-
Notifications
You must be signed in to change notification settings - Fork 187
Arm build cluster #4188
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Arm build cluster #4188
Changes from all commits
060f335
e2c84da
c0e35b3
5cf1726
0988f1e
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,238 @@ | ||
| --- | ||
| # From https://github.com/external-secrets/kubernetes-external-secrets/blob/master/charts/kubernetes-external-secrets/crds/kubernetes-client.io_externalsecrets_crd.yaml | ||
| apiVersion: apiextensions.k8s.io/v1 | ||
| kind: CustomResourceDefinition | ||
| metadata: | ||
| name: externalsecrets.kubernetes-client.io | ||
| annotations: | ||
| # for helm v2 backwards compatibility | ||
| helm.sh/hook: crd-install | ||
| # used in e2e testing | ||
| app.kubernetes.io/managed-by: helm | ||
| spec: | ||
| group: kubernetes-client.io | ||
| scope: Namespaced | ||
|
|
||
| versions: | ||
| - name: v1 | ||
| served: true | ||
| storage: true | ||
| subresources: | ||
| status: {} | ||
| schema: | ||
| openAPIV3Schema: | ||
| required: | ||
| - spec | ||
| type: object | ||
| properties: | ||
| spec: | ||
| type: object | ||
| properties: | ||
| controllerId: | ||
| description: The ID of controller instance that manages this ExternalSecret. | ||
| This is needed in case there is more than a KES controller instances within the cluster. | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. c/a/one
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. All of this is just copied verbatim over from prow/cluster/build, and I don't want to create a diff there. I think this is actually from upstream, too. |
||
| type: string | ||
| type: | ||
| type: string | ||
| description: >- | ||
| DEPRECATED: Use spec.template.type | ||
| template: | ||
| description: Template which will be deep merged without mutating | ||
| any existing fields. into generated secret, can be used to | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. grammer?
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. See above. |
||
| set for example annotations or type on the generated secret | ||
| type: object | ||
| x-kubernetes-preserve-unknown-fields: true | ||
| backendType: | ||
| description: >- | ||
| Determines which backend to use for fetching secrets | ||
| type: string | ||
| enum: | ||
| - secretsManager | ||
| - systemManager | ||
| - vault | ||
| - azureKeyVault | ||
| - gcpSecretsManager | ||
| - alicloudSecretsManager | ||
| - ibmcloudSecretsManager | ||
| - akeyless | ||
| vaultRole: | ||
| description: >- | ||
| Used by: vault | ||
| type: string | ||
| vaultMountPoint: | ||
| description: >- | ||
| Used by: vault | ||
| type: string | ||
| kvVersion: | ||
| description: Vault K/V version either 1 or 2, default = 2 | ||
| type: integer | ||
| minimum: 1 | ||
| maximum: 2 | ||
| keyVaultName: | ||
| description: >- | ||
| Used by: azureKeyVault | ||
| type: string | ||
| dataFrom: | ||
| type: array | ||
| items: | ||
| type: string | ||
| dataFromWithOptions: | ||
| type: array | ||
| items: | ||
| type: object | ||
| properties: | ||
| key: | ||
| description: Secret key in backend | ||
| type: string | ||
| isBinary: | ||
| description: >- | ||
| Whether the backend secret shall be treated as binary data | ||
| represented by a base64-encoded string. You must set this to true | ||
| for any base64-encoded binary data in the backend - to ensure it | ||
| is not encoded in base64 again. Default is false. | ||
| type: boolean | ||
| versionStage: | ||
| description: >- | ||
| Used by: alicloudSecretsManager, secretsManager | ||
| type: string | ||
| versionId: | ||
| description: >- | ||
| Used by: secretsManager | ||
| type: string | ||
| required: | ||
| - key | ||
| data: | ||
| type: array | ||
| items: | ||
| type: object | ||
| properties: | ||
| key: | ||
| description: Secret key in backend | ||
| type: string | ||
| name: | ||
| description: Name set for this key in the generated secret | ||
| type: string | ||
| property: | ||
| description: Property to extract if secret in backend is a JSON object | ||
| type: string | ||
| isBinary: | ||
| description: >- | ||
| Whether the backend secret shall be treated as binary data | ||
| represented by a base64-encoded string. You must set this to true | ||
