From fd4f2d8e352eb09e970ca43423994edc4eabc84b Mon Sep 17 00:00:00 2001 From: Achille Mascia Date: Wed, 26 Nov 2025 17:37:04 +0100 Subject: [PATCH] chore: remove signature verification --- .mise-tasks/install-helm-plugins | 2 +- charts/ggscout/values.schema.json | 507 +++ docs/index.html | 6534 ++++++++++++++++++++--------- 3 files changed, 5134 insertions(+), 1909 deletions(-) diff --git a/.mise-tasks/install-helm-plugins b/.mise-tasks/install-helm-plugins index b06c283..7819305 100755 --- a/.mise-tasks/install-helm-plugins +++ b/.mise-tasks/install-helm-plugins @@ -5,5 +5,5 @@ IFS=$'\n\t' plugins=$(helm plugin list) if ! echo "$plugins" | grep -q 'unittest'; then - helm plugin install https://github.com/helm-unittest/helm-unittest.git + helm plugin install https://github.com/helm-unittest/helm-unittest.git --verify=false # `verify` flag was added in helm v4 - topic is dicussed here https://github.com/helm-unittest/helm-unittest/issues/777 fi diff --git a/charts/ggscout/values.schema.json b/charts/ggscout/values.schema.json index f3c9e1c..24e283f 100644 --- a/charts/ggscout/values.schema.json +++ b/charts/ggscout/values.schema.json @@ -51,6 +51,93 @@ } }, "$defs": { + "APIAuth": { + "type": "object", + "required": [ + "login", + "api_key" + ], + "properties": { + "api_key": { + "description": "API key for authenticating", + "type": "string" + }, + "login": { + "description": "Login (including host/ in case of a workload)", + "type": "string" + } + } + }, + "AWSIAMConfig": { + "type": "object", + "required": [ + "aws_account_id" + ], + "properties": { + "aws_account_id": { + "type": "string" + }, + "env": { + "anyOf": [ + { + "$ref": "#/definitions/https%3A~1~1gitguardian.com~1inventory-config/$defs/Env" + }, + { + "const": null, + "nullable": true + } + ] + }, + "exclude": { + "type": "array", + "items": { + "$ref": "#/definitions/https%3A~1~1gitguardian.com~1inventory-config/$defs/FilteringRule" + }, + "nullable": true + }, + "external_id": { + "type": "string", + "nullable": true + }, + "include": { + "type": "array", + "items": { + "$ref": "#/definitions/https%3A~1~1gitguardian.com~1inventory-config/$defs/FilteringRule" + }, + "nullable": true + }, + "mode": { + "description": "The mode gives an additional layer of permissions allowing to configure a Scout instance, giving read-only, write-only, or read and write permissions to that source. Default is read-only.", + "type": "string", + "enum": [ + "read", + "write", + "read/write" + ], + "default": "read" + }, + "profile_name": { + "type": "string", + "nullable": true + }, + "resource_discovery": { + "description": "Optional resource discovery configuration\nIf not specified, resource discovery is disabled", + "anyOf": [ + { + "$ref": "#/definitions/https%3A~1~1gitguardian.com~1inventory-config/$defs/ResourceDiscoveryConfig" + }, + { + "const": null, + "nullable": true + } + ] + }, + "role_arn": { + "type": "string", + "nullable": true + } + } + }, "Accessibility": { "type": "string", "enum": [ @@ -523,6 +610,154 @@ } } }, + "ConjurConfig": { + "type": "object", + "oneOf": [ + { + "type": "object", + "required": [ + "username", + "password", + "auth_mode", + "server_url", + "account", + "fetch_all_versions" + ], + "properties": { + "password": { + "description": "Secret for authenticating", + "type": "string" + }, + "username": { + "type": "string" + }, + "auth_mode": { + "type": "string", + "const": "user" + }, + "accept_invalid_certs": { + "title": "Accept invalid/self-signed certificates (for development only)", + "default": false, + "type": "boolean" + }, + "account": { + "title": "The Conjur account name", + "type": "string" + }, + "env": { + "anyOf": [ + { + "$ref": "#/definitions/https%3A~1~1gitguardian.com~1inventory-config/$defs/Env" + }, + { + "const": null, + "nullable": true + } + ] + }, + "exclude": { + "type": "array", + "items": { + "$ref": "#/definitions/https%3A~1~1gitguardian.com~1inventory-config/$defs/FilteringRule" + }, + "nullable": true + }, + "fetch_all_versions": { + "title": "Whether or not to collect all secret versions", + "type": "boolean" + }, + "include": { + "type": "array", + "items": { + "$ref": "#/definitions/https%3A~1~1gitguardian.com~1inventory-config/$defs/FilteringRule" + }, + "nullable": true + }, + "mode": { + "default": "read", + "$ref": "#/definitions/https%3A~1~1gitguardian.com~1inventory-config/$defs/Mode" + }, + "server_url": { + "title": "The Conjur server URL", + "type": "string" + } + }, + "title": "User authentication" + }, + { + "type": "object", + "required": [ + "login", + "api_key", + "auth_mode", + "server_url", + "account", + "fetch_all_versions" + ], + "properties": { + "api_key": { + "description": "API key for authenticating", + "type": "string" + }, + "login": { + "description": "Login (including host/ in case of a workload)", + "type": "string" + }, + "auth_mode": { + "type": "string", + "const": "api" + }, + "accept_invalid_certs": { + "title": "Accept invalid/self-signed certificates (for development only)", + "default": false, + "type": "boolean" + }, + "account": { + "title": "The Conjur account name", + "type": "string" + }, + "env": { + "anyOf": [ + { + "$ref": "#/definitions/https%3A~1~1gitguardian.com~1inventory-config/$defs/Env" + }, + { + "const": null, + "nullable": true + } + ] + }, + "exclude": { + "type": "array", + "items": { + "$ref": "#/definitions/https%3A~1~1gitguardian.com~1inventory-config/$defs/FilteringRule" + }, + "nullable": true + }, + "fetch_all_versions": { + "title": "Whether or not to collect all secret versions", + "type": "boolean" + }, + "include": { + "type": "array", + "items": { + "$ref": "#/definitions/https%3A~1~1gitguardian.com~1inventory-config/$defs/FilteringRule" + }, + "nullable": true + }, + "mode": { + "default": "read", + "$ref": "#/definitions/https%3A~1~1gitguardian.com~1inventory-config/$defs/Mode" + }, + "server_url": { + "title": "The Conjur server URL", + "type": "string" + } + }, + "title": "API authentication" + } + ] + }, "ConjurWorkloadAuth": { "type": "object", "required": [ @@ -963,6 +1198,83 @@ } ] }, + { + "type": "object", + "required": [ + "aws_account_id", + "type" + ], + "properties": { + "aws_account_id": { + "type": "string" + }, + "env": { + "anyOf": [ + { + "$ref": "#/definitions/https%3A~1~1gitguardian.com~1inventory-config/$defs/Env" + }, + { + "const": null, + "nullable": true + } + ] + }, + "exclude": { + "type": "array", + "items": { + "$ref": "#/definitions/https%3A~1~1gitguardian.com~1inventory-config/$defs/FilteringRule" + }, + "nullable": true + }, + "external_id": { + "type": "string", + "nullable": true + }, + "include": { + "type": "array", + "items": { + "$ref": "#/definitions/https%3A~1~1gitguardian.com~1inventory-config/$defs/FilteringRule" + }, + "nullable": true + }, + "mode": { + "description": "The mode gives an additional layer of permissions allowing to configure a Scout instance, giving read-only, write-only, or read and write permissions to that source. Default is read-only.", + "type": "string", + "enum": [ + "read", + "write", + "read/write" + ], + "default": "read" + }, + "profile_name": { + "type": "string", + "nullable": true + }, + "resource_discovery": { + "description": "Optional resource discovery configuration\nIf not specified, resource discovery is disabled", + "anyOf": [ + { + "$ref": "#/definitions/https%3A~1~1gitguardian.com~1inventory-config/$defs/ResourceDiscoveryConfig" + }, + { + "const": null, + "nullable": true + } + ] + }, + "role_arn": { + "type": "string", + "nullable": true + }, + "type": { + "type": "string", + "const": "awsiam" + } + }, + "title": "AWS IAM", + "description": "AWS IAM fetcher for IAM users, roles, groups, and policies" + }, { "type": "object", "required": [ @@ -1409,6 +1721,164 @@ "title": "Conjur Cloud", "description": "Conjur Cloud fetcher" }, + { + "type": "object", + "oneOf": [ + { + "type": "object", + "required": [ + "username", + "password", + "auth_mode", + "server_url", + "account", + "fetch_all_versions", + "type" + ], + "properties": { + "password": { + "description": "Secret for authenticating", + "type": "string" + }, + "username": { + "type": "string" + }, + "auth_mode": { + "type": "string", + "const": "user" + }, + "accept_invalid_certs": { + "title": "Accept invalid/self-signed certificates (for development only)", + "default": false, + "type": "boolean" + }, + "account": { + "title": "The Conjur account name", + "type": "string" + }, + "env": { + "anyOf": [ + { + "$ref": "#/definitions/https%3A~1~1gitguardian.com~1inventory-config/$defs/Env" + }, + { + "const": null, + "nullable": true + } + ] + }, + "exclude": { + "type": "array", + "items": { + "$ref": "#/definitions/https%3A~1~1gitguardian.com~1inventory-config/$defs/FilteringRule" + }, + "nullable": true + }, + "fetch_all_versions": { + "title": "Whether or not to collect all secret versions", + "type": "boolean" + }, + "include": { + "type": "array", + "items": { + "$ref": "#/definitions/https%3A~1~1gitguardian.com~1inventory-config/$defs/FilteringRule" + }, + "nullable": true + }, + "mode": { + "default": "read", + "$ref": "#/definitions/https%3A~1~1gitguardian.com~1inventory-config/$defs/Mode" + }, + "server_url": { + "title": "The Conjur server URL", + "type": "string" + }, + "type": { + "type": "string", + "const": "conjur" + } + }, + "title": "User authentication" + }, + { + "type": "object", + "required": [ + "login", + "api_key", + "auth_mode", + "server_url", + "account", + "fetch_all_versions", + "type" + ], + "properties": { + "api_key": { + "description": "API key for authenticating", + "type": "string" + }, + "login": { + "description": "Login (including host/ in case of a workload)", + "type": "string" + }, + "auth_mode": { + "type": "string", + "const": "api" + }, + "accept_invalid_certs": { + "title": "Accept invalid/self-signed certificates (for development only)", + "default": false, + "type": "boolean" + }, + "account": { + "title": "The Conjur account name", + "type": "string" + }, + "env": { + "anyOf": [ + { + "$ref": "#/definitions/https%3A~1~1gitguardian.com~1inventory-config/$defs/Env" + }, + { + "const": null, + "nullable": true + } + ] + }, + "exclude": { + "type": "array", + "items": { + "$ref": "#/definitions/https%3A~1~1gitguardian.com~1inventory-config/$defs/FilteringRule" + }, + "nullable": true + }, + "fetch_all_versions": { + "title": "Whether or not to collect all secret versions", + "type": "boolean" + }, + "include": { + "type": "array", + "items": { + "$ref": "#/definitions/https%3A~1~1gitguardian.com~1inventory-config/$defs/FilteringRule" + }, + "nullable": true + }, + "mode": { + "default": "read", + "$ref": "#/definitions/https%3A~1~1gitguardian.com~1inventory-config/$defs/Mode" + }, + "server_url": { + "title": "The Conjur server URL", + "type": "string" + }, + "type": { + "type": "string", + "const": "conjur" + } + }, + "title": "API authentication" + } + ] + }, { "type": "object", "oneOf": [ @@ -2144,6 +2614,27 @@ "read/write" ] }, + "ResourceDiscoveryConfig": { + "description": "Configuration for AWS resource discovery\n\nResource discovery fetches actual AWS resources (S3 buckets, EC2 instances, etc.)\nto match against IAM policy ResourceSelectors and create GrantsAccessTo edges.\n\n# Default Behavior\nIf `resource_discovery` is not specified in config, resource discovery is disabled.\n\n# Examples\n```toml\n# Enable resource discovery for all supported services\n[sources.aws-iam.resource_discovery]\nenabled = true\n\n# Enable but exclude specific services (performance optimization)\n[sources.aws-iam.resource_discovery]\nenabled = true\nexclude_services = [\"ec2\"] # EC2 has too many instances\n```", + "type": "object", + "required": [ + "enabled" + ], + "properties": { + "enabled": { + "description": "Enable resource discovery", + "type": "boolean" + }, + "exclude_services": { + "description": "Services to exclude from resource discovery (opt-out model)\nIf not specified, all supported services will be fetched.\nExample: [\"ec2\", \"lambda\"] to skip EC2 and Lambda resources", + "type": "array", + "items": { + "type": "string" + }, + "nullable": true + } + } + }, "RuleElement": { "type": "string" }, @@ -2204,6 +2695,22 @@ "nullable": true } } + }, + "UserAuth": { + "type": "object", + "required": [ + "username", + "password" + ], + "properties": { + "password": { + "description": "Secret for authenticating", + "type": "string" + }, + "username": { + "type": "string" + } + } } } }, diff --git a/docs/index.html b/docs/index.html index 3aa87b5..08f0650 100644 --- a/docs/index.html +++ b/docs/index.html @@ -327,41 +327,51 @@

