsecrets
|
plural: pushsecrets
|
||||||
|
@ -6486,7 +6488,7 @@ spec:
|
||||||
group: external-secrets.io
|
group: external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- externalsecrets
|
- external-secrets
|
||||||
kind: SecretStore
|
kind: SecretStore
|
||||||
listKind: SecretStoreList
|
listKind: SecretStoreList
|
||||||
plural: secretstores
|
plural: secretstores
|
||||||
|
@ -11117,7 +11119,8 @@ spec:
|
||||||
group: generators.external-secrets.io
|
group: generators.external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- acraccesstoken
|
- external-secrets
|
||||||
|
- external-secrets-generators
|
||||||
kind: ACRAccessToken
|
kind: ACRAccessToken
|
||||||
listKind: ACRAccessTokenList
|
listKind: ACRAccessTokenList
|
||||||
plural: acraccesstokens
|
plural: acraccesstokens
|
||||||
|
@ -11311,7 +11314,8 @@ spec:
|
||||||
group: generators.external-secrets.io
|
group: generators.external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- ecrauthorizationtoken
|
- external-secrets
|
||||||
|
- external-secrets-generators
|
||||||
kind: ECRAuthorizationToken
|
kind: ECRAuthorizationToken
|
||||||
listKind: ECRAuthorizationTokenList
|
listKind: ECRAuthorizationTokenList
|
||||||
plural: ecrauthorizationtokens
|
plural: ecrauthorizationtokens
|
||||||
|
@ -11479,7 +11483,8 @@ spec:
|
||||||
group: generators.external-secrets.io
|
group: generators.external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- fake
|
- external-secrets
|
||||||
|
- external-secrets-generators
|
||||||
kind: Fake
|
kind: Fake
|
||||||
listKind: FakeList
|
listKind: FakeList
|
||||||
plural: fakes
|
plural: fakes
|
||||||
|
@ -11556,7 +11561,8 @@ spec:
|
||||||
group: generators.external-secrets.io
|
group: generators.external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- gcraccesstoken
|
- external-secrets
|
||||||
|
- external-secrets-generators
|
||||||
kind: GCRAccessToken
|
kind: GCRAccessToken
|
||||||
listKind: GCRAccessTokenList
|
listKind: GCRAccessTokenList
|
||||||
plural: gcraccesstokens
|
plural: gcraccesstokens
|
||||||
|
@ -11685,7 +11691,8 @@ spec:
|
||||||
group: generators.external-secrets.io
|
group: generators.external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- githubaccesstoken
|
- external-secrets
|
||||||
|
- external-secrets-generators
|
||||||
kind: GithubAccessToken
|
kind: GithubAccessToken
|
||||||
listKind: GithubAccessTokenList
|
listKind: GithubAccessTokenList
|
||||||
plural: githubaccesstokens
|
plural: githubaccesstokens
|
||||||
|
@ -11788,7 +11795,8 @@ spec:
|
||||||
group: generators.external-secrets.io
|
group: generators.external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- password
|
- external-secrets
|
||||||
|
- external-secrets-generators
|
||||||
kind: Password
|
kind: Password
|
||||||
listKind: PasswordList
|
listKind: PasswordList
|
||||||
plural: passwords
|
plural: passwords
|
||||||
|
@ -11880,12 +11888,15 @@ kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
annotations:
|
||||||
controller-gen.kubebuilder.io/version: v0.16.3
|
controller-gen.kubebuilder.io/version: v0.16.3
|
||||||
|
labels:
|
||||||
|
external-secrets.io/component: controller
|
||||||
name: uuids.generators.external-secrets.io
|
name: uuids.generators.external-secrets.io
|
||||||
spec:
|
spec:
|
||||||
group: generators.external-secrets.io
|
group: generators.external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- password
|
- external-secrets
|
||||||
|
- external-secrets-generators
|
||||||
kind: UUID
|
kind: UUID
|
||||||
listKind: UUIDList
|
listKind: UUIDList
|
||||||
plural: uuids
|
plural: uuids
|
||||||
|
@ -11897,10 +11908,7 @@ spec:
|
||||||
- name: v1alpha1
|
- name: v1alpha1
|
||||||
schema:
|
schema:
|
||||||
openAPIV3Schema:
|
openAPIV3Schema:
|
||||||
description: |-
|
description: UUID generates a version 1 UUID (e56657e3-764f-11ef-a397-65231a88c216).
|
||||||
Password generates a random password based on the
|
|
||||||
configuration parameters in spec.
|
|
||||||
You can specify the length, characterset and other attributes.
|
|
||||||
properties:
|
properties:
|
||||||
apiVersion:
|
apiVersion:
|
||||||
description: |-
|
description: |-
|
||||||
|
@ -11950,7 +11958,8 @@ spec:
|
||||||
group: generators.external-secrets.io
|
group: generators.external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- vaultdynamicsecret
|
- external-secrets
|
||||||
|
- external-secrets-generators
|
||||||
kind: VaultDynamicSecret
|
kind: VaultDynamicSecret
|
||||||
listKind: VaultDynamicSecretList
|
listKind: VaultDynamicSecretList
|
||||||
plural: vaultdynamicsecrets
|
plural: vaultdynamicsecrets
|
||||||
|
@ -12648,7 +12657,8 @@ spec:
|
||||||
group: generators.external-secrets.io
|
group: generators.external-secrets.io
|
||||||
names:
|
names:
|
||||||
categories:
|
categories:
|
||||||
- webhook
|
- external-secrets
|
||||||
|
- external-secrets-generators
|
||||||
kind: Webhook
|
kind: Webhook
|
||||||
listKind: WebhookList
|
listKind: WebhookList
|
||||||
plural: webhooks
|
plural: webhooks
|
||||||
|
|
Loading…
Reference in a new issue