content
large_stringlengths
3
20.5k
url
large_stringlengths
54
193
branch
large_stringclasses
4 values
source
large_stringclasses
42 values
embeddings
listlengths
384
384
score
float64
-0.21
0.65
# A few common k8s secret types examples Here we will give some examples of how to work with a few common k8s secret types. We will give this examples here with the gcp provider (should work with other providers in the same way). Please also check the guides on [Advanced Templating](templating.md) to understand the det...
https://github.com/external-secrets/external-secrets/blob/main//docs/guides/common-k8s-secret-types.md
main
external-secrets
[ -0.0987536758184433, 0.05172717571258545, 0.07325775921344757, -0.014285164885222912, -0.03629830852150917, 0.02662549540400505, 0.05219968408346176, 0.01630488783121109, -0.015369267202913761, 0.04920567199587822, -0.020886771380901337, -0.09488516300916672, 0.04372015967965126, -0.022184...
-0.042859
External Secrets Operator provides different modes of operation to fulfill organizational needs. This guide outlines the flexibility of ESO and should give you a first impression of how you can employ this operator in your organization. For a multi-tenant deployment you should first examine your organizational structur...
https://github.com/external-secrets/external-secrets/blob/main//docs/guides/multi-tenancy.md
main
external-secrets
[ -0.015743067488074303, -0.027930613607168198, -0.010584323666989803, -0.007584545761346817, -0.053584024310112, -0.024380797520279884, 0.023125674575567245, -0.025270698592066765, 0.05975163355469704, 0.017843279987573624, -0.01218346506357193, -0.06576001644134521, 0.05546566843986511, -0...
0.136325
Contrary to what `ExternalSecret` does by pulling secrets from secret providers and creating `kind=Secret` in your cluster, `PushSecret` reads a local `kind=Secret` and pushes its content to a secret provider. The update behavior of `PushSecret` is controlled by `spec.updatePolicy`. The default policy is `Replace`, suc...
https://github.com/external-secrets/external-secrets/blob/main//docs/guides/pushsecrets.md
main
external-secrets
[ -0.0937834158539772, -0.04664010554552078, 0.013233327306807041, 0.050961971282958984, 0.018891775980591774, -0.03524467349052429, 0.04044267162680626, 0.005663218442350626, 0.026661165058612823, 0.021625038236379623, 0.06087304651737213, -0.029401656240224838, 0.021966900676488876, -0.035...
0.017562
# Guides The following guides demonstrate use-cases and provide examples of how to use the API. Please pick one of the following guides: \* [Multi-Tenancy Design Considerations](multi-tenancy.md) \* [Find multiple secrets & Extract Secret values](getallsecrets.md) \* [Advanced Templating](templating.md) \* [Targeting C...
https://github.com/external-secrets/external-secrets/blob/main//docs/guides/introduction.md
main
external-secrets
[ -0.00009131057595368475, 0.033954281359910965, -0.08692086488008499, -0.04766193777322769, 0.025578292086720467, -0.04180567339062691, -0.04430156573653221, 0.01737564615905285, -0.018193909898400307, 0.06366671621799469, 0.03388887271285057, 0.0027469350025057793, 0.13164153695106506, -0....
0.001716
# Advanced Templating v1 !!! warning Templating Engine v1 is \*\*deprecated\*\* and will be removed in the future. Please migrate to engine v2 and take a look at our [upgrade guide](templating.md#migrating-from-v1) for changes. !!! note Templating Engine v1 does NOT support templating the `spec.target.template.metadata...
https://github.com/external-secrets/external-secrets/blob/main//docs/guides/templating-v1.md
main
external-secrets
[ -0.05117591470479965, 0.13296222686767578, -0.02128717303276062, 0.03125239536166191, 0.007541590835899115, 0.028300510719418526, 0.035563986748456955, 0.049981776624917984, -0.04918743669986725, -0.06676949560642242, 0.05044948309659958, -0.06956613063812256, -0.02067110501229763, -0.0025...
0.041336
# Upgrading CRD versions From version v0.5.0, `v1alpha1` version is deprecated, and `v1beta1` is in place. This guide will cover the main differences between the two versions, and a procedure on how to safely upgrade it. ## Differences between versions Versions v1alpha1 and v1beta1 are fully-compatible for SecretStores...
https://github.com/external-secrets/external-secrets/blob/main//docs/guides/v1beta1.md
main
external-secrets
[ -0.0961495190858841, 0.004387669265270233, 0.03303522989153862, -0.00831935741007328, 0.04582257941365242, -0.010231352411210537, -0.04281163960695267, 0.008248867467045784, 0.04128387197852135, 0.035465795546770096, 0.05256389454007149, -0.05802526697516441, 0.022943168878555298, -0.09388...
0.053628
# Advanced Templating v2 With External Secrets Operator you can transform the data from the external secret provider before it is stored as `Kind=Secret`. You can do this with the `Spec.Target.Template`. Each data value is interpreted as a [Go template](https://golang.org/pkg/text/template/). Please note that referenci...
https://github.com/external-secrets/external-secrets/blob/main//docs/guides/templating.md
main
external-secrets
[ -0.04468819499015808, 0.11085355281829834, -0.0017512253252789378, 0.029823070392012596, -0.01184196025133133, 0.02340693585574627, 0.052369583398103714, 0.06804549694061279, 0.012817555107176304, -0.012150873430073261, 0.022198261693120003, -0.08335881680250168, 0.01846393756568432, -0.00...
-0.021413
a look at this example on how to transform it into the desired format: ```yaml {% include 'jwk-template-v2-external-secret.yaml' %} ``` ### Filter PEM blocks Consider you have a secret that contains both a certificate and a private key encoded in PEM format and it is your goal to use only the certificate from that secr...
https://github.com/external-secrets/external-secrets/blob/main//docs/guides/templating.md
main
external-secrets
[ -0.038208991289138794, 0.1300753355026245, 0.0157445278018713, -0.00921020656824112, 0.03682783246040344, 0.005385029595345259, 0.008208569139242172, 0.013146341778337955, 0.03005961887538433, -0.022127903997898102, 0.015232634730637074, -0.09905252605676651, 0.04151405021548271, -0.006640...
-0.114332
feel a function is missing or might be valuable feel free to open an issue and submit a [pull request](../contributing/process.md#submitting-a-pull-request). | Function | Description | | ---------------- | ------------------------------------------------------------------------------------------------------------------...
https://github.com/external-secrets/external-secrets/blob/main//docs/guides/templating.md
main
external-secrets
[ -0.09220042079687119, 0.026073133572936058, 0.027912326157093048, -0.0014610819052904844, 0.04664292559027672, -0.009589440189301968, -0.044720057398080826, 0.033961132168769836, 0.03234987333416939, 0.00874327588826418, -0.013986196368932724, -0.08545362204313278, -0.028527643531560898, -...
0.028684
`toJSON` was renamed to `toJson`. Any errors that occur during marshalling are silenced. - `pkcs12key` and `pkcs12keyPass` encode the PKCS#8 key directly into PEM format. There is no need to call `pemPrivateKey` anymore. Also, these functions do extract all private keys from the PKCS#12 archive not just the first one. ...
https://github.com/external-secrets/external-secrets/blob/main//docs/guides/templating.md
main
external-secrets
[ -0.13729172945022583, 0.07683254778385162, -0.06798906624317169, -0.07136261463165283, 0.05934031307697296, -0.01086523849517107, -0.036637771874666214, 0.01630522310733795, 0.03506099805235863, 0.005243802443146706, 0.04783761873841286, 0.013790291734039783, 0.030141567811369896, 0.030359...
-0.040164
You can test a feature that was not yet released using the following methods, use them at your own discretion: ### Helm 1. Create a `values.yaml` file with the following content: ```yaml replicaCount: 1 image: repository: ghcr.io/external-secrets/external-secrets pullPolicy: IfNotPresent # -- The image tag to use. The ...
https://github.com/external-secrets/external-secrets/blob/main//docs/guides/using-latest-image.md
main
external-secrets
[ -0.03685936704277992, 0.03472455218434334, 0.050463657826185226, -0.03630765900015831, 0.048805031925439835, -0.056963153183460236, -0.11860793083906174, 0.02718427963554859, 0.034950755536556244, 0.03899887204170227, 0.02535879984498024, -0.10879666358232498, 0.025560854002833366, -0.0222...
0.021945
# Using the esoctl tool The tool can be found under `cmd/esoctl`. ## Debugging templates The `template` command can be used to test templates for `PushSecret` and `ExternalSecret`. To run render simply execute `make build` in the `cmd/esoctl` folder. This will result in a binary under `cmd/esoctl/bin`. Once the build s...
https://github.com/external-secrets/external-secrets/blob/main//docs/guides/using-esoctl-tool.md
main
external-secrets
[ -0.11002561450004578, -0.014819213189184666, 0.005214882083237171, 0.01795327290892601, 0.058521393686532974, -0.060160212218761444, -0.043161265552043915, 0.0478096641600132, 0.0052874889224767685, 0.005984734743833542, 0.035555336624383926, -0.11394529044628143, -0.024008870124816895, -0...