AWS Secrets Manager + >AWS IAM
d="M4 8a.5.5 0 0 1 .5-.5h5.793L8.146 5.354a.5.5 0 1 1 .708-.708l3 3a.5.5 0 0 1 0 .708l-3 3a.5.5 0 0 1-.708-.708L10.293 8.5H4.5A.5.5 0 0 1 4 8z" /> - AWS Secrets Manager

AWS Secrets Manager

Type: object
-

AWS Secrets Manager fetcher

+ AWS IAM

AWS IAM

Type: object
+

AWS IAM fetcher for IAM users, roles, groups, and policies

@@ -4368,6 +4378,67 @@

+
+
+
+

+ +

+
+ +
+
+ + Type: string
+ + + + + + + +
+
+
+
@@ -4670,18 +4741,18 @@

-
+
-
+

- +

-
+

Whether or not to collect all secret versions

Type: boolean
+ external_id
Type: string
@@ -4970,18 +5041,18 @@

-
+
-
+

- +

-
+
Type: array of string
- - - - - - - No Additional Items

Each item of this array must be:

-
-
+

Optional resource discovery configuration
+If not specified, resource discovery is disabled

+

+ +

+
Type: string
+ ResourceDiscoveryConfig
Type: object
+
+

Configuration for AWS resource discovery

+ +

Resource discovery fetches actual AWS resources (S3 buckets, EC2 instances, etc.)
+to match against IAM policy ResourceSelectors and create GrantsAccessTo edges.

+ +

Default Behavior

+ +

If resource_discovery is not specified in config, resource discovery is disabled.

+

Examples

+ +
+
# Enable resource discovery for all supported services
+[sources.aws-iam.resource_discovery]
+enabled = true
+
+# Enable but exclude specific services (performance optimization)
+[sources.aws-iam.resource_discovery]
+enabled = true
+exclude_services = ["ec2"]  # EC2 has too many instances
+
+
+ +
+
+ +
+ + -
-
-
-
-
-
-
+
-
+

- +

-
+
Type: const
-Specific value: "awssecretsmanager" - - - - - - -
-
-
-
-
- - -

GCP Secret Manager

Type: object
-

GCP Secret Manager fetcher

+ enabled
Type: boolean
+

Enable resource discovery

- - -
+
+
+
+
+
-
+

- +

-
+
Type: object Default: {"auth_mode": "application_default"}
-

Authentication method for GCP
-If not specified, defaults to Application Default Credentials

-
- -

- -

-
- - -

Service Account Key File

Type: object
-

Use a service account key file for authentication

+ exclude_services
Type: array of string
+

Services to exclude from resource discovery (opt-out model)
+If not specified, all supported services will be fetched.
+Example: ["ec2", "lambda"] to skip EC2 and Lambda resources

- -
+ No Additional Items

Each item of this array must be:

-
-

- -

-
- -
-
+
+ Type: const
-Specific value: "service_account_key_file" + exclude_services items
Type: string
+ +
+
-
-
-
-

- -

-
- -
-
+
+ Type: string
+ item 1
Type: const
+Specific value: null + + + + +
+ @@ -5489,9 +5515,19 @@

-
- +
+
+
+

+ +

+
+ +
+

Kubernetes Workload Identity Federation

Type: object
-

Use Kubernetes API to get service account tokens and authenticate via WIF.
-This is the most secure and cloud-native authentication method.

-
+ role_arn
Type: string
+ -
+
+
+
+
+
-
+

- +

-
+
Type: const
+Specific value: "awsiam" + + + + + + +
+
+
+
+
+ + + Type: string
-

Custom audience for the WIF provider. If not specified, defaults to the standard
-WIF provider URL format: //iam.googleapis.com/projects/{projectnumber}/locations/global/workloadIdentityPools/{poolid}/providers/{provider_id}

+ AWS Secrets Manager

AWS Secrets Manager

Type: object
+

AWS Secrets Manager fetcher

+ + -
-
-
-
-
+
-
+

- +

-
+
Type: const
-Specific value: "k8s" - - - - - - -
-
-
-
-
-
-
-

- -

-
- -
-
+ env

+

+ +

+
+ Type: string
-

Google Service Account name (without @project.iam.gserviceaccount.com)

-
- - - - - - -
-
-
-
-
-
-
-

- -

-
- -
+ Type: string
-

Kubernetes namespace where the service account is located

-
+ item 1
Type: const
+Specific value: null + + + + + + +
@@ -5884,18 +5871,18 @@

-
+
-
+

- +

-
+
Type: array
+ + + + + + + No Additional Items

Each item of this array must be:

+
+
+ + + Type: string
-

Kubernetes service account name to use for authentication

-
- - - - - - -
-
-
-
- +
+
+
+
+
+

+ +

+
+ +
+
+ + Type: string
-

Workload Identity Pool ID

-
+ fetch_all_versions

Whether or not to collect all secret versions

Type: boolean
+ @@ -6050,18 +6043,18 @@

-
+
-
+

- +

-
+
Type: array
+ + + + + + + No Additional Items

Each item of this array must be:

+
+
+ + + Type: string
-

GCP Project ID where the service account is located

-
- - - - - - -
-
-
-
-
-
-
-

- -

-
- - +
+
+
+
+
+
+
+

+ +

+
+ +
+ Type: enum (of string) Default: "read"
+

The mode gives an additional layer of permissions allowing to configure a Scout instance, giving read-only, write-only, or read and write permissions to that source. Default is read-only.

