secrets.v1beta1.vaultAuth
"VaultAuth is the Schema for the vaultauths API"
Index
fn new(name)
obj metadata
fn withAnnotations(annotations)
fn withAnnotationsMixin(annotations)
fn withClusterName(clusterName)
fn withCreationTimestamp(creationTimestamp)
fn withDeletionGracePeriodSeconds(deletionGracePeriodSeconds)
fn withDeletionTimestamp(deletionTimestamp)
fn withFinalizers(finalizers)
fn withFinalizersMixin(finalizers)
fn withGenerateName(generateName)
fn withGeneration(generation)
fn withLabels(labels)
fn withLabelsMixin(labels)
fn withName(name)
fn withNamespace(namespace)
fn withOwnerReferences(ownerReferences)
fn withOwnerReferencesMixin(ownerReferences)
fn withResourceVersion(resourceVersion)
fn withSelfLink(selfLink)
fn withUid(uid)
obj spec
fn withAllowedNamespaces(allowedNamespaces)
fn withAllowedNamespacesMixin(allowedNamespaces)
fn withHeaders(headers)
fn withHeadersMixin(headers)
fn withMethod(method)
fn withMount(mount)
fn withNamespace(namespace)
fn withParams(params)
fn withParamsMixin(params)
fn withVaultConnectionRef(vaultConnectionRef)
obj spec.appRole
obj spec.aws
obj spec.gcp
obj spec.jwt
obj spec.kubernetes
obj spec.storageEncryption
obj spec.vaultAuthGlobalRef
Fields
fn new
new(name)
new returns an instance of VaultAuth
obj metadata
"ObjectMeta is metadata that all persisted resources must have, which includes all objects users must create."
fn metadata.withAnnotations
withAnnotations(annotations)
"Annotations is an unstructured key value map stored with a resource that may be set by external tools to store and retrieve arbitrary metadata. They are not queryable and should be preserved when modifying objects. More info: http://kubernetes.io/docs/user-guide/annotations"
fn metadata.withAnnotationsMixin
withAnnotationsMixin(annotations)
"Annotations is an unstructured key value map stored with a resource that may be set by external tools to store and retrieve arbitrary metadata. They are not queryable and should be preserved when modifying objects. More info: http://kubernetes.io/docs/user-guide/annotations"
Note: This function appends passed data to existing values
fn metadata.withClusterName
withClusterName(clusterName)
"The name of the cluster which the object belongs to. This is used to distinguish resources with same name and namespace in different clusters. This field is not set anywhere right now and apiserver is going to ignore it if set in create or update request."
fn metadata.withCreationTimestamp
withCreationTimestamp(creationTimestamp)
"Time is a wrapper around time.Time which supports correct marshaling to YAML and JSON. Wrappers are provided for many of the factory methods that the time package offers."
fn metadata.withDeletionGracePeriodSeconds
withDeletionGracePeriodSeconds(deletionGracePeriodSeconds)
"Number of seconds allowed for this object to gracefully terminate before it will be removed from the system. Only set when deletionTimestamp is also set. May only be shortened. Read-only."
fn metadata.withDeletionTimestamp
withDeletionTimestamp(deletionTimestamp)
"Time is a wrapper around time.Time which supports correct marshaling to YAML and JSON. Wrappers are provided for many of the factory methods that the time package offers."
fn metadata.withFinalizers
withFinalizers(finalizers)
"Must be empty before the object is deleted from the registry. Each entry is an identifier for the responsible component that will remove the entry from the list. If the deletionTimestamp of the object is non-nil, entries in this list can only be removed. Finalizers may be processed and removed in any order. Order is NOT enforced because it introduces significant risk of stuck finalizers. finalizers is a shared field, any actor with permission can reorder it. If the finalizer list is processed in order, then this can lead to a situation in which the component responsible for the first finalizer in the list is waiting for a signal (field value, external system, or other) produced by a component responsible for a finalizer later in the list, resulting in a deadlock. Without enforced ordering finalizers are free to order amongst themselves and are not vulnerable to ordering changes in the list."
