Documentation
¶
Overview ¶
Code generated by "mdtogo"; DO NOT EDIT.
Index ¶
Constants ¶
This section is empty.
Variables ¶
View Source
var AzureVaultSecretsExamples = `
The function config is a simple configmap-like object to control the behavior
of the generator.
apiVersion: v1
kind: ConfigMap
metadata:
name: vault-secrets
data:
mode: azure # can also be 'file-mock', reading secrets from $FILE_MOCK_DATA_DIR
fs: disk # fs can also be memory, not caching secrets to disk
The actual secrets are generated from resources of kind ` + "`" + `AzureVaultSource` + "`" + `.
apiVersion: bluebrown.github.io/v1alpha1
kind: AzureVaultSource
metadata:
name: env-file
annotations:
config.kubernetes.io/local-config: "true"
spec:
# the name of the secret in kubernetes, to create
secretName: env-file
# list of container targets to inject the secret
# as envFrom secret ref
containerTargets:
- myapp
# the vault uri as written in the azure portal
vaultUri: https://krmtest.vault.azure.net/
# list of secrets to retrieve from the vault
vaultSecrets:
- secret: my-env-file #the secret name in the vault
version: "" # uses 'latest', if empty
key: env # the key is the secret name, if empty
# optional go template to format the secrets
# if not provided, secrets are rendered as key value pairs
stringDataTemplate: |
{{ envToYaml .env }}
Run the function as standalone providing the function config and resources.
azure-vault-secrets fn-config.yaml - < resources.yaml
`
View Source
var AzureVaultSecretsLong = `` /* 554-byte string literal not displayed */
View Source
var AzureVaultSecretsShort = `Generate kubernetes secrets from azure vault`
Functions ¶
This section is empty.
Types ¶
This section is empty.
Click to show internal directories.
Click to hide internal directories.