+ +
+

Must be one of:

+
  • "read"
  • "write"
  • "read/write"
+
@@ -6216,18 +6221,18 @@

-
+
-
+

- +

-
+
Type: string
-

Workload Identity Provider ID

-
+ profile_name
Type: string
+ @@ -6299,18 +6282,18 @@

-
+
-
+

- +

-
+
Type: integerFormat: int64 Default: 1800
-

Token expiration time in seconds. Default to 30 minutes

-
+ regions
Type: array of string
+ - -
-
-
-
-
+ No Additional Items

Each item of this array must be:

+
+

Application Default Configuration

Type: object
-

This will infer its configuration based on its environment.
-Works with the GOOGLEAPPLICATIONCREDENTIALS environment variable
-or by automatically calling GCP's metadata endpoint (if run as a GCE or GKE workload).

-
+ regions items
Type: string
+ -
+
+
+
+
+
+
+
-
+

- +

-
+
Type: const
+Specific value: "awssecretsmanager" + + + + + + +
+
+
+
+
+ + + Type: const
-Specific value: "default" - - - - + GCP Secret Manager

GCP Secret Manager

Type: object
+

GCP Secret Manager fetcher

+
- -
-
-
-
-
+ -
-
-
-
-
+
-
+

- +

-
+

-

- -

Type: object Default: {"auth_mode": "application_default"}
+

Authentication method for GCP
+If not specified, defaults to Application Default Credentials

+
+ +

+ +

+ id="tab-pane_sources_additionalProperties_oneOf_i4_auth_oneOf_i0" role="tabpanel"> Type: object
-

Declare an environment

-
Same definition as sources_additionalProperties_oneOf_i0_env_anyOf_i0 -

Service Account Key File

Type: object
+

Use a service account key file for authentication

+
+ + + + + + +
+
+
+

+ +

+
+ +
+
Type: const
-Specific value: null - - - - - - -
+ Service Account Key File + + + + auth_mode
Type: const
+Specific value: "service_account_key_file" @@ -6730,18 +6719,18 @@

-
+
-
+

- +

-
+
Type: array
+ auth + + + + oneOf + + + + Service Account Key File + + + + key_file
Type: string
- No Additional Items

Each item of this array must be:

-
-
+ +
+
+
+
+
Type: object
-Same definition as sources_additionalProperties_oneOf_i0_exclude_items -
-
-
-
-
-
-

Kubernetes Workload Identity Federation

Type: object
+

Use Kubernetes API to get service account tokens and authenticate via WIF.
+This is the most secure and cloud-native authentication method.

+
+ + + + + + +
-
+

- +

-
+

Whether or not to collect all secret versions

Type: boolean
- + auth + + + + oneOf + + + + Kubernetes Workload Identity Federation + + + + audience
Type: string
+

Custom audience for the WIF provider. If not specified, defaults to the standard
+WIF provider URL format: //iam.googleapis.com/projects/{projectnumber}/locations/global/workloadIdentityPools/{poolid}/providers/{provider_id}

+
@@ -6902,18 +6948,18 @@

-
+
-
+

- +

-
+
Type: array
- + auth + + + + oneOf + + + + Kubernetes Workload Identity Federation + + + + auth_mode
Type: const
+Specific value: "k8s" - No Additional Items

Each item of this array must be:

+ +
+
+
+
+
-
- +
+

+ +

+
+ +
+
Type: object
-Same definition as sources_additionalProperties_oneOf_i0_exclude_items -
-
+ oneOf + + + + Kubernetes Workload Identity Federation + + + + gcp_service_account_name
Type: string
+

Google Service Account name (without @project.iam.gserviceaccount.com)

+
+ + + + + +
-
+
-
+

- +

-
+
Type: enum (of string) Default: "read"
-

The mode gives an additional layer of permissions allowing to configure a Scout instance, giving read-only, write-only, or read and write permissions to that source. Default is read-only.

+ auth + + + + oneOf + + + + Kubernetes Workload Identity Federation + + + + kubernetes_namespace
Type: string
+

Kubernetes namespace where the service account is located

- -
-

Must be one of:

-
  • "read"
  • "write"
  • "read/write"
-
@@ -7080,18 +7196,18 @@

Must be one of:

-
+
-
+

- +

-
+
Type: array of string
- + auth + + + + oneOf + + + + Kubernetes Workload Identity Federation + + + + kubernetes_service_account
Type: string
+

Kubernetes service account name to use for authentication

+
- No Additional Items

Each item of this array must be:

+ +
+
+
+
+
-
- +
+

+ +

+
+ +
+
Type: string
- + oneOf + + + + Kubernetes Workload Identity Federation + + + + pool_id
Type: string
+

Workload Identity Pool ID

+
-
-
-
+
-
+

- +

-
+
Type: const
-Specific value: "gcpsecretmanager" - - - - - - -
-
-
-
-
- - -

Azure Key Vault

Type: object
-

Azure Key Vault fetcher

+ project_id
Type: string
+

GCP Project ID where the service account is located

- - -
+
+
+
+
+
-
+

- +

-
+

-

- -

-
Type: string
+

GCP Project Number

+
+ + + + + + +
+
+
+
+
+
+
+

+ +

+
+ +
+
Type: object
-

Declare an environment

-
Same definition as sources_additionalProperties_oneOf_i0_env_anyOf_i0 -
Type: string
+

Workload Identity Provider ID

+
+ + + + + + +
+
+
+
+
+
+
+

+ +

+
+ +
+
Type: const
-Specific value: null - - - - - - -
+ Kubernetes Workload Identity Federation + + + + token_expiration_seconds
Type: integerFormat: int64 Default: 1800
+

Token expiration time in seconds. Default to 30 minutes

+
@@ -7492,19 +7694,9 @@

-
-
-
-

- -

-
- -
-
+
+ Type: array
- + auth + + + + oneOf + + + + Application Default Configuration

Application Default Configuration

Type: object
+

This will infer its configuration based on its environment.
+Works with the GOOGLEAPPLICATIONCREDENTIALS environment variable
+or by automatically calling GCP's metadata endpoint (if run as a GCE or GKE workload).