fn metadata.withFinalizersMixin
withFinalizersMixin(finalizers)
"Must be empty before the object is deleted from the registry. Each entry is an identifier for the responsible component that will remove the entry from the list. If the deletionTimestamp of the object is non-nil, entries in this list can only be removed. Finalizers may be processed and removed in any order. Order is NOT enforced because it introduces significant risk of stuck finalizers. finalizers is a shared field, any actor with permission can reorder it. If the finalizer list is processed in order, then this can lead to a situation in which the component responsible for the first finalizer in the list is waiting for a signal (field value, external system, or other) produced by a component responsible for a finalizer later in the list, resulting in a deadlock. Without enforced ordering finalizers are free to order amongst themselves and are not vulnerable to ordering changes in the list."
Note: This function appends passed data to existing values
fn metadata.withGenerateName
withGenerateName(generateName)
"GenerateName is an optional prefix, used by the server, to generate a unique name ONLY IF the Name field has not been provided. If this field is used, the name returned to the client will be different than the name passed. This value will also be combined with a unique suffix. The provided value has the same validation rules as the Name field, and may be truncated by the length of the suffix required to make the value unique on the server.\n\nIf this field is specified and the generated name exists, the server will NOT return a 409 - instead, it will either return 201 Created or 500 with Reason ServerTimeout indicating a unique name could not be found in the time allotted, and the client should retry (optionally after the time indicated in the Retry-After header).\n\nApplied only if Name is not specified. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#idempotency"
fn metadata.withGeneration
withGeneration(generation)
"A sequence number representing a specific generation of the desired state. Populated by the system. Read-only."
fn metadata.withLabels
withLabels(labels)
"Map of string keys and values that can be used to organize and categorize (scope and select) objects. May match selectors of replication controllers and services. More info: http://kubernetes.io/docs/user-guide/labels"
fn metadata.withLabelsMixin
withLabelsMixin(labels)
"Map of string keys and values that can be used to organize and categorize (scope and select) objects. May match selectors of replication controllers and services. More info: http://kubernetes.io/docs/user-guide/labels"
Note: This function appends passed data to existing values
fn metadata.withName
withName(name)
"Name must be unique within a namespace. Is required when creating resources, although some resources may allow a client to request the generation of an appropriate name automatically. Name is primarily intended for creation idempotence and configuration definition. Cannot be updated. More info: http://kubernetes.io/docs/user-guide/identifiers#names"
fn metadata.withNamespace
withNamespace(namespace)
"Namespace defines the space within which each name must be unique. An empty namespace is equivalent to the \"default\" namespace, but \"default\" is the canonical representation. Not all objects are required to be scoped to a namespace - the value of this field for those objects will be empty.\n\nMust be a DNS_LABEL. Cannot be updated. More info: http://kubernetes.io/docs/user-guide/namespaces"
fn metadata.withOwnerReferences
withOwnerReferences(ownerReferences)
"List of objects depended by this object. If ALL objects in the list have been deleted, this object will be garbage collected. If this object is managed by a controller, then an entry in this list will point to this controller, with the controller field set to true. There cannot be more than one managing controller."
fn metadata.withOwnerReferencesMixin
withOwnerReferencesMixin(ownerReferences)
"List of objects depended by this object. If ALL objects in the list have been deleted, this object will be garbage collected. If this object is managed by a controller, then an entry in this list will point to this controller, with the controller field set to true. There cannot be more than one managing controller."
