You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat: added support for trusted_profile secret type<br>- added support for to pass trusted_profile value as part of the es_container_registry_secrets_chain input (#63)
| <aname="input_es_container_registry"></a> [es\_container\_registry](#input\_es\_container\_registry)| The registry URL to be used in dockerconfigjson |`string`|`"us.icr.io"`| no |
40
40
| <aname="input_es_container_registry_email"></a> [es\_container\_registry\_email](#input\_es\_container\_registry\_email)| Optional - Email to be used in dockerconfigjson |`string`|`null`| no |
41
-
| <aname="input_es_container_registry_secrets_chain"></a> [es\_container\_registry\_secrets\_chain](#input\_es\_container\_registry\_secrets\_chain)| Structure to generate a chain of secrets into a single dockerjsonconfig secret for multiple registries authentication. | <pre>list(object({<br/> es_container_registry = string<br/> sm_secret_id = string # id of the secret storing the apikey that will be used for the secrets chain<br/> es_container_registry_email = optional(string, null)<br/> }))</pre> |`[]`| no |
41
+
| <aname="input_es_container_registry_secrets_chain"></a> [es\_container\_registry\_secrets\_chain](#input\_es\_container\_registry\_secrets\_chain)| Structure to generate a chain of secrets into a single dockerjsonconfig secret for multiple registries authentication. | <pre>list(object({<br/> es_container_registry = string<br/> sm_secret_id = string # id of the secret storing the apikey that will be used for the secrets chain<br/> es_container_registry_email = optional(string, null)<br/> trusted_profile = optional(string, null)<br/> }))</pre> |`[]`| no |
42
42
| <aname="input_es_helm_rls_name"></a> [es\_helm\_rls\_name](#input\_es\_helm\_rls\_name)| Name to use for the helm release for externalsecrets resource. Must be unique in the namespace |`string`| n/a | yes |
43
43
| <aname="input_es_helm_rls_namespace"></a> [es\_helm\_rls\_namespace](#input\_es\_helm\_rls\_namespace)| Namespace to deploy the helm release for the externalsecret. Default if null is the externalsecret namespace |`string`|`null`| no |
44
44
| <aname="input_es_kubernetes_namespace"></a> [es\_kubernetes\_namespace](#input\_es\_kubernetes\_namespace)| Namespace to use to generate the externalsecret |`string`| n/a | yes |
@@ -54,7 +54,7 @@ No modules.
54
54
| <aname="input_sm_kv_keyid"></a> [sm\_kv\_keyid](#input\_sm\_kv\_keyid)| Secrets-Manager key value (kv) keyid |`string`|`null`| no |
55
55
| <aname="input_sm_kv_keypath"></a> [sm\_kv\_keypath](#input\_sm\_kv\_keypath)| Secrets-Manager key value (kv) keypath |`string`|`null`| no |
56
56
| <aname="input_sm_secret_id"></a> [sm\_secret\_id](#input\_sm\_secret\_id)| Secrets-Manager secret ID where source data will be synchronized with Kubernetes secret. It can be null only in the case of a dockerjsonconfig secrets chain |`string`| n/a | yes |
57
-
| <aname="input_sm_secret_type"></a> [sm\_secret\_type](#input\_sm\_secret\_type)| Secrets-manager secret type to be used as source data by ESO. Valid input types are 'arbitrary', 'username\_password' and 'iam\_credentials' |`string`| n/a | yes |
57
+
| <aname="input_sm_secret_type"></a> [sm\_secret\_type](#input\_sm\_secret\_type)| Secrets-manager secret type to be used as source data by ESO. Valid input types are 'iam\_credentials', 'username\_password', 'trusted\_profile', 'arbitrary', 'imported\_cert', 'public\_cert', 'private\_cert', 'kv' |`string`| n/a | yes |
# validation for dockerjsonconfig secrets chain -> if it is a chain the kube secret type must be dockerconfigjson and sm secret type iam_credentials
21
-
validate_condition_chain=local.is_dockerjsonconfig_chain==true&& (var.es_kubernetes_secret_type!="dockerconfigjson"|| var.sm_secret_type!="iam_credentials") # checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
22
-
validate_msg_chain="If the externalsecret is expected to generate a dockerjsonconfig secrets chain the only supported value for es_kubernetes_secret_type is dockerconfigjson and for sm_secret_type is iam_credentials"
20
+
# validation for dockerjsonconfig secrets chain -> if it is a chain the kube secret type must be dockerconfigjson and sm secret types iam_credentials or trusted_profile
21
+
validate_condition_chain=local.is_dockerjsonconfig_chain==true&& (var.es_kubernetes_secret_type!="dockerconfigjson"||(var.sm_secret_type!="iam_credentials"&& var.sm_secret_type!="trusted_profile")) # checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
22
+
validate_msg_chain="If the externalsecret is expected to generate a dockerjsonconfig secrets chain the only supported value for es_kubernetes_secret_type is dockerconfigjson and for sm_secret_type is iam_credentials or trusted_profile"
description="Secrets-manager secret type to be used as source data by ESO. Valid input types are 'arbitrary', 'username_password' and 'iam_credentials'"
53
+
description="Secrets-manager secret type to be used as source data by ESO. Valid input types are 'iam_credentials', 'username_password', 'trusted_profile', 'arbitrary', 'imported_cert', 'public_cert', 'private_cert', 'kv'"
error_message="The sm_secret_type value must be one of the following: iam_credentials, username_password, arbitrary, imported_cert, public_cert, private_cert, kv or leave it empty."
58
+
error_message="The sm_secret_type value must be one of the following: iam_credentials, username_password, trusted_profile, arbitrary, imported_cert, public_cert, private_cert, kv or leave it empty."
0 commit comments