0.039354
GrafanaSpec \*GrafanaSpec `json:"grafanaSpec,omitempty"` MFASpec \*MFASpec `json:"mfaSpec,omitempty"` + MyAwesomeGeneratorSpec \*MyAwesomeGeneratorSpec `json:"myawesomegeneratorSpec,omitempty"` } // ClusterGenerator represents a cluster-wide generator which can be referenced as part of `generatorRef` fields. diff --git...
https://github.com/external-secrets/external-secrets/blob/main//docs/guides/using-esoctl-tool.md
main
external-secrets
[ -0.16615106165409088, 0.03637252748012543, -0.08366533368825912, 0.016604870557785034, 0.03148878365755081, -0.039433322846889496, -0.03262367099523544, 0.005203960929065943, -0.009096469730138779, -0.05895347520709038, 0.086549773812294, -0.07202927768230438, -0.017822787165641785, -0.030...
0.14147
# Targeting Custom Resources !!! warning "Maturity" At the time of this writing (1.11.2025) this feature is in heavy alpha status. Please consider the following documentation with the limitations and guardrails described below. External Secrets Operator can create and manage resources beyond Kubernetes Secrets. When yo...
https://github.com/external-secrets/external-secrets/blob/main//docs/guides/targeting-custom-resources.md
main
external-secrets
[ -0.01492279302328825, 0.028787866234779358, 0.035351190716028214, 0.00982317328453064, 0.012105297297239304, 0.006830370519310236, 0.08313523977994919, 0.01651371829211712, 0.07243131846189499, 0.022160544991493225, -0.02686925418674946, -0.08120685815811157, 0.05984262004494667, 0.0241363...
0.094883
resources using the template metadata: ```yaml {% include 'manifest-labeled-configmap.yaml' %} ``` The operator automatically adds the `externalsecrets.external-secrets.io/managed: "true"` label to track which resources it manages. ## RBAC Requirements When using custom resource targets, ensure the External Secrets Ope...
https://github.com/external-secrets/external-secrets/blob/main//docs/guides/targeting-custom-resources.md
main
external-secrets
[ -0.03395914286375046, -0.02221611887216568, -0.04626108333468437, 0.022790832445025444, 0.06799434870481491, -0.019227074459195137, 0.014159864746034145, 0.01046162098646164, 0.019639289006590843, 0.042542532086372375, 0.013049387373030186, -0.031988296657800674, 0.06363702565431595, 0.028...
0.092247
# Rewriting Keys in DataFrom When calling out an ExternalSecret with `dataFrom.extract` or `dataFrom.find`, it is possible that you end up with a kubernetes secret that has conflicts in the key names, or that you simply want to remove a common path from the secret keys. In order to do so, it is possible to define a set...
https://github.com/external-secrets/external-secrets/blob/main//docs/guides/datafrom-rewrite.md
main
external-secrets
[ -0.05582069978117943, 0.06751065701246262, 0.06354149430990219, -0.004706914070993662, -0.02888891100883484, -0.0021781031973659992, -0.0064198230393230915, -0.013299594633281231, 0.09988755732774734, 0.04777894169092178, -0.02368718944489956, -0.0601404570043087, 0.0013494588201865554, -0...
0.055691
key collisions The following ExternalSecret: ```yaml {% include 'datafrom-rewrite-conflict.yaml' %} ``` Will allow two secrets with the same JSON keys to be imported into a Kubernetes Secret without any conflict. In this example, if we had the following secrets available in the provider: ```json { "my-secrets-dev": { "...
https://github.com/external-secrets/external-secrets/blob/main//docs/guides/datafrom-rewrite.md
main
external-secrets
[ -0.0759800523519516, 0.008679581806063652, 0.07164355367422104, -0.03402112424373627, 0.0038227990735322237, -0.0356874018907547, -0.008656799793243408, -0.01718919165432453, 0.1065601333975792, -0.011030670255422592, 0.07238984107971191, 0.0002076178352581337, 0.06641492247581482, -0.0322...
-0.002929
# Deploying without ClusterSecretStore and ClusterExternalSecret and ClusterPushSecret When deploying External Secrets Operator via Helm chart, the default configuration will install `ClusterSecretStore` and `ClusterExternalSecret` and other CRDs and these objects will be processed by the operator. In order to disable ...
https://github.com/external-secrets/external-secrets/blob/main//docs/guides/disable-cluster-features.md
main
external-secrets
[ 0.019442280754446983, 0.032564856112003326, -0.016533100977540016, -0.011170887388288975, -0.0043472908437252045, 0.007092128042131662, -0.052902646362781525, -0.0029823249205946922, 0.009599518030881882, 0.04392059147357941, 0.04228374734520912, -0.08573656529188156, 0.034748125821352005, ...
0.028596
# Lifecycle The External Secrets Operator manages the lifecycle of secrets in Kubernetes. With `refreshPolicy`, `creationPolicy` and `deletionPolicy` you get fine-grained control of its lifecycle. !!! note "Creation/Deletion Policy Combinations" Some combinations of creationPolicy/deletionPolicy are not allowed as they...
https://github.com/external-secrets/external-secrets/blob/main//docs/guides/ownership-deletion-policy.md
main
external-secrets
[ -0.10323890298604965, -0.038789935410022736, 0.007998289540410042, 0.034368306398391724, -0.02309594675898552, -0.008767814375460148, 0.013595635071396828, -0.05874668061733246, 0.1575581580400467, 0.05457814037799835, 0.03962429240345955, -0.018775928765535355, -0.012220178730785847, -0.0...
0.108919
gets deleted on the provider side and is not accessible anymore this is not considered an error and the ExternalSecret does not go into SecretSyncedError status.
https://github.com/external-secrets/external-secrets/blob/main//docs/guides/ownership-deletion-policy.md
main
external-secrets
[ -0.10841391235589981, -0.03966769948601723, -0.009345016442239285, 0.034779373556375504, 0.03590823709964752, -0.019081033766269684, -0.006020188797265291, -0.0010104426182806492, 0.0759778693318367, -0.01628516986966133, 0.0596928708255291, 0.02247176133096218, 0.016338838264346123, 0.028...
-0.001968
# Controller Classes > NOTE: this feature is experimental and not highly tested Controller classes are a property set during the deployment that allows multiple controllers to work in a group of workload. It works by separating which secretStores are going to be attributed to which controller. For the behavior of a sin...
https://github.com/external-secrets/external-secrets/blob/main//docs/guides/controller-class.md
main
external-secrets
[ -0.06891808658838272, -0.00835566595196724, -0.07319000363349915, 0.008814138360321522, -0.004199496004730463, 0.010613062418997288, -0.019337086006999016, 0.03158828616142273, 0.018945515155792236, 0.035804059356451035, 0.1039736345410347, 0.005192471668124199, 0.02719465270638466, -0.033...
-0.049336
# GitOps using FluxCD (v2) FluxCD is a GitOps operator for Kubernetes. It synchronizes the status of the cluster from manifests allocated in different repositories (Git or Helm). This approach fits perfectly with External Secrets on clusters which are dynamically created, to get credentials with no manual intervention ...
https://github.com/external-secrets/external-secrets/blob/main//docs/examples/gitops-using-fluxcd.md
main
external-secrets
[ -0.10338130593299866, -0.0016231279587373137, 0.015734359622001648, -0.012828071601688862, -0.01887749508023262, -0.016463421285152435, 0.03313407674431801, 0.03823968395590782, 0.09692852199077606, 0.07324283570051193, -0.03332572430372238, -0.07186610996723175, 0.07930687069892883, -0.03...
0.246485
the CRDs As mentioned, CRDs can be deployed using the official Helm package, but to solve the race condition, they will be deployed from our git repository using a Kustomization manifest called `deployment-crds.yaml` as follows: ```yaml {% include 'gitops/deployment-crds.yaml' %} ``` ## Deploy the operator The operator...
https://github.com/external-secrets/external-secrets/blob/main//docs/examples/gitops-using-fluxcd.md
main
external-secrets
[ -0.01650422066450119, 0.003662011818960309, 0.015796344727277756, -0.10072272270917892, -0.003900666953995824, -0.015397122129797935, -0.02658027596771717, 0.004133619833737612, -0.00879777129739523, 0.025509459897875786, 0.03940870985388756, -0.05780963972210884, 0.026063309982419014, -0....