Note: This function appends passed data to existing values
fn metadata.withResourceVersion
withResourceVersion(resourceVersion)
"An opaque value that represents the internal version of this object that can be used by clients to determine when objects have changed. May be used for optimistic concurrency, change detection, and the watch operation on a resource or set of resources. Clients must treat these values as opaque and passed unmodified back to the server. They may only be valid for a particular resource or set of resources.\n\nPopulated by the system. Read-only. Value must be treated as opaque by clients and . More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency"
fn metadata.withSelfLink
withSelfLink(selfLink)
"SelfLink is a URL representing this object. Populated by the system. Read-only.\n\nDEPRECATED Kubernetes will stop propagating this field in 1.20 release and the field is planned to be removed in 1.21 release."
fn metadata.withUid
withUid(uid)
"UID is the unique in time and space value for this object. It is typically generated by the server on successful creation of a resource and is not allowed to change on PUT operations.\n\nPopulated by the system. Read-only. More info: http://kubernetes.io/docs/user-guide/identifiers#uids"
obj spec
"VaultAuthSpec defines the desired state of VaultAuth"
fn spec.withAllowedNamespaces
withAllowedNamespaces(allowedNamespaces)
"AllowedNamespaces Kubernetes Namespaces which are allow-listed for use with this AuthMethod.\nThis field allows administrators to customize which Kubernetes namespaces are authorized to\nuse with this AuthMethod. While Vault will still enforce its own rules, this has the added\nconfigurability of restricting which VaultAuthMethods can be used by which namespaces.\nAccepted values:\n[]{\"*\"} - wildcard, all namespaces.\n[]{\"a\", \"b\"} - list of namespaces.\nunset - disallow all namespaces except the Operator's the VaultAuthMethod's namespace, this\nis the default behavior."
fn spec.withAllowedNamespacesMixin
withAllowedNamespacesMixin(allowedNamespaces)
"AllowedNamespaces Kubernetes Namespaces which are allow-listed for use with this AuthMethod.\nThis field allows administrators to customize which Kubernetes namespaces are authorized to\nuse with this AuthMethod. While Vault will still enforce its own rules, this has the added\nconfigurability of restricting which VaultAuthMethods can be used by which namespaces.\nAccepted values:\n[]{\"*\"} - wildcard, all namespaces.\n[]{\"a\", \"b\"} - list of namespaces.\nunset - disallow all namespaces except the Operator's the VaultAuthMethod's namespace, this\nis the default behavior."
Note: This function appends passed data to existing values
fn spec.withHeaders
withHeaders(headers)
"Headers to be included in all Vault requests."
fn spec.withHeadersMixin
withHeadersMixin(headers)
"Headers to be included in all Vault requests."
Note: This function appends passed data to existing values
fn spec.withMethod
withMethod(method)
"Method to use when authenticating to Vault."
fn spec.withMount
withMount(mount)
"Mount to use when authenticating to auth method."
fn spec.withNamespace
withNamespace(namespace)
"Namespace to auth to in Vault"
fn spec.withParams
withParams(params)
"Params to use when authenticating to Vault"
fn spec.withParamsMixin
withParamsMixin(params)
"Params to use when authenticating to Vault"
Note: This function appends passed data to existing values
fn spec.withVaultConnectionRef
withVaultConnectionRef(vaultConnectionRef)
"VaultConnectionRef to the VaultConnection resource, can be prefixed with a namespace,\neg: namespaceA/vaultConnectionRefB
. If no namespace prefix is provided it will default to\nthe namespace of the VaultConnection CR. If no value is specified for VaultConnectionRef the\nOperator will default to the default
VaultConnection, configured in the operator's namespace."
obj spec.appRole
"AppRole specific auth configuration, requires that the Method be set to appRole
."
fn spec.appRole.withRoleId
withRoleId(roleId)
"RoleID of the AppRole Role to use for authenticating to Vault."
fn spec.appRole.withSecretRef
withSecretRef(secretRef)
"SecretRef is the name of a Kubernetes secret in the consumer's (VDS/VSS/PKI) namespace which\nprovides the AppRole Role's SecretID. The secret must have a key named id
which holds the\nAppRole Role's secretID."
obj spec.aws
"AWS specific auth configuration, requires that Method be set to aws
."