+
- No Additional Items

Each item of this array must be:

+ +
-
- +
+

+ +

+
+ +
+
Type: object
-Same definition as sources_additionalProperties_oneOf_i0_exclude_items + oneOf + + + + Application Default Configuration + + + + auth_mode
Type: const
+Specific value: "default" + + + + + + +
+
+
+ + + + + +
-
+
-
+

- +

-
+

Whether or not to collect all secret versions

Type: boolean
- + env

+

+ +

+
+ + + Type: object
+

Declare an environment

+
Same definition as sources_additionalProperties_oneOf_i0_env_anyOf_i0 +
+ + + Type: const
+Specific value: null + + + + + + +
+ + + + + + +
+
+
+
+
+
+
+

+ +

+
+ +
+
+ + Type: array
+ + + + + + + No Additional Items

Each item of this array must be:

+
+ +
+
+
+
+
+
+
+
+

+ +

+
+ +
+
+ +

Whether or not to collect all secret versions

Type: boolean
+ + + + + + + +
+
+
+
+
+
+
+

+ +

+
+ +
+
+ + Type: array
+ + + + + + + No Additional Items

Each item of this array must be:

+
+ +
+
+
+
+
+
+
+
+

+ +

+
+ +
+
+ + Type: enum (of string) Default: "read"
+

The mode gives an additional layer of permissions allowing to configure a Scout instance, giving read-only, write-only, or read and write permissions to that source. Default is read-only.

+
+ +
+

Must be one of:

+
  • "read"
  • "write"
  • "read/write"
+
+ + + + + + +
+
+
+
+
+
+
+

+ +

+
+ +
+
+ + Type: array of string
+ + + + + + + No Additional Items

Each item of this array must be:

+
+
+ + + Type: string
+ + + + + + + +
+
+
+
+
+
+
+
+
+

+ +

+
+ +
+
+ + Type: const
+Specific value: "gcpsecretmanager" + + + + + + +
+
+
+
+
+ + +

Azure Key Vault

Type: object
+

Azure Key Vault fetcher

+
+ + + + + + + + +
+
+
+

+ +

+
+ +
+
+ +
+

+ +

+
+ + + Type: object
+

Declare an environment

+
Same definition as sources_additionalProperties_oneOf_i0_env_anyOf_i0 +
+ + + Type: const
+Specific value: null + + + + + + +
+ + + + + + +
+
+
+
+
+
+
+

+ +

+
+ +
+
+ + Type: array
+ + + + + + + No Additional Items

Each item of this array must be:

+
+ +
+
+
+
+
+
+
+
+

+ +

+
+ +
+
+ +

Whether or not to collect all secret versions

Type: boolean
+ + + + + + + +
+
+
+
+
+
+
+

+ +

+
+ +
+
+ + Type: array
+ + + + + + + No Additional Items

Each item of this array must be:

+
+ +
+
+
+
+
+
+
+
+

+ +

+
+ +
+
+ + Type: enum (of string) Default: "read"
+

The mode gives an additional layer of permissions allowing to configure a Scout instance, giving read-only, write-only, or read and write permissions to that source. Default is read-only.

+
+ +
+

Must be one of:

+
  • "read"
  • "write"
  • "read/write"
+
+ + + + + + +
+
+
+
+
+
+
+

+ +

+
+ +
+
+ + Type: string
+ + + + + + + +
+
+
+
+
+
+
+

+ +

+
+ +
+
+ + Type: const
+Specific value: "azurekeyvault" + + + + + + +
+
+
+
+
+ + +

GitLab CI

Type: object
+

GitLab CI fetcher

+
+ + + + + + + + +
+
+
+

+ +

+
+ +
+
+ +
+

+ +

+
+ + + Type: object
+

Declare an environment

+
Same definition as sources_additionalProperties_oneOf_i0_env_anyOf_i0 +
+ + + Type: const
+Specific value: null + + + + + + +
+ + + + + + +
+
+
+
+
+
+
+

+ +

+
+ +
+
+ + Type: array
+ + + + + + + No Additional Items

Each item of this array must be:

+
+ +
+
+
+
+
+
+
+
+

+ +

+
+ +
+
+ + Type: array
+ + + + + + + No Additional Items

Each item of this array must be:

+
+ +
+
+
+
+
+
+
+
+

+ +

+
+ +
+
+ + Type: string
+ + + + + + + +
+
+
+
+
+
+
+

+ +

+
+ +
+
+ + Type: stringFormat: uri
+ + + + + + + +
+
+
+
+
+
+
+

+ +

+
+ +
+
+ + Type: const
+Specific value: "gitlabci" + + + + + + +
+
+
+
+
+ + +

GitLab Personal Access Tokens

Type: object
+

GitLab Personal Access Token fetcher

+
+ + + + + + + + +
+
+
+

+ +

+
+ +
+
+ + Type: string
+

Admin token needed for PAT API access (requires admin privileges)

+
@@ -7664,18 +10020,210 @@

-
+
-
+

- + +

+
+ +
+
+ +
+

Environment designation for this configuration

+

+ +

+
+ + + Type: object
+

Declare an environment

+
Same definition as sources_additionalProperties_oneOf_i0_env_anyOf_i0 +
+ + + Type: const
+Specific value: null + + + + + + +
+ + + + + + +
+
+
+
+
+
+
+

+

-
+
Type: array
+ exclude
Type: array
@@ -7722,7 +10270,7 @@

No Additional Items

Each item of this array must be:

-
+
Type: object
+ FilteringRule
Type: object
Same definition as sources_additionalProperties_oneOf_i0_exclude_items
@@ -7775,18 +10323,18 @@

-
+
-
+

- +

-
+
Type: enum (of string) Default: "read"
-

The mode gives an additional layer of permissions allowing to configure a Scout instance, giving read-only, write-only, or read and write permissions to that source. Default is read-only.