0.042931
# Bitwarden support using webhook provider Bitwarden is an integrated open source password management solution for individuals, teams, and business organizations. !!! note This documentation is for Bitwarden \*\*Password Manager\*\*. It is different from [Bitwarden Secrets Manager](https://bitwarden.com/products/secret...
https://github.com/external-secrets/external-secrets/blob/main//docs/examples/bitwarden.md
main
external-secrets
[ -0.11878269910812378, -0.021242793649435043, -0.08167585730552673, -0.004855410195887089, -0.02029346115887165, -0.04624081403017044, -0.012000108137726784, -0.022515572607517242, -0.01292773149907589, -0.004443629179149866, 0.02198396436870098, -0.03786301240324974, 0.0793280154466629, -0...
0.098724
# Getting started Jenkins is one of the most popular automation servers for continuous integration, automation, scheduling jobs and for generic pipelining. It has an extensive set of plugins that extend or provide additional functionality including the [kubernetes credentials plugin](https://github.com/jenkinsci/kubern...
https://github.com/external-secrets/external-secrets/blob/main//docs/examples/jenkins-kubernetes-credentials.md
main
external-secrets
[ -0.09600162506103516, 0.0088399238884449, -0.03862336277961731, 0.00283878855407238, -0.061161063611507416, -0.010111343115568161, -0.01859411969780922, 0.006311197765171528, 0.08240161091089249, 0.012483594007790089, -0.050676602870225906, -0.040607478469610214, 0.04445735365152359, -0.00...
0.176633
# Getting started \*\*Anchore Engine\*\* is an open-source platform that provides centralized inspection, analysis, and certification of container images. When integrated with Kubernetes, it adds powerful features—such as preventing unscanned images from being deployed into your clusters. ## Installation with Helm Ther...
https://github.com/external-secrets/external-secrets/blob/main//docs/examples/anchore-engine-credentials.md
main
external-secrets
[ 0.013270695693790913, 0.024704722687602043, -0.026935985311865807, -0.00665806932374835, 0.02026652917265892, -0.020822737365961075, 0.0067910607904195786, -0.005450442899018526, 0.07631642371416092, 0.033382244408130646, -0.022134961560368538, -0.06583283841609955, 0.07414171099662781, -0...
0.02651
![PushSecret](../pictures/diagrams-pushsecret-basic.png) The `PushSecret` is namespaced and it describes what data should be pushed to the secret provider. \* tells the operator what secrets should be pushed by using `spec.selector`. \* you can specify what secret keys should be pushed by using `spec.data`. \* you can ...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/pushsecret.md
main
external-secrets
[ -0.05456775799393654, 0.019606439396739006, -0.0019772136583924294, 0.03914736583828926, 0.0001737513521220535, 0.011826165951788425, 0.016943365335464478, 0.08740609139204025, -0.005072600208222866, -0.01426331140100956, 0.06883794069290161, -0.045001499354839325, 0.0005346522084437311, 0...
0.049565
![ClusterExternalSecret](../pictures/diagrams-cluster-external-secrets.png) The `ClusterExternalSecret` is a cluster scoped resource that can be used to manage `ExternalSecret` resources in specific namespaces. With `namespaceSelectors` you can select namespaces in which the ExternalSecret should be created. If there i...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/clusterexternalsecret.md
main
external-secrets
[ -0.060257963836193085, -0.10453102737665176, -0.004809287376701832, 0.05980167165398598, 0.05393882468342781, -0.022558441385626793, -0.020388852804899216, -0.030972614884376526, 0.08266060054302216, -0.013055666349828243, 0.07025023549795151, -0.08104371279478073, 0.035733576864004135, -0...
0.153992
The `ExternalSecret` describes what data should be fetched, how the data should be transformed and saved as a `Kind=Secret`: \* tells the operator what secrets should be synced by using `spec.data` to explicitly sync individual keys or use `spec.dataFrom` to get \*\*all values\*\* from the external API. \* you can spec...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/externalsecret.md
main
external-secrets
[ -0.1007113829255104, 0.02780723199248314, -0.06186514347791672, 0.03801574558019638, -0.007913971319794655, 0.003589602652937174, 0.026868578046560287, 0.0851307064294815, -0.0217849500477314, -0.029173927381634712, 0.05990337207913399, -0.060562875121831894, 0.0005295035080052912, 0.01257...
0.070791
The `ClusterPushSecret` is a cluster scoped resource that can be used to manage `PushSecret` resources in specific namespaces. With `namespaceSelectors` you can select namespaces in which the PushSecret should be created. If there is a conflict with an existing resource the controller will error out. ## Example Below i...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/clusterpushsecret.md
main
external-secrets
[ -0.06612295657396317, -0.09286241233348846, -0.04707647114992142, 0.05850396305322647, 0.01667727343738079, 0.02888067252933979, -0.02833518385887146, -0.00040663083200342953, 0.014007319696247578, 0.015851985663175583, 0.07699023932218552, -0.09817799925804138, 0.034671202301979065, 0.004...
0.090568
# Components ## Overview External Secrets comes with three components: `Core Controller`, `Webhook` and `Cert Controller`. This is due to the need to implement conversion webhooks in order to convert custom resources between api versions and to provide a ValidatingWebhook for the `ExternalSecret` and `SecretStore` reso...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/components.md
main
external-secrets
[ -0.11011573672294617, 0.08337543159723282, -0.06075255945324898, 0.008451523259282112, 0.05834077671170235, -0.025007149204611778, -0.03658874332904816, 0.04934968799352646, 0.083292156457901, -0.029574479907751083, 0.062261030077934265, -0.07456963509321213, 0.09185701608657837, 0.0021636...
-0.001052
# Controller Options The external-secrets binary includes three components: `core controller`, `certcontroller` and `webhook`. ## Core Controller Flags The core controller is invoked without a subcommand and can be configured with the following flags: | Name | Type | Default | Description | |---------------------------...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/controller-options.md
main
external-secrets
[ -0.07232919335365295, -0.011883536353707314, -0.13840189576148987, -0.00752749340608716, 0.021179962903261185, -0.03592437133193016, -0.03788599744439125, 0.037977464497089386, 0.0308176688849926, 0.015317199751734734, 0.060944005846977234, -0.09437654167413712, -0.00821455754339695, -0.06...
0.046796
`--help` | | | help for certcontroller | | `--loglevel` | string | info | loglevel to use, one of: debug, info, warn, error, dpanic, panic, fatal | | `--zap-time-encoding` | string | epoch | time encoding to use, one of: epoch, millis, nano, iso8601, rfc3339, rfc3339nano | | `--metrics-addr` | string | :8080 | The addr...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/controller-options.md
main
external-secrets
[ -0.059017445892095566, -0.0071967169642448425, -0.1279495358467102, -0.03168480470776558, -0.030619848519563675, -0.0060133119113743305, 0.004395004827529192, 0.03169571980834007, 0.008027427829802036, -0.0018660200294107199, 0.06116867437958717, -0.137618750333786, 0.04071459919214249, 0....
0.097219
# ExternalSecret Selectable Fields As of Kubernetes 1.30, External Secrets Operator supports selectable fields for querying ExternalSecret resources based on spec field values. This feature enables efficient server-side filtering of ExternalSecret resources. ## Overview Selectable fields allow you to use `kubectl` fiel...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/selectable-fields.md
main
external-secrets
[ -0.0049658529460430145, 0.015564064495265484, -0.013898734003305435, 0.026052948087453842, 0.06652479618787766, -0.0255307424813509, 0.06304943561553955, -0.0004877523169852793, 0.1125289797782898, -0.0007480316562578082, -0.02417207509279251, -0.10118796676397324, -0.022912828251719475, -...
0.127179
![SecretStore](../pictures/diagrams-high-level-ns-detail.png) The `SecretStore` is namespaced and specifies how to access the external API. The SecretStore maps to exactly one instance of an external API. By design, SecretStores are bound to a namespace and can not reference resources across namespaces. If you want to ...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/secretstore.md
main
external-secrets
[ -0.08747157454490662, -0.022486012428998947, -0.0866730585694313, 0.041129108518362045, 0.018987711519002914, -0.01986038126051426, -0.052558016031980515, 0.004452737048268318, -0.005166463553905487, -0.0036339955404400826, 0.06321598589420319, -0.017155427485704422, 0.03378059342503548, -...
0.09282
# Metrics The External Secrets Operator exposes its Prometheus metrics in the `/metrics` path. To enable it, set the `serviceMonitor.enabled` Helm flag to `true`. If you are using a different monitoring tool that also needs a `/metrics` endpoint, you can set the `metrics.service.enabled` Helm flag to `true`. In additio...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/metrics.md
main
external-secrets
[ -0.058781858533620834, -0.04011043906211853, -0.06854193657636642, 0.02679385617375374, -0.02716592699289322, -0.04134722426533699, -0.028793243691325188, 0.008815429173409939, 0.09267137199640274, -0.017063409090042114, 0.005176906008273363, -0.1516999751329422, 0.0059278616681694984, -0....