| for any base64-encoded binary data in the backend - to ensure it | ||
| is not encoded in base64 again. Default is false. | ||
| type: boolean | ||
| path: | ||
| description: >- | ||
| Path from SSM to scrape secrets | ||
| This will fetch all secrets and use the key from the secret as variable name | ||
| type: string | ||
| recursive: | ||
| description: Allow to recurse thru all child keys on a given path, default false | ||
| type: boolean | ||
| secretType: | ||
| description: >- | ||
| Used by: ibmcloudSecretsManager | ||
| Type of secret - one of username_password, iam_credentials or arbitrary | ||
| type: string | ||
| version: | ||
| description: >- | ||
| Used by: gcpSecretsManager | ||
| type: string | ||
| x-kubernetes-int-or-string: true | ||
| versionStage: | ||
| description: >- | ||
| Used by: alicloudSecretsManager, secretsManager | ||
| type: string | ||
| versionId: | ||
| description: >- | ||
| Used by: secretsManager | ||
| type: string | ||
| oneOf: | ||
| - required: | ||
| - key | ||
| - name | ||
| - required: | ||
| - path | ||
| roleArn: | ||
| type: string | ||
| description: >- | ||
| Used by: alicloudSecretsManager, secretsManager, systemManager | ||
| region: | ||
| type: string | ||
| description: >- | ||
| Used by: secretsManager, systemManager | ||
| projectId: | ||
| type: string | ||
| description: >- | ||
| Used by: gcpSecretsManager | ||
| keyByName: | ||
| type: boolean | ||
| description: >- | ||
| Whether to interpret the key as a secret name (if true) or ID (the default). | ||
| Used by: ibmcloudSecretsManager | ||
| oneOf: | ||
| - properties: | ||
| backendType: | ||
| enum: | ||
| - secretsManager | ||
| - systemManager | ||
| - properties: | ||
| backendType: | ||
| enum: | ||
| - vault | ||
| - properties: | ||
| backendType: | ||
| enum: | ||
| - azureKeyVault | ||
| required: | ||
| - keyVaultName | ||
| - properties: | ||
| backendType: | ||
| enum: | ||
| - gcpSecretsManager | ||
| - properties: | ||
| backendType: | ||
| enum: | ||
| - alicloudSecretsManager | ||
| - properties: | ||
| backendType: | ||
| enum: | ||
| - ibmcloudSecretsManager | ||
| - properties: | ||
| backendType: | ||
| enum: | ||
| - akeyless | ||
| anyOf: | ||
| - required: | ||
| - data | ||
| - required: | ||
| - dataFrom | ||
| - required: | ||
| - dataFromWithOptions | ||
| status: | ||
| type: object | ||
| properties: | ||
| lastSync: | ||
| type: string | ||
| status: | ||
| type: string | ||
| observedGeneration: | ||
| type: number | ||
| additionalPrinterColumns: | ||
| - jsonPath: .status.lastSync | ||
| name: Last Sync | ||
| type: date | ||
| - jsonPath: .status.status | ||
| name: status | ||
| type: string | ||
| - jsonPath: .metadata.creationTimestamp | ||
| name: Age | ||
| type: date | ||
|
|
||
| names: | ||
| shortNames: | ||
| - es | ||
| kind: ExternalSecret | ||
| plural: externalsecrets | ||
| singular: externalsecret | ||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,41 @@ | ||
| --- | ||
| # Source: kubernetes-external-secrets/templates/deployment.yaml | ||
| apiVersion: apps/v1 | ||
| kind: Deployment | ||
| metadata: | ||
| name: kubernetes-external-secrets | ||
| namespace: "default" | ||
| labels: | ||
| app.kubernetes.io/name: kubernetes-external-secrets | ||
| spec: | ||
| replicas: 1 | ||
| selector: | ||
| matchLabels: | ||
| app.kubernetes.io/name: kubernetes-external-secrets | ||
| template: | ||
| metadata: | ||
| labels: | ||
| app.kubernetes.io/name: kubernetes-external-secrets | ||
| spec: | ||
| serviceAccountName: kubernetes-external-secrets-sa | ||
| containers: | ||
| - name: kubernetes-external-secrets | ||
| image: "ghcr.io/external-secrets/kubernetes-external-secrets:8.5.1" | ||
| ports: | ||
| - name: prometheus | ||
| containerPort: 3001 | ||
| imagePullPolicy: IfNotPresent | ||
| resources: | ||
| {} | ||
| env: | ||
| - name: "LOG_LEVEL" | ||
| value: "info" | ||
| - name: "METRICS_PORT" | ||
| value: "3001" | ||
| - name: "POLLER_INTERVAL_MILLISECONDS" | ||
| value: "10000" | ||
| - name: "WATCH_TIMEOUT" | ||
| value: "60000" | ||
| # Params for env vars populated from k8s secrets | ||
| securityContext: | ||
| runAsNonRoot: true |
Uh oh!
There was an error while loading. Please reload this page.