-
+ include
Type: array
-
-

Must be one of:

-
  • "read"
  • "write"
  • "read/write"
-
- + No Additional Items

Each item of this array must be:

+
+ +
-
+
-
+

- +

-
+
Type: string
- + url
Type: stringFormat: uri
+

GitLab instance URL (e.g., "https://gitlab.com" or "https://gitlab.example.com")

+
@@ -7903,18 +10496,18 @@

-
+
-
+

- +

-
+
Type: const
-Specific value: "azurekeyvault" + type
Type: const
+Specific value: "gitlabpat" @@ -7965,7 +10558,7 @@

+ id="tab-pane_sources_additionalProperties_oneOf_i8" role="tabpanel">

GitLab CI

Type: object
-

GitLab CI fetcher

+ Conjur Cloud

Conjur Cloud

Type: object
+

Conjur Cloud fetcher

@@ -8007,18 +10600,18 @@

-
+
-
+

- +

-
+

-

- -

Type: object
+ + +

+ +

+ id="tab-pane_sources_additionalProperties_oneOf_i8_auth_oneOf_i0" role="tabpanel"> Type: object
-

Declare an environment

-
Same definition as sources_additionalProperties_oneOf_i0_env_anyOf_i0 -

CyberArk authentication

Type: object
+ + + + + + + + + +
+
+
+

+ +

+
+ +
+
Type: const
-Specific value: null - - - - - - -
+ item 0 + + + + client_id
Type: string
+

CyberArk client ID or Conjur workload Client ID

+
@@ -8198,18 +10816,18 @@

-
+
-
+

- +

-
+
Type: array
- + auth + + + + oneOf + + + + item 0 + + + + client_secret
Type: string
+

Secret for authenticating

+
- No Additional Items

Each item of this array must be:

+ +
+
+
+
+
-
- +
+

+ +

+
+ +
+
Type: object
-Same definition as sources_additionalProperties_oneOf_i0_exclude_items -
-
+ tenant_id
Type: string
+

Cyberark Cloud tenant ID

+
+ + + + + +
-
+
-
+

- +

-
+
Type: array
- + auth + + + + oneOf + + + + CyberArk authentication + + + + auth_mode
Type: const
+Specific value: "cyber_ark" - No Additional Items

Each item of this array must be:

-
-
+ +
+
+
+
+
Type: object
-Same definition as sources_additionalProperties_oneOf_i0_exclude_items -
-
-
-
-
-
-

Workload authentication

Type: object
+ + + + + + + + + +
-
+

- +

-
+
Type: string
- + auth + + + + oneOf + + + + item 1 + + + + api_key
Type: string
+

Workload API key for authenticating

+
@@ -8481,18 +11210,18 @@

-
+
-
+

- +

-
+
Type: stringFormat: uri
- + auth + + + + oneOf + + + + item 1 + + + + login
Type: string
+

Workload login (ID) for authenticating

+
@@ -8542,18 +11293,18 @@

-
+
-
+

- +

-
+
Type: const
-Specific value: "gitlabci" + auth + + + + oneOf + + + + Workload authentication + + + + auth_mode
Type: const
+Specific value: "workload" @@ -8604,7 +11376,7 @@

+ id="tab-pane_sources_additionalProperties_oneOf_i8_auth_oneOf_i2" role="tabpanel">

GitLab Personal Access Tokens

Type: object
-

GitLab Personal Access Token fetcher

-
+ item 8 + + + + auth + + + + oneOf + + + + Kubernetes authentication

Kubernetes authentication

Type: object
- -
+
-
+

- +

-
+
Type: string
-

Admin token needed for PAT API access (requires admin privileges)

-
+ auth + + + + oneOf + + + + Kubernetes authentication + + + + auth_mode
Type: const
+Specific value: "k8s" @@ -8708,18 +11518,18 @@

-
+
-
+

- +

-
+
Type: string
+

Optional Host ID for the K8s authenticator

+
+ + + + + + +
+
+
+
+
+
+
+

+ +

+
+ +
+
+ +
-

Environment designation for this configuration

-

- -

-
- - - Type: string
+

Kubernetes namespace where service account is defined

+
+ + + + + + +
+
+
+
+
+
+
+

+ +

+
+ +
+
+ + Type: object
-

Declare an environment

-
Same definition as sources_additionalProperties_oneOf_i0_env_anyOf_i0 -
- - - Type: const
-Specific value: null - - - - - - -
+ service_account
Type: string
+

Kubernetes service account used for authentication

+
@@ -8900,18 +11767,18 @@

-
+
-
+

- +

-
+
Type: array
- + auth + + + + oneOf + + + + Kubernetes authentication + + + + service_id
Type: string Default: "kubernetes"
+

Service ID for the K8s authenticator

+
- No Additional Items

Each item of this array must be:

+ +
+
+
+
+
-
- +
+

+ +

+
+ +
+
Type: object
-Same definition as sources_additionalProperties_oneOf_i0_exclude_items + oneOf + + + + Kubernetes authentication + + + + token_expiration_seconds
Type: integerFormat: int64 Default: 1800
+

Token expiration time in seconds. Default to 30 minutes

+
+ + + + + + +
+
+
+ + + + + +
-
+
-
+

- +

-
+
Type: array
- - - - - - - No Additional Items

Each item of this array must be:

-
-
+ env

+

+ +

+
Type: object
-Same definition as sources_additionalProperties_oneOf_i0_exclude_items -
-
-
-
-
-
-
-
-
-

- -

-
- -
-
+ anyOf + + + + Env
Type: object
+

Declare an environment

+
Same definition as sources_additionalProperties_oneOf_i0_env_anyOf_i0 +
+ Type: stringFormat: uri
-

GitLab instance URL (e.g., "https://gitlab.com" or "https://gitlab.example.com")

-
+ item 1
Type: const
+Specific value: null + + + + + + +
@@ -9184,18 +12135,18 @@