0.099008
able to reconcile resources in time. I.e. delivery of secret updates is delayed. Note: when a controller is restarted, then `queue length = total number of resources`. Make sure to measure the time it takes for the controller to fully reconcile all secrets after a restart. In large clusters this may take a while, make ...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/metrics.md
main
external-secrets
[ -0.09909410774707794, -0.05130169913172722, -0.04190696030855179, 0.0717601552605629, 0.04029322788119316, -0.08515562117099762, 0.0017939828103408217, -0.04123544692993164, 0.06617481261491776, 0.010242006741464138, 0.04533195495605469, 0.04424954205751419, -0.012506349943578243, -0.03600...
0.055542
Packages: * [external-secrets.io/v1](#external-secrets.io%2fv1) * [external-secrets.io/v1alpha1](#external-secrets.io%2fv1alpha1) * [external-secrets.io/v1beta1](#external-secrets.io%2fv1beta1) * [generators.external-secrets.io/v1alpha1](#generators.external-secrets.io%2fv1alpha1) ## external-secrets.io/v1 Package v1 c...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.1619214117527008, -0.003402082249522209, -0.0736924335360527, -0.006336917635053396, 0.08001778274774551, -0.003788510337471962, 0.010568471625447273, 0.025654355064034462, 0.06676347553730011, 0.008093073032796383, -0.002922129351645708, -0.06810076534748077, 0.026802506297826767, -0.0...
0.080926
| `accessID` *[External Secrets meta/v1.SecretKeySelector](https://pkg.go.dev/github.com/external-secrets/external-secrets/apis/meta/v1#SecretKeySelector)* | The SecretAccessID is used for authentication | | `accessType` *[External Secrets meta/v1.SecretKeySelector](https://pkg.go.dev/github.com/external-secrets/extern...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.08954057842493057, 0.04864443838596344, -0.07131615281105042, 0.025473108515143394, 0.010896893218159676, 0.01647925190627575, 0.044367771595716476, -0.014439304359257221, 0.039652567356824875, -0.021042734384536743, 0.05223468691110611, 0.00815493892878294, -0.017778247594833374, 0.007...
0.07414
*string* | region is for configuring the AWS region to be used. | | `awsCredentialsSecretRef` *[SecretReference](#external-secrets.io/v1.SecretReference)* | awsCredentialsSecretRef is the reference to the secret which holds the AWS credentials. Secret should be created with below names for keys - aws\_access\_key\_id: ...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.05259763449430466, 0.07302773743867874, -0.06447169929742813, 0.007000852841883898, 0.018349602818489075, 0.010479831136763096, 0.10208448767662048, -0.010963743552565575, 0.08735117316246033, 0.102470263838768, -0.017109913751482964, -0.06683750450611115, 0.09399046003818512, -0.026839...
0.098579
service principal (tenantId, clientId, clientSecret) - “ManagedIdentity”: Using Managed Identity assigned to the pod (see aad-pod-identity) | | `vaultUrl` *string* | Vault Url from which the secrets to be fetched from. | | `tenantId` *string* | *(Optional)* TenantID configures the Azure Tenant to send requests to. Requ...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.00048222840996459126, 0.0072554899379611015, -0.05135764554142952, 0.004387585446238518, -0.0536661371588707, 0.016982318833470345, 0.02999584935605526, -0.064602330327034, 0.10852177441120148, 0.08058125525712967, 0.03136332705616951, -0.027806749567389488, 0.01782863214612007, 0.05779...
0.054694
required. | | `clientId` *[BeyondTrustProviderSecretRef](#external-secrets.io/v1.BeyondTrustProviderSecretRef)* | ClientID is the API OAuth Client ID. | | `clientSecret` *[BeyondTrustProviderSecretRef](#external-secrets.io/v1.BeyondTrustProviderSecretRef)* | ClientSecret is the API OAuth Client Secret. | | `certificate...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.12087608128786087, 0.07726150006055832, -0.0396122932434082, 0.007027327083051205, 0.10322992503643036, -0.044017452746629715, 0.027498463168740273, 0.045750513672828674, 0.04452233016490936, -0.09430131316184998, 0.043649669736623764, -0.042035408318042755, 0.10609064996242523, 0.01977...
-0.010439
contains a PEM-encoded certificate. | Field | Description | | --- | --- | | `type` *[CAProviderType](#external-secrets.io/v1.CAProviderType)* | The type of provider to use such as “Secret”, or “ConfigMap”. | | `name` *string* | The name of the object located at the provider type. | | `key` *string* | The key where the ...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.03590930998325348, 0.013856316916644573, -0.028632286936044693, 0.046349674463272095, 0.044450946152210236, -0.03097333014011383, 0.07626230269670486, 0.03673243150115013, 0.038443394005298615, -0.02629930153489113, 0.04815826565027237, -0.13315807282924652, 0.11162674427032471, -0.0088...
0.088469
`metadata` *[Kubernetes meta/v1.ObjectMeta](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.25/#objectmeta-v1-meta)* | Refer to the Kubernetes API documentation for the fields of the `metadata` field. | | `spec` *[ClusterExternalSecretSpec](#external-secrets.io/v1.ClusterExternalSecretSpec)* | | `exter...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.038103628903627396, -0.030854349955916405, -0.03372679650783539, 0.012348423711955547, 0.01641882210969925, -0.0004846010124310851, 0.011815523728728294, 0.04175858199596405, 0.08530370146036148, 0.04267673194408417, 0.0064116124995052814, -0.12599234282970428, -0.005738083738833666, -0...
0.165901
| | `status` *[Kubernetes core/v1.ConditionStatus](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.25/#conditionstatus-v1-core)* | | | `message` *string* | *(Optional)* | ### ClusterSecretStore ClusterSecretStore represents a secure external location for storing secrets, which can be referenced as part...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.010876642540097237, 0.03429099917411804, -0.07759604603052139, 0.042468782514333725, 0.016738945618271828, 0.03302573040127754, -0.0067464387975633144, 0.011267311871051788, 0.07106801867485046, 0.07384193688631058, 0.023658540099859238, -0.09679335355758667, 0.02032807096838951, -0.039...
0.182392
in a Secret resource containing JWT token to authenticate with Conjur using the JWT authentication method. | | `serviceAccountRef` *[External Secrets meta/v1.ServiceAccountSelector](https://pkg.go.dev/github.com/external-secrets/external-secrets/apis/meta/v1#ServiceAccountSelector)* | *(Optional)* Optional ServiceAccou...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.11138158291578293, 0.030644025653600693, 0.051361460238695145, -0.05395825207233429, -0.05911249294877052, -0.02857128530740738, 0.0543639175593853, 0.020948775112628937, 0.12211734801530838, -0.009412456303834915, -0.0006203243974596262, -0.047049883753061295, 0.041790712624788284, -0....
0.117873
| | `host` *string* | URL configures the Device42 instance URL. | | `auth` *[Device42Auth](#external-secrets.io/v1.Device42Auth)* | Auth configures how secret-manager authenticates with a Device42 instance. | ### Device42SecretRef (*Appears on:* [Device42Auth](#external-secrets.io/v1.Device42Auth)) Device42SecretRef co...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.06908850371837616, 0.024135665968060493, -0.011266004294157028, -0.03859477862715721, 0.04082735627889633, -0.060737453401088715, 0.0020460968371480703, 0.033309560269117355, 0.022414278239011765, 0.01920551247894764, 0.05786643922328949, -0.015122460201382637, 0.07054485380649567, 0.01...
0.026469
“µs”), “ms”, “s”, “m”, “h” Example values: “1h0m0s”, “2h30m0s”, “10m0s” May be set to “0s” to fetch and create it once. Defaults to 1h0m0s. | | `data` *[[]ExternalSecretData](#external-secrets.io/v1.ExternalSecretData)* | *(Optional)* Data defines the connection between the Kubernetes Secret keys and the Provider data ...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.032366879284381866, -0.004894607234746218, 0.00024231306451838464, 0.0044933222234249115, -0.015167448669672012, -0.019732298329472542, 0.026599708944559097, 0.008045806549489498, 0.0906849279999733, 0.039839088916778564, 0.05833185836672783, -0.08441667258739471, 0.047273170202970505, ...