fn spec.aws.withHeaderValue
withHeaderValue(headerValue)
"The Vault header value to include in the STS signing request"
fn spec.aws.withIamEndpoint
withIamEndpoint(iamEndpoint)
"The IAM endpoint to use; if not set will use the default"
fn spec.aws.withIrsaServiceAccount
withIrsaServiceAccount(irsaServiceAccount)
"IRSAServiceAccount name to use with IAM Roles for Service Accounts\n(IRSA), and should be annotated with \"eks.amazonaws.com/role-arn\". This\nServiceAccount will be checked for other EKS annotations:\neks.amazonaws.com/audience and eks.amazonaws.com/token-expiration"
fn spec.aws.withRegion
withRegion(region)
"AWS Region to use for signing the authentication request"
fn spec.aws.withRole
withRole(role)
"Vault role to use for authenticating"
fn spec.aws.withSecretRef
withSecretRef(secretRef)
"SecretRef is the name of a Kubernetes Secret in the consumer's (VDS/VSS/PKI) namespace\nwhich holds credentials for AWS. Expected keys include access_key_id
, secret_access_key
,\nsession_token
"
fn spec.aws.withSessionName
withSessionName(sessionName)
"The role session name to use when creating a webidentity provider"
fn spec.aws.withStsEndpoint
withStsEndpoint(stsEndpoint)
"The STS endpoint to use; if not set will use the default"
obj spec.gcp
"GCP specific auth configuration, requires that Method be set to gcp
."
fn spec.gcp.withClusterName
withClusterName(clusterName)
"GKE cluster name. Defaults to the cluster-name returned from the operator\npod's local metadata server."
fn spec.gcp.withProjectID
withProjectID(projectID)
"GCP project ID. Defaults to the project-id returned from the operator\npod's local metadata server."
fn spec.gcp.withRegion
withRegion(region)
"GCP Region of the GKE cluster's identity provider. Defaults to the region\nreturned from the operator pod's local metadata server."
fn spec.gcp.withRole
withRole(role)
"Vault role to use for authenticating"
fn spec.gcp.withWorkloadIdentityServiceAccount
withWorkloadIdentityServiceAccount(workloadIdentityServiceAccount)
"WorkloadIdentityServiceAccount is the name of a Kubernetes service\naccount (in the same Kubernetes namespace as the Vault*Secret referencing\nthis resource) which has been configured for workload identity in GKE.\nShould be annotated with \"iam.gke.io/gcp-service-account\"."
obj spec.jwt
"JWT specific auth configuration, requires that the Method be set to jwt
."
fn spec.jwt.withAudiences
withAudiences(audiences)
"TokenAudiences to include in the ServiceAccount token."
fn spec.jwt.withAudiencesMixin
withAudiencesMixin(audiences)
"TokenAudiences to include in the ServiceAccount token."
Note: This function appends passed data to existing values
fn spec.jwt.withRole
withRole(role)
"Role to use for authenticating to Vault."
fn spec.jwt.withSecretRef
withSecretRef(secretRef)
"SecretRef is the name of a Kubernetes secret in the consumer's (VDS/VSS/PKI) namespace which\nprovides the JWT token to authenticate to Vault's JWT authentication backend. The secret must\nhave a key named jwt
which holds the JWT token."
fn spec.jwt.withServiceAccount
withServiceAccount(serviceAccount)
"ServiceAccount to use when creating a ServiceAccount token to authenticate to Vault's\nJWT authentication backend."
fn spec.jwt.withTokenExpirationSeconds
withTokenExpirationSeconds(tokenExpirationSeconds)
"TokenExpirationSeconds to set the ServiceAccount token."
obj spec.kubernetes
"Kubernetes specific auth configuration, requires that the Method be set to kubernetes
."
fn spec.kubernetes.withAudiences
withAudiences(audiences)
"TokenAudiences to include in the ServiceAccount token."
fn spec.kubernetes.withAudiencesMixin
withAudiencesMixin(audiences)
"TokenAudiences to include in the ServiceAccount token."