-
+
-
+

- +

-
+
Type: const
-Specific value: "gitlabpat" + exclude
Type: array
+ - -
-
-
-
-
+ No Additional Items

Each item of this array must be:

+
+

Conjur Cloud

Type: object
-

Conjur Cloud fetcher

-
- - - - - - - - -
+ item 8 + + + + exclude + + + + FilteringRule
Type: object
+Same definition as sources_additionalProperties_oneOf_i0_exclude_items +
+
+
+
+
+
+
-
+

- +

-
+
Type: object
+ fetch_all_versions

Whether or not to collect all secret versions

Type: boolean
+ - +
+
+
+
+

+ +

+
+ +
+

CyberArk authentication

Type: object
- + include
Type: array
- - -
+ No Additional Items

Each item of this array must be:

-
-

- -

-
- -
-
+
+ Type: string
-

CyberArk client ID or Conjur workload Client ID

-
- - - - - - + FilteringRule
Type: object
+Same definition as sources_additionalProperties_oneOf_i0_exclude_items +
+
-
+
-
+

- +

-
+
Type: string
-

Secret for authenticating

+ mode
Type: enum (of string) Default: "read"
+

The mode gives an additional layer of permissions allowing to configure a Scout instance, giving read-only, write-only, or read and write permissions to that source. Default is read-only.

+ +
+

Must be one of:

+
  • "read"
  • "write"
  • "read/write"
+
@@ -9587,18 +12485,18 @@

-
+
-
+

- +

-
+
Type: string
-

Cyberark Cloud tenant ID

-
+ subdomain

The Conjur Cloud subdomain

Type: string
+ @@ -9670,18 +12546,18 @@

-
+
-
+

- +

-
+
Type: const
-Specific value: "cyber_ark" + type
Type: const
+Specific value: "conjurcloud" @@ -9753,7 +12608,7 @@

+ id="tab-pane_sources_additionalProperties_oneOf_i9" role="tabpanel">

Workload authentication

Type: object
- - - - - - - - - -
-
-
-

- -

-
+ Conjur

Conjur

Type: object
+

Conjur fetcher (supports both OSS and Enterprise)

+
-
-
+

+ +

+
+ Type: string
-

Workload API key for authenticating

-
+ User authentication

User authentication

Type: object
+ + + -
-
-
-
-
+
-
+

- +

-
+
Type: string
-

Workload login (ID) for authenticating

+ password
Type: string
+

Secret for authenticating

@@ -9981,18 +12788,18 @@

-
+
-
+

- +

-
+
Type: const
-Specific value: "workload" + username
Type: string
+ @@ -10063,9 +12863,19 @@

-
- +
+
+
+

+ +

+
+ +
+

Kubernetes authentication

Type: object
- + auth_mode
Type: const
+Specific value: "user" -
-
-
-

- -

+
- -
-
+
+
+
+ Type: const
-Specific value: "k8s" + API authentication

API authentication

Type: object
+ + + -
-
-
-
-
+
-
+

- +

-
+
Type: string
-

Optional Host ID for the K8s authenticator

+ api_key
Type: string
+

API key for authenticating

@@ -10289,18 +13070,18 @@

-
+
-
+

- +

-
+
Type: string
-

Kubernetes namespace where service account is defined

+ login
Type: string
+

Login (including host/ in case of a workload)

@@ -10372,18 +13146,18 @@

-
+
-
+

- +

-
+
Type: string
-

Kubernetes service account used for authentication

-
+ auth_mode
Type: const
+Specific value: "api" @@ -10455,18 +13221,25 @@

-
+
+ + + + + + +
-
+

- +

-
+
Type: string Default: "kubernetes"
-

Service ID for the K8s authenticator

-
+ accept_invalid_certs

Accept invalid/self-signed certificates (for development only)

Type: boolean Default: false
+ @@ -10538,18 +13289,18 @@

-
+
-
+

- +

-
+
Type: integerFormat: int64 Default: 1800
-

Token expiration time in seconds. Default to 30 minutes

-
- - - - + account

The Conjur account name

Type: string
-
-
-
-
-
- @@ -10632,18 +13350,18 @@

-
+
-
+

- +

-
+

-

+ env


+

-

+ id="tab-pane_sources_additionalProperties_oneOf_i9_env_anyOf_i0" role="tabpanel"> Type: object
+ Env
Type: object

Declare an environment

Same definition as sources_additionalProperties_oneOf_i0_env_anyOf_i0
+ id="tab-pane_sources_additionalProperties_oneOf_i9_env_anyOf_i1" role="tabpanel"> Type: const
-Specific value: null + item 1
Type: const
+Specific value: null @@ -10823,18 +13541,18 @@

-
+
-
+

- +

-
+
Type: array
+ exclude
Type: array
@@ -10881,7 +13599,7 @@

No Additional Items

Each item of this array must be:

-
+
Type: object
+ FilteringRule
Type: object
Same definition as sources_additionalProperties_oneOf_i0_exclude_items
@@ -10934,18 +13652,18 @@

-
+
-
+

- +

-
+

Whether or not to collect all secret versions

Type: boolean
+ fetch_all_versions

Whether or not to collect all secret versions

Type: boolean
@@ -10995,18 +13713,18 @@

-
+
-
+

- +

-
+
Type: array
+ include
Type: array
@@ -11053,7 +13771,7 @@

No Additional Items

Each item of this array must be:

-
+
Type: object
+ FilteringRule
Type: object
Same definition as sources_additionalProperties_oneOf_i0_exclude_items
@@ -11106,18 +13824,18 @@

-
+
-
+

- +

-
+
Type: enum (of string) Default: "read"
+ mode
Type: enum (of string) Default: "read"

The mode gives an additional layer of permissions allowing to configure a Scout instance, giving read-only, write-only, or read and write permissions to that source. Default is read-only.