0.098836
| | --- | --- | | `key` *string* | Key is the key used in the Provider, mandatory | | `metadataPolicy` *[ExternalSecretMetadataPolicy](#external-secrets.io/v1.ExternalSecretMetadataPolicy)* | *(Optional)* Policy for fetching tags/labels from provider secrets, possible options are Fetch, None. Defaults to None | | `prop...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.05341070517897606, 0.006919356063008308, -0.062474243342876434, -0.022178472951054573, 0.08678391575813293, -0.020990168675780296, 0.04701054096221924, 0.03420804440975189, -0.027306942269206047, -0.033417027443647385, 0.07292340695858002, -0.06337657570838928, 0.035580795258283615, -0....
0.027228
the ExternalSecret’s metadata or spec changes. | | "Periodic" | RefreshPolicyPeriodic synchronizes the Secret from the provider at regular intervals. | ### ExternalSecretRewrite (*Appears on:* [ExternalSecretDataFromRemoteRef](#external-secrets.io/v1.ExternalSecretDataFromRemoteRef)) ExternalSecretRewrite defines how t...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.10678242146968842, -0.017354076728224754, 0.030709106475114822, 0.033399924635887146, 0.03231586515903473, -0.03399255499243736, 0.011300208978354931, 0.026265429332852364, 0.041071273386478424, 0.004964275751262903, 0.04744324833154678, -0.00988063309341669, 0.03938755765557289, -0.059...
0.056836
from the external source at regular intervals specified by refreshInterval. No periodic updates occur if refreshInterval is 0. - OnChange: Only synchronizes the Secret when the ExternalSecret’s metadata or specification changes | | `refreshInterval` *[Kubernetes meta/v1.Duration](https://pkg.go.dev/k8s.io/apimachinery/...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.027664095163345337, -0.01511349342763424, 0.033539336174726486, 0.001796357100829482, -0.024664876982569695, -0.024445662274956703, -0.028170496225357056, 0.02018456533551216, 0.11943662166595459, 0.00626040156930685, 0.04365602508187294, -0.057836901396512985, -0.019317271187901497, -0...
0.06817
| Field | Description | | --- | --- | | `annotations` *map[string]string* | *(Optional)* | | `labels` *map[string]string* | *(Optional)* | | `finalizers` *[]string* | *(Optional)* | ### ExternalSecretValidator ExternalSecretValidator implements a validating webhook for ExternalSecrets. ### FakeProvider (*Appears on:* [...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.14265279471874237, 0.05721556022763252, -0.04428716376423836, 0.027015559375286102, 0.05893520638346672, -0.0519494004547596, 0.020386189222335815, 0.010902871377766132, -0.010410708375275135, -0.04226023703813553, 0.05320362374186516, -0.09841612726449966, 0.042323701083660126, 0.01566...
0.071769
is the name of the cluster If not specified, it fetches information from the metadata server | | `clusterProjectID` *string* | *(Optional)* ClusterProjectID is the project ID of the cluster If not specified, it fetches information from the metadata server | ### GCPWorkloadIdentityFederation (*Appears on:* [GCPSMAuth](#...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.05415955185890198, -0.02266688458621502, 0.003919878508895636, 0.027125073596835136, -0.012517440132796764, 0.016591981053352356, 0.040914472192525864, 0.013632806949317455, 0.03607857972383499, 0.017160644754767418, -0.022682897746562958, -0.097289077937603, 0.0737190693616867, -0.0352...
0.139867
the Github APP that will be used to authenticate the client | | `installationID` *int64* | installationID specifies the Github APP installation that will be used to authenticate the client | | `organization` *string* | organization will be used to fetch secrets from the Github organization | | `repository` *string* | *...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.11550290137529373, -0.009852009825408459, -0.028241831809282303, 0.011121504008769989, -0.021187130361795425, -0.08551032096147537, -0.024502549320459366, -0.0028532722499221563, 0.06965769827365875, -0.007333911489695311, 0.011978307738900185, -0.0027342308312654495, 0.12643344700336456,...
0.02289
`azureAuthCredentials` *[AzureAuthCredentials](#external-secrets.io/v1.AzureAuthCredentials)* | *(Optional)* | | `gcpIdTokenAuthCredentials` *[GcpIDTokenAuthCredentials](#external-secrets.io/v1.GcpIDTokenAuthCredentials)* | *(Optional)* | | `gcpIamAuthCredentials` *[GcpIamAuthCredentials](#external-secrets.io/v1.GcpIam...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.10150701552629471, -0.012731960043311119, 0.023073453456163406, -0.021701563149690628, -0.007415929809212685, 0.008264753036201, 0.06200966611504555, -0.04363057762384415, 0.03466000035405159, 0.045122891664505005, 0.03947341442108154, -0.07018622010946274, 0.05392450466752052, 0.013754...
0.000434
| `caProvider` *[CAProvider](#external-secrets.io/v1.CAProvider)* | *(Optional)* see: <https://external-secrets.io/v0.4.1/spec/#external-secrets.io/v1alpha1.CAProvider> | ### LdapAuthCredentials (*Appears on:* [InfisicalAuth](#external-secrets.io/v1.InfisicalAuth)) LdapAuthCredentials represents the credentials for LDA...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.08244950324296951, -0.04445144161581993, -0.055748503655195236, -0.02181784063577652, 0.04488792270421982, -0.009026284329593182, 0.05103687942028046, 0.060314957052469254, -0.023306410759687424, -0.00818482507020235, 0.0634874552488327, -0.061470698565244675, 0.008082368411123753, -0.0...
0.043021
just return without doing anything. ### OciAuthCredentials (*Appears on:* [InfisicalAuth](#external-secrets.io/v1.InfisicalAuth)) OciAuthCredentials represents the credentials for OCI authentication. | Field | Description | | --- | --- | | `identityId` *[External Secrets meta/v1.SecretKeySelector](https://pkg.go.dev/gi...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.08917035907506943, 0.03145225718617439, -0.06095114350318909, 0.014580508694052696, 0.026774641126394272, -0.04287969693541527, 0.022589994594454765, 0.02126510813832283, 0.04651927202939987, -0.07121589034795761, 0.06492885202169418, -0.03274506330490112, -0.00038898768252693117, 0.012...
-0.002176
caching for read operations (GetSecret, GetSecretMap). When enabled, secrets are cached with the specified TTL. Write operations (PushSecret, DeleteSecret) automatically invalidate relevant cache entries. If omitted, caching is disabled (default). cache: {} is a valid option to set. | ### OracleAuth (*Appears on:* [Ora...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.061157044023275375, 0.0077582127414643764, -0.06925482302904129, -0.03611324727535248, -0.037085339426994324, -0.07931419461965561, 0.05533459782600403, 0.04243997484445572, 0.04144241288304329, -0.022360598668456078, 0.03221096470952034, -0.011613672599196434, 0.017675574868917465, -0....
0.015657
Password Depot instance URL. | | `database` *string* | Database to use as source | | `auth` *[PasswordDepotAuth](#external-secrets.io/v1.PasswordDepotAuth)* | Auth configures how secret-manager authenticates with a Password Depot instance. | ### PasswordDepotSecretRef (*Appears on:* [PasswordDepotAuth](#external-secret...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.13018546998500824, -0.027370082214474678, -0.08557840436697006, 0.006201499607414007, 0.0038125694263726473, 0.06532331556081772, 0.0008612095261923969, 0.050795868039131165, -0.0025704549625515938, -0.011197163723409176, 0.005300457589328289, -0.03566761314868927, 0.08709829300642014, ...
-0.009985
references a key in a secret that will be used as value. | ### SecretReference (*Appears on:* [AwsCredentialsConfig](#external-secrets.io/v1.AwsCredentialsConfig)) SecretReference holds the details of a secret. | Field | Description | | --- | --- | | `name` *string* | name of the secret. | | `namespace` *string* | name...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.15153338015079498, 0.03678135946393013, -0.08687468618154526, 0.03178847208619118, 0.03841210901737213, 0.013660754077136517, 0.08014095574617386, 0.039523787796497345, 0.07506238669157028, 0.020975720137357712, 0.009598223492503166, -0.05127764865756035, 0.0571366623044014, -0.00250140...
0.087411
configuration. | Field | Description | | --- | --- | | `aws` *[AWSProvider](#external-secrets.io/v1.AWSProvider)* | *(Optional)* AWS configures this store to sync secrets using AWS Secret Manager provider | | `azurekv` *[AzureKVProvider](#external-secrets.io/v1.AzureKVProvider)* | *(Optional)* AzureKV configures this s...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.09592956304550171, -0.0003299076633993536, -0.07657922804355621, 0.046692490577697754, -0.005305047146975994, 0.027234097942709923, -0.012566029094159603, -0.05938824266195297, 0.07329096645116806, 0.0836612805724144, 0.0651453286409378, -0.003633210202679038, 0.08133042603731155, -0.05...
