mirror of
https://github.com/external-secrets/external-secrets.git
synced 2024-12-14 11:57:59 +00:00
432c6bf9ab
* add passbolt provider Signed-off-by: Thorben Below <56894536+thorbenbelow@users.noreply.github.com> * Fix: return err for unimplemented methods Signed-off-by: Thorben Below <56894536+thorbenbelow@users.noreply.github.com> --------- Signed-off-by: Thorben Below <56894536+thorbenbelow@users.noreply.github.com>
1 KiB
1 KiB
External Secrets Operator integrates with Passbolt API to sync Passbolt to secrets held on the Kubernetes cluster.
Creating a Passbolt secret store
Be sure the passbolt
provider is listed in the Kind=SecretStore
and auth and host are set.
The API requires a password and private key provided in a secret.
{% include 'passbolt-secret-store.yaml' %}
Creating an external secret
To sync a Passbolt secret to a Kubernetes secret, a Kind=ExternalSecret
is needed.
By default the secret contains name, username, uri, password and description.
To only select a single property add the property
key.
{% include 'passbolt-external-secret-example.yaml' %}
The above external secret will lead to the creation of a secret in the following form:
{% include 'passbolt-secret-example.yaml' %}
Finding a secret by name
Instead of retrieving secrets by ID you can also use dataFrom
to search for secrets by name.
{% include 'passbolt-external-secret-findbyname.yaml' %}