@@ -11173,18 +13891,18 @@

Must be one of:

-
+
-
+

- +

-
+

The Conjur Cloud subdomain

Type: string
+ server_url

The Conjur server URL

Type: string
@@ -11234,18 +13952,18 @@

-
+
-
+

- +

-
+
Type: const
-Specific value: "conjurcloud" + type
Type: const
+Specific value: "conjur" @@ -11296,7 +14014,7 @@

+ id="tab-pane_sources_additionalProperties_oneOf_i10" role="tabpanel">

Akeyless

Type: object
+ Akeyless

Akeyless

Type: object

Akeyless fetcher

@@ -11340,18 +14058,18 @@

-
+
-
+

- +

-
+
Type: string
+ access_id
Type: string

Akeyless Access ID

@@ -11402,18 +14120,18 @@

-
+
-
+

- +

-
+
Type: string
+ access_key
Type: string

Akeyless Access Key

@@ -11464,18 +14182,18 @@

-
+
-
+

- +

-
+
Type: enum (of string) Default: "regular"
+ accessibility
Type: enum (of string) Default: "regular"
-
+

Must be one of:

  • "regular"
  • "personal"
@@ -11530,18 +14248,18 @@

Must be one of:

-
+
-
+

- +

-
+
Type: stringFormat: uri Default: "https://api.akeyless.io/"
+ api_url
Type: stringFormat: uri Default: "https://api.akeyless.io/"

Akeyless API v2 URL. Default to https://api.akeyless.io/.
If you use an Akeyless Gateway, you must use the complete URL. Example: https://my-akeyless-gw.com/api/v2/

@@ -11593,18 +14311,18 @@

-
+
-
+

- +

-
+

-

+ env


+

-

+ id="tab-pane_sources_additionalProperties_oneOf_i10_env_anyOf_i0" role="tabpanel"> Type: object
+ Env
Type: object

Declare an environment

Same definition as sources_additionalProperties_oneOf_i0_env_anyOf_i0
+ id="tab-pane_sources_additionalProperties_oneOf_i10_env_anyOf_i1" role="tabpanel"> Type: const
-Specific value: null + item 1
Type: const
+Specific value: null @@ -11784,18 +14502,18 @@

-
+
-
+

- +

-
+
Type: array
+ exclude
Type: array
@@ -11842,7 +14560,7 @@

No Additional Items

Each item of this array must be:

-
+
Type: object
+ FilteringRule
Type: object
Same definition as sources_additionalProperties_oneOf_i0_exclude_items
@@ -11895,18 +14613,18 @@

-
+
-
+

- +

-
+

Whether or not to collect all secret versions

Type: boolean
+ fetch_all_versions

Whether or not to collect all secret versions

Type: boolean
@@ -11956,18 +14674,18 @@

-
+
-
+

- +

-
+
Type: array
+ include
Type: array
@@ -12014,7 +14732,7 @@

No Additional Items

Each item of this array must be:

-
+
Type: object
+ FilteringRule
Type: object
Same definition as sources_additionalProperties_oneOf_i0_exclude_items
@@ -12067,18 +14785,18 @@

-
+
-
+

- +

-
+
Type: enum (of string) Default: "read"
+ mode
Type: enum (of string) Default: "read"

The mode gives an additional layer of permissions allowing to configure a Scout instance, giving read-only, write-only, or read and write permissions to that source. Default is read-only.

@@ -12134,18 +14852,18 @@

Must be one of:

-
+
-
+

- +

-
+
Type: const
-Specific value: "apikey" + auth_mode
Type: const
+Specific value: "apikey" @@ -12195,18 +14913,18 @@

-
+
-
+

- +

-
+
Type: const
-Specific value: "akeyless" + type
Type: const
+Specific value: "akeyless" @@ -12257,7 +14975,7 @@

+ id="tab-pane_sources_additionalProperties_oneOf_i11" role="tabpanel">

Delinea Secret Server

Type: object
+ Delinea Secret Server

Delinea Secret Server

Type: object

Delinea SecretServer fetcher

@@ -12301,18 +15019,18 @@

-
+
-
+

- +

-
+
Type: string
+ client_id
Type: string
@@ -12362,18 +15080,18 @@

-
+
-
+

- +

-
+
Type: string
+ client_secret
Type: string
@@ -12423,18 +15141,18 @@

-
+
-
+

- +

-
+

-

+ env


+

-

+ id="tab-pane_sources_additionalProperties_oneOf_i11_env_anyOf_i0" role="tabpanel"> Type: object
+ Env
Type: object

Declare an environment

Same definition as sources_additionalProperties_oneOf_i0_env_anyOf_i0
+ id="tab-pane_sources_additionalProperties_oneOf_i11_env_anyOf_i1" role="tabpanel"> Type: const
-Specific value: null + item 1
Type: const
+Specific value: null @@ -12614,18 +15332,18 @@

-
+
-
+

- +

-
+
Type: array
+ exclude
Type: array
@@ -12672,7 +15390,7 @@

No Additional Items

Each item of this array must be:

-
+
Type: object
+ FilteringRule
Type: object
Same definition as sources_additionalProperties_oneOf_i0_exclude_items
@@ -12725,18 +15443,18 @@

-
+
-
+

- +

-
+
Type: array
+ include
Type: array
@@ -12783,7 +15501,7 @@

No Additional Items

Each item of this array must be:

-
+
Type: object
+ FilteringRule
Type: object
Same definition as sources_additionalProperties_oneOf_i0_exclude_items
@@ -12836,18 +15554,18 @@

-
+
-
+

- +

-
+
Type: enum (of string) Default: "read"
+ mode
Type: enum (of string) Default: "read"

The mode gives an additional layer of permissions allowing to configure a Scout instance, giving read-only, write-only, or read and write permissions to that source. Default is read-only.

@@ -12903,18 +15621,18 @@

Must be one of:

-
+
-
+

- +

-
+
Type: string
+ tenant
Type: string

Delinea tenant

@@ -12965,18 +15683,18 @@

-
+
-
+

- +

-
+
Type: string Default: "com"
+ tld
Type: string Default: "com"

Top-level domain
This can be found by clicking on "Token API documentation" in the Settings > REST API section of the Secret Server UI

@@ -13028,18 +15746,18 @@

-
+
-
+

- +

-
+
Type: const
-Specific value: "oauth" + auth_mode
Type: const
+Specific value: "oauth" @@ -13089,18 +15807,18 @@

-
+
-
+

- +

-
+
Type: const
-Specific value: "delineasecretserver" + type
Type: const
+Specific value: "delineasecretserver"