-0.052665
`device42` *[Device42Provider](#external-secrets.io/v1.Device42Provider)* | *(Optional)* Device42 configures this store to sync secrets using the Device42 provider | | `dvls` *[DVLSProvider](#external-secrets.io/v1.DVLSProvider)* | *(Optional)* DVLS configures this store to sync secrets using Devolutions Server provide...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.11377424746751785, -0.015984365716576576, -0.026409436017274857, -0.02716006711125374, 0.049836013466119766, -0.036940403282642365, -0.026305202394723892, -0.011556924320757389, 0.015624606050550938, 0.037870630621910095, 0.07733145356178284, -0.003724905429407954, 0.07462359219789505, ...
-0.012466
apply to PushSecret (and only when deletionPolicy is set to Delete). | Field | Description | | --- | --- | | `forceDeleteWithoutRecovery` *bool* | *(Optional)* Specifies whether to delete the secret without any recovery window. You can’t use both this parameter and RecoveryWindowInDays in the same call. If you don’t us...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.062299005687236786, 0.00027386084548197687, -0.006328228395432234, 0.062179092317819595, 0.03774956613779068, 0.03036760538816452, -0.03585956618189812, -0.05699572712182999, 0.09742337465286255, 0.04636938124895096, 0.03821289539337158, -0.01696045510470867, 0.017222829163074493, -0.02...
-0.040482
set), this supports nested paths like “spec.database.config” or “data”. | | `literal` *string* | *(Optional)* | ### TemplateMergePolicy (`string` alias) (*Appears on:* [ExternalSecretTemplate](#external-secrets.io/v1.ExternalSecretTemplate)) TemplateMergePolicy defines how the rendered template should be merged with th...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.061813950538635254, 0.00870407186448574, -0.03109966404736042, 0.05093841627240181, 0.044707633554935455, -0.0033767877612262964, 0.03127240389585495, 0.0862681120634079, -0.03838454931974411, -0.020409196615219116, 0.009518510662019253, -0.05430044233798981, 0.05976872146129608, -0.025...
0.044964
of `tokenSecretRef`, `appRole`, `kubernetes`, `ldap`, `userPass`, `jwt`, `cert`, `iam` or `gcp` can be specified. A namespace to authenticate against can optionally be specified. | Field | Description | | --- | --- | | `namespace` *string* | *(Optional)* Name of the vault namespace to authenticate to. This can be diffe...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.020410718396306038, -0.03681649640202522, -0.03133835271000862, -0.031552914530038834, -0.039469797164201736, -0.041876327246427536, 0.001680476008914411, 0.005049560219049454, 0.1052706316113472, -0.013994788751006126, -0.0064537362195551395, -0.068311907351017, 0.07692547142505646, 0....
0.059926
*(Optional)* SecretRef to a key in a Secret resource containing client private key to authenticate with Vault using the Cert authentication method | ### VaultCheckAndSet (*Appears on:* [VaultProvider](#external-secrets.io/v1.VaultProvider)) VaultCheckAndSet defines the Check-And-Set (CAS) settings for Vault KV v2 PushS...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.05539953336119652, 0.0455639511346817, -0.04880789667367935, 0.022244330495595932, -0.00678495317697525, -0.06154217943549156, -0.025766611099243164, 0.022314826026558876, 0.08320499211549759, -0.029698114842176437, 0.045967284590005875, -0.03655128553509712, 0.07527517527341843, 0.0382...
-0.050865
*[VaultAwsJWTAuth](#external-secrets.io/v1.VaultAwsJWTAuth)* | *(Optional)* Specify a service account with IRSA enabled | ### VaultJwtAuth (*Appears on:* [VaultAuth](#external-secrets.io/v1.VaultAuth)) VaultJwtAuth authenticates with Vault using the JWT/OIDC authentication method, with the role name and a token stored ...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.06867007911205292, 0.021500885486602783, -0.03514629229903221, -0.02902338281273842, -0.020656049251556396, -0.037684015929698944, -0.00602197227999568, 0.028267715126276016, 0.07661812752485275, -0.05609208345413208, -0.01701301336288452, -0.020283181220293045, 0.016573768109083176, -0...
0.061917
LDAP Vault authentication method | | `secretRef` *[External Secrets meta/v1.SecretKeySelector](https://pkg.go.dev/github.com/external-secrets/external-secrets/apis/meta/v1#SecretKeySelector)* | *(Optional)* SecretRef to a key in a Secret resource containing password for the LDAP user used to authenticate with Vault usi...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.03832278400659561, 0.0036248706746846437, -0.11764112859964371, -0.03596799448132515, -0.006004685536026955, -0.013127879239618778, -0.01688866689801216, 0.04911414906382561, 0.0001978963118745014, -0.04879867285490036, 0.07715348154306412, -0.018712786957621574, 0.03227338567376137, -0...
-0.066281
| ### VolcengineAuth (*Appears on:* [VolcengineProvider](#external-secrets.io/v1.VolcengineProvider)) VolcengineAuth defines the authentication method for the Volcengine provider. Only one of the fields should be set. | Field | Description | | --- | --- | | `secretRef` *[VolcengineAuthSecretRef](#external-secrets.io/v1...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.1431988775730133, 0.014834515750408173, -0.08901795744895935, -0.019247138872742653, -0.0183025561273098, -0.006835650652647018, 0.021182119846343994, 0.04518110677599907, -0.004314227029681206, -0.016421722248196602, 0.02766125649213791, -0.05195044353604317, 0.004032989032566547, 0.01...
0.039278
from the webhook response. | Field | Description | | --- | --- | | `jsonPath` *string* | *(Optional)* Json path of return value | ### WebhookSecret (*Appears on:* [WebhookProvider](#external-secrets.io/v1.WebhookProvider)) WebhookSecret defines a secret that will be passed to the webhook request. | Field | Description ...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.15829278528690338, 0.09492944926023483, -0.08011692017316818, 0.024155456572771072, 0.03536712005734444, -0.04054562747478485, -0.0066649722866714, 0.003581382567062974, 0.045019540935754776, -0.019962159916758537, 0.03096632845699787, -0.1048813983798027, 0.019025925546884537, -0.03855...
0.095771
by name | ### ClusterPushSecretNamespaceFailure (*Appears on:* [ClusterPushSecretStatus](#external-secrets.io/v1alpha1.ClusterPushSecretStatus)) ClusterPushSecretNamespaceFailure represents a failed namespace deployment and it’s reason. | Field | Description | | --- | --- | | `namespace` *string* | Namespace is the nam...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.05731118842959404, -0.12279193848371506, 0.007004527375102043, 0.019372791051864624, -0.0022971697617322206, -0.020744197070598602, 0.008196576498448849, 0.0021776931826025248, -0.008216659538447857, 0.01862514019012451, 0.06294482946395874, -0.14148667454719543, 0.026317918673157692, 0...
0.105011
The structure of metadata is provider specific, please look it up in the provider documentation. | | `conversionStrategy` *[PushSecretConversionStrategy](#external-secrets.io/v1alpha1.PushSecretConversionStrategy)* | *(Optional)* Used to define a conversion Strategy for the secret keys | ### PushSecretDeletionPolicy (`...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.06928125768899918, -0.036075323820114136, -0.074940524995327, -0.00007189880852820352, 0.0344742089509964, -0.042050108313560486, 0.016481909900903702, -0.01380284782499075, 0.040294814854860306, -0.010153776034712791, 0.052911099046468735, -0.03960559889674187, 0.07817978411912918, -0....
-0.000503
| *(Optional)* | ### PushSecretStatusCondition (*Appears on:* [ClusterPushSecretStatus](#external-secrets.io/v1alpha1.ClusterPushSecretStatus), [PushSecretStatus](#external-secrets.io/v1alpha1.PushSecretStatus)) PushSecretStatusCondition indicates the status of the PushSecret. | Field | Description | | --- | --- | | `t...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.03501099720597267, -0.03949348255991936, 0.014237136580049992, 0.009456481784582138, 0.01993998885154724, -0.006421377416700125, -0.007034830283373594, 0.021452615037560463, 0.041399721056222916, 0.02741902694106102, 0.02330174297094345, -0.10582058131694794, -0.013201279565691948, -0.0...
0.19221
role session tags | | `secretsManager` *[SecretsManager](#external-secrets.io/v1beta1.SecretsManager)* | *(Optional)* SecretsManager defines how the provider behaves when interacting with AWS SecretsManager | | `transitiveTagKeys` *[]\*string* | *(Optional)* AWS STS assume role transitive session tags. Required when mu...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.08040222525596619, 0.008770388551056385, -0.06312895566225052, 0.0021188147366046906, 0.026982568204402924, -0.010495947673916817, 0.08847242593765259, -0.009287206456065178, 0.021718287840485573, -0.007823748514056206, 0.028791168704628944, -0.05727391690015793, 0.09734105318784714, -0...