Note: This function appends passed data to existing values
fn spec.kubernetes.withRole
withRole(role)
"Role to use for authenticating to Vault."
fn spec.kubernetes.withServiceAccount
withServiceAccount(serviceAccount)
"ServiceAccount to use when authenticating to Vault's\nauthentication backend. This must reside in the consuming secret's (VDS/VSS/PKI) namespace."
fn spec.kubernetes.withTokenExpirationSeconds
withTokenExpirationSeconds(tokenExpirationSeconds)
"TokenExpirationSeconds to set the ServiceAccount token."
obj spec.storageEncryption
"StorageEncryption provides the necessary configuration to encrypt the client storage cache.\nThis should only be configured when client cache persistence with encryption is enabled.\nThis is done by passing setting the manager's commandline argument\n--client-cache-persistence-model=direct-encrypted. Typically, there should only ever\nbe one VaultAuth configured with StorageEncryption in the Cluster, and it should have\nthe label: cacheStorageEncryption=true"
fn spec.storageEncryption.withKeyName
withKeyName(keyName)
"KeyName to use for encrypt/decrypt operations via Vault Transit."
fn spec.storageEncryption.withMount
withMount(mount)
"Mount path of the Transit engine in Vault."
obj spec.vaultAuthGlobalRef
"VaultAuthGlobalRef."
fn spec.vaultAuthGlobalRef.withAllowDefault
withAllowDefault(allowDefault)
"AllowDefault when set to true will use the default VaultAuthGlobal resource\nas the default if Name is not set. The 'allow-default-globals' option must be\nset on the operator's '-global-vault-auth-options' flag\n\nThe default VaultAuthGlobal search is conditional.\nWhen a ref Namespace is set, the search for the default\nVaultAuthGlobal resource is constrained to that namespace.\nOtherwise, the search order is:\n1. The default VaultAuthGlobal resource in the referring VaultAuth resource's\nnamespace.\n2. The default VaultAuthGlobal resource in the Operator's namespace."
fn spec.vaultAuthGlobalRef.withName
withName(name)
"Name of the VaultAuthGlobal resource."
fn spec.vaultAuthGlobalRef.withNamespace
withNamespace(namespace)
"Namespace of the VaultAuthGlobal resource. If not provided, the namespace of\nthe referring VaultAuth resource is used."
obj spec.vaultAuthGlobalRef.mergeStrategy
"MergeStrategy configures the merge strategy for HTTP headers and parameters\nthat are included in all Vault authentication requests."
fn spec.vaultAuthGlobalRef.mergeStrategy.withHeaders
withHeaders(headers)
"Headers configures the merge strategy for HTTP headers that are included in\nall Vault requests. Choices are union
, replace
, or none
.\n\nIf union
is set, the headers from the VaultAuthGlobal and VaultAuth\nresources are merged. The headers from the VaultAuth always take precedence.\n\nIf replace
is set, the first set of non-empty headers taken in order from:\nVaultAuth, VaultAuthGlobal auth method, VaultGlobal default headers.\n\nIf none
is set, the headers from the\nVaultAuthGlobal resource are ignored and only the headers from the VaultAuth\nresource are used. The default is none
."
fn spec.vaultAuthGlobalRef.mergeStrategy.withParams
withParams(params)
"Params configures the merge strategy for HTTP parameters that are included in\nall Vault requests. Choices are union
, replace
, or none
.\n\nIf union
is set, the parameters from the VaultAuthGlobal and VaultAuth\nresources are merged. The parameters from the VaultAuth always take\nprecedence.\n\nIf replace
is set, the first set of non-empty parameters taken in order from:\nVaultAuth, VaultAuthGlobal auth method, VaultGlobal default parameters.\n\nIf none
is set, the parameters from the VaultAuthGlobal resource are ignored\nand only the parameters from the VaultAuth resource are used. The default is\nnone
."