0.093246
Secrets meta/v1.SecretKeySelector](https://pkg.go.dev/github.com/external-secrets/external-secrets/apis/meta/v1#SecretKeySelector)* | The AccessKeyID is used for authentication | | `accessKeySecretSecretRef` *[External Secrets meta/v1.SecretKeySelector](https://pkg.go.dev/github.com/external-secrets/external-secrets/ap...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.11498851329088211, 0.0018159719184041023, -0.12065906077623367, 0.017147691920399666, -0.012217937968671322, 0.028785405680537224, 0.03179822862148285, 0.023339329287409782, 0.0528256818652153, -0.02767024375498295, 0.07072237133979797, -0.0007889684056863189, 0.012719100341200829, -0.0...
0.038465
| `environmentType` *[AzureEnvironmentType](#external-secrets.io/v1beta1.AzureEnvironmentType)* | EnvironmentType specifies the Azure cloud environment endpoints to use for connecting and authenticating with Azure. By default it points to the public cloud AAD endpoint. The following endpoints are available, also see he...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.042431239038705826, 0.014804212376475334, -0.035560332238674164, -0.0330539271235466, -0.005315903574228287, 0.047236304730176926, 0.033830124884843826, -0.07593415677547455, 0.07972905039787292, 0.08099061995744705, 0.045569587498903275, -0.06726628541946411, 0.008510718122124672, 0.06...
0.010533
server sdk. The sdk MUST run with HTTPS to make sure no MITM attack can be performed. | | `caProvider` *[CAProvider](#external-secrets.io/v1beta1.CAProvider)* | *(Optional)* see: <https://external-secrets.io/latest/spec/#external-secrets.io/v1alpha1.CAProvider> | | `organizationID` *string* | OrganizationID determines ...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.06605608016252518, -0.023459892719984055, -0.015106253325939178, -0.008182530291378498, 0.049287039786577225, -0.013728165067732334, 0.004645094741135836, 0.0019605690613389015, 0.03149978071451187, 0.016242215409874916, 0.038800571113824844, -0.0715552568435669, 0.04369095340371132, 0....
0.06323
include your org in the url and terminate the url with a “/” | ### CloudruSMProvider (*Appears on:* [SecretStoreProvider](#external-secrets.io/v1beta1.SecretStoreProvider)) CloudruSMProvider configures a store to sync secrets using the Cloud.ru Secret Manager provider. | Field | Description | | --- | --- | | `auth` *[C...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.05333824083209038, 0.0006223897216841578, -0.03855146840214729, 0.05571991950273514, 0.005935594439506531, 0.041259851306676865, -0.045730117708444595, -0.05483267083764076, 0.05532904341816902, 0.049347784370183945, -0.01676025427877903, -0.06204240769147873, 0.06529794633388519, -0.04...
0.041933
the ClusterExternalSecret | | `failedNamespaces` *[[]ClusterExternalSecretNamespaceFailure](#external-secrets.io/v1beta1.ClusterExternalSecretNamespaceFailure)* | *(Optional)* Failed namespaces are the namespaces that failed to apply an ExternalSecret | | `provisionedNamespaces` *[]string* | *(Optional)* ProvisionedNam...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.08815054595470428, -0.05650358274579048, -0.013754424639046192, 0.04062418267130852, 0.06974288076162338, -0.013651635497808456, 0.04319804906845093, -0.0338803268969059, -0.013013084419071674, -0.010210487060248852, 0.06640558689832687, -0.10884552448987961, 0.04986327141523361, -0.016...
0.192143
to authenticate with Conjur using the JWT authentication method. | | `serviceAccountRef` *[External Secrets meta/v1.ServiceAccountSelector](https://pkg.go.dev/github.com/external-secrets/external-secrets/apis/meta/v1#ServiceAccountSelector)* | *(Optional)* Optional ServiceAccountRef specifies the Kubernetes service acc...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.12189770489931107, -0.0003342691925354302, 0.01477139350026846, -0.06736203283071518, -0.07668640464544296, -0.023091327399015427, 0.05643561854958534, 0.057543009519577026, 0.07591123133897781, 0.009839454665780067, 0.0005078713875263929, -0.06519278883934021, 0.02234850823879242, 0.00...
0.106577
| --- | | `auth` *[DopplerAuth](#external-secrets.io/v1beta1.DopplerAuth)* | Auth configures how the Operator authenticates with the Doppler API | | `project` *string* | *(Optional)* Doppler project (required if not using a Service Token) | | `config` *string* | *(Optional)* Doppler config (required if not using a Serv...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.103443942964077, 0.001206236076541245, -0.04917990043759346, -0.01562145259231329, 0.016566414386034012, -0.07784774899482727, 0.029549209401011467, 0.071695975959301, 0.0838075578212738, -0.011722822673618793, -0.015835603699088097, -0.05753632262349129, 0.042429592460393906, -0.005922...
0.110349
*string* | The key in the Kubernetes Secret to store the value. | | `remoteRef` *[ExternalSecretDataRemoteRef](#external-secrets.io/v1beta1.ExternalSecretDataRemoteRef)* | RemoteRef points to the remote secret and defines which secret (version/property/..) to fetch. | | `sourceRef` *[StoreSourceRef](#external-secrets.i...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.05068862810730934, 0.026350917294621468, 0.006138768512755632, 0.005907638464123011, 0.032633695751428604, 0.030833544209599495, 0.06400985270738602, 0.02029181271791458, 0.10920991748571396, 0.03237086161971092, -0.001293247565627098, -0.09942788630723953, -0.0040817297995090485, -0.04...
0.03264
SecretSyncedError status. | ### ExternalSecretFind (*Appears on:* [ExternalSecretDataFromRemoteRef](#external-secrets.io/v1beta1.ExternalSecretDataFromRemoteRef)) ExternalSecretFind defines criteria for finding secrets in the provider. | Field | Description | | --- | --- | | `path` *string* | *(Optional)* A root path t...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.13006335496902466, -0.007641240954399109, -0.07442717999219894, 0.009410196915268898, 0.06165093928575516, -0.06697012484073639, -0.0004472261352930218, 0.027784887701272964, 1.9018808927739883e-7, -0.018398163840174675, 0.04307343065738678, -0.07176925987005234, 0.04198787733912468, -0...
0.071013
time before the values are read again from the SecretStore provider, specified as Golang Duration strings. Valid time units are “ns”, “us” (or “µs”), “ms”, “s”, “m”, “h” Example values: “1h0m0s”, “2h30m0s”, “10m0s” May be set to “0s” to fetch and create it once. Defaults to 1h0m0s. | | `data` *[[]ExternalSecretData](#e...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.005924491211771965, 0.039853259921073914, 0.011459377594292164, -0.001910046092234552, -0.04739769920706749, 0.02326118014752865, 0.025902487337589264, 0.020961297675967216, 0.0997307077050209, -0.016219519078731537, 0.07022535055875778, -0.09023614227771759, -0.006345140747725964, -0.0...
0.048715
*string* | | | `version` *string* | | ### FindName (*Appears on:* [ExternalSecretFind](#external-secrets.io/v1beta1.ExternalSecretFind)) FindName defines name matching criteria for finding secrets. | Field | Description | | --- | --- | | `regexp` *string* | *(Optional)* Finds secrets base | ### FortanixProvider (*Appea...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.11966949701309204, -0.03140489384531975, -0.048776403069496155, 0.041872717440128326, 0.026698431000113487, 0.00023920599778648466, -0.019853103905916214, 0.013406259939074516, 0.0029988656751811504, -0.045866306871175766, 0.01500557642430067, -0.043147701770067215, 0.028286464512348175, ...
0.085587
`uploadURL` *string* | *(Optional)* Upload URL for enterprise instances. Default to URL. | | `auth` *[GithubAppAuth](#external-secrets.io/v1beta1.GithubAppAuth)* | auth configures how secret-manager authenticates with a Github instance. | | `appID` *int64* | appID specifies the Github APP that will be used to authentic...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.10480834543704987, -0.03070446290075779, -0.06689460575580597, 0.0007851150585338473, 0.011865583248436451, -0.07984837144613266, -0.02260817028582096, 0.011956140398979187, 0.009953542612493038, 0.019616538658738136, 0.03587795048952103, -0.012126856483519077, 0.10679851472377777, -0.0...
0.11212
| ### InfisicalAuth (*Appears on:* [InfisicalProvider](#external-secrets.io/v1beta1.InfisicalProvider)) InfisicalAuth defines the authentication methods for the Infisical provider. | Field | Description | | --- | --- | | `universalAuthCredentials` *[UniversalAuthCredentials](#external-secrets.io/v1beta1.UniversalAuthCr...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.1389390230178833, 0.020056748762726784, -0.049674008041620255, -0.004028437193483114, 0.022401580587029457, -0.0332244411110878, 0.03472796082496643, -0.015539703890681267, -0.0013449408579617739, -0.012060956098139286, 0.0543864481151104, -0.012993857264518738, 0.04834076017141342, 0.0...
0.077122
onboardbase API Key credentials. | Field | Description | | --- | --- | | `apiKeyRef` *[External Secrets meta/v1.SecretKeySelector](https://pkg.go.dev/github.com/external-secrets/external-secrets/apis/meta/v1#SecretKeySelector)* | OnboardbaseAPIKey is the APIKey generated by an admin account. It is used to recognize and...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.06614509969949722, -0.025682389736175537, -0.08889452368021011, 0.009600304998457432, 0.015535630285739899, 0.0243170615285635, 0.024990517646074295, 0.01759454235434532, 0.02538885548710823, 0.03920543193817139, 0.015844769775867462, -0.016855793073773384, 0.048370253294706345, -0.0210...
0.074018
must be specified if using workload identity. | | `auth` *[OracleAuth](#external-secrets.io/v1beta1.OracleAuth)* | *(Optional)* Auth configures how secret-manager authenticates with the Oracle Vault. If empty, use the instance principal, otherwise the user credentials specified in Auth. | | `serviceAccountRef` *[Extern...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.10120241343975067, -0.020949650555849075, -0.09898217022418976, -0.05436141788959503, -0.006094431504607201, -0.026316700503230095, 0.07823915034532547, 0.07151880115270615, 0.019342314451932907, -0.013150307349860668, 0.026384573429822922, -0.06605781614780426, 0.03241308778524399, 0.0...
-0.002446
create a new organization, visit <https://app.pulumi.com/> and click “New Organization”. | | `project` *string* | Project is the name of the Pulumi ESC project the environment belongs to. | | `environment` *string* | Environment are YAML documents composed of static key-value pairs, programmatic expressions, dynamicall...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.027223005890846252, -0.08170301467180252, -0.09076766669750214, -0.013235950842499733, 0.0036284648813307285, -0.03993291035294533, 0.02088105119764805, -0.0408654548227787, 0.044485531747341156, -0.0026658042334020138, 0.05095024034380913, -0.13363471627235413, 0.03931457921862602, -0....
0.070656
be set | | `retrySettings` *[SecretStoreRetrySettings](#external-secrets.io/v1beta1.SecretStoreRetrySettings)* | *(Optional)* Used to configure HTTP retries on failures. | | `refreshInterval` *int* | *(Optional)* Used to configure store refresh interval in seconds. Empty or 0 will default to the controller config. | | ...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.045915670692920685, -0.030057989060878754, -0.06410352885723114, 0.08070313185453415, 0.005616864189505577, 0.00508312089368701, -0.03195714205503464, 0.0015779008390381932, -0.028894910588860512, 0.042934734374284744, 0.05538533255457878, -0.04663464054465294, 0.04473401978611946, -0.0...
0.085367
Previder provider | | `onboardbase` *[OnboardbaseProvider](#external-secrets.io/v1beta1.OnboardbaseProvider)* | *(Optional)* Onboardbase configures this store to sync secrets using the Onboardbase provider | | `keepersecurity` *[KeeperSecurityProvider](#external-secrets.io/v1beta1.KeeperSecurityProvider)* | *(Optional)...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.10526450723409653, -0.019863827154040337, -0.07595019042491913, -0.052217982709407806, 0.022180607542395592, -0.0031955346930772066, 0.028148356825113297, 0.0065061175264418125, 0.011541618965566158, 0.033684443682432175, 0.05551264062523842, -0.047031208872795105, 0.04079664871096611, ...
0.074641
with AWS SecretsManager. Some of these settings are only applicable to controlling how secrets are deleted, and hence only apply to PushSecret (and only when deletionPolicy is set to Delete). | Field | Description | | --- | --- | | `forceDeleteWithoutRecovery` *bool* | *(Optional)* Specifies whether to delete the secre...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.057931702584028244, -0.0074916924349963665, 0.00031801516888663173, 0.08656254410743713, 0.03303457796573639, 0.0354510098695755, -0.016440074890851974, -0.06265129894018173, 0.1107359230518341, 0.03144421800971031, 0.023495759814977646, -0.0038373987190425396, 0.019114162772893906, -0....
-0.046992
| Value | Description | | --- | --- | | "Merge" | MergePolicyMerge merges the template content with existing values. | | "Replace" | MergePolicyReplace replaces the entire template content during merge operations. | ### TemplateRef (*Appears on:* [TemplateFrom](#external-secrets.io/v1beta1.TemplateFrom)) TemplateRef de...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.08864828944206238, 0.057013530284166336, -0.008723669685423374, 0.04519046097993851, 0.06872747093439102, 0.037805549800395966, 0.032586127519607544, 0.037159666419029236, -0.006146782077848911, 0.006558030378073454, 0.026901915669441223, -0.046326857060194016, 0.038118038326501846, -0....
0.073723
with Vault. The `key` field must be specified and denotes which entry within the Secret resource is used as the app role secret. | ### VaultAuth (*Appears on:* [VaultProvider](#external-secrets.io/v1beta1.VaultProvider)) VaultAuth is the configuration used to authenticate with a Vault server. Only one of `tokenSecretRe...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.0027707149274647236, -0.002688803942874074, -0.04750118404626846, -0.04342922195792198, -0.043352141976356506, -0.04200128838419914, 0.005173734854906797, 0.027402902022004128, 0.08834914118051529, -0.014438416808843613, -0.02409655787050724, -0.06303068995475769, 0.09313283115625381, 0...
0.01708
Secrets meta/v1.SecretKeySelector](https://pkg.go.dev/github.com/external-secrets/external-secrets/apis/meta/v1#SecretKeySelector)* | *(Optional)* SecretRef to a key in a Secret resource containing client private key to authenticate with Vault using the Cert authentication method | ### VaultClientTLS (*Appears on:* [Va...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.07609812915325165, 0.05543812736868858, -0.053763341158628464, 0.006178496405482292, 0.02798907458782196, -0.04668683931231499, 0.019959649071097374, 0.029261397197842598, 0.10662485659122467, -0.04926735535264015, 0.033910416066646576, -0.007006686646491289, 0.05939353629946709, 0.0602...
-0.011987
| *(Optional)* Optional service account field containing the name of a kubernetes ServiceAccount. If the service account is specified, the service account secret token JWT will be used for authenticating with Vault. If the service account selector is not supplied, the secretRef will be used instead. | | `secretRef` *[E...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.06843015551567078, 0.011303607374429703, -0.0010304837487637997, -0.03953108191490173, -0.006872282829135656, 0.024504419416189194, 0.03831728547811508, 0.0015141295734792948, 0.11731956154108047, -0.0010475621093064547, 0.01601528562605381, -0.06479571759700775, 0.048413775861263275, -...
0.076309
plain HTTP protocol connection. If not set the system root certificates are used to validate the TLS connection. | | `tls` *[VaultClientTLS](#external-secrets.io/v1beta1.VaultClientTLS)* | *(Optional)* The configuration used for client side related TLS communication, when the Vault server requires mutual authentication...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.0002954718947876245, 0.04352777078747749, -0.06266414374113083, -0.018078763037919998, -0.022528642788529396, -0.07595109939575195, -0.07649786025285721, -0.012639750726521015, 0.10666114836931229, -0.0312526561319828, 0.017618393525481224, 0.022220635786652565, 0.08882485330104828, 0.0...
-0.056691
*(Optional)* PEM encoded CA bundle used to validate webhook server certificate. Only used if the Server URL is using HTTPS protocol. This parameter is ignored for plain HTTP protocol connection. If not set the system root certificates are used to validate the TLS connection. | | `caProvider` *[WebhookCAProvider](#exter...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.11399620771408081, 0.14259406924247742, -0.06251142174005508, -0.009576953016221523, 0.01602843403816223, -0.08508121222257614, -0.026436002925038338, -0.016387566924095154, 0.04322589188814163, -0.015846705064177513, 0.03722856566309929, -0.14790482819080353, 0.04984867200255394, 0.009...
0.025825
`tenantId` *string* | TenantID configures the Azure Tenant to send requests to. Required for ServicePrincipal auth type. | | `registry` *string* | the domain name of the ACR registry e.g. foobarexample.azurecr.io | | `scope` *string* | *(Optional)* Define the scope for the access token, e.g. pull/push access for a repo...
https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md
main
external-secrets
[ -0.053964413702487946, -0.003744155168533325, -0.03218415006995201, 0.02794293686747551, -0.04420674592256546, -0.006609160453081131, 0.0030221259221434593, -0.03961994871497154, 0.06641438603401184, 0.08362467586994171, 0.009731052443385124, -0.05869535356760025, 0.04880537837743759, 0.02...
0.000287