From 506c7d6eaa88926c7572e20b35441118b1620921 Mon Sep 17 00:00:00 2001 From: Guerdon Mukama Date: Fri, 5 Jan 2024 10:57:09 +1100 Subject: [PATCH] Read me --- helm/gen3-external-secrets/README.md | 99 ++++++++++++++++++++++++++++ 1 file changed, 99 insertions(+) create mode 100644 helm/gen3-external-secrets/README.md diff --git a/helm/gen3-external-secrets/README.md b/helm/gen3-external-secrets/README.md new file mode 100644 index 00000000..3201791d --- /dev/null +++ b/helm/gen3-external-secrets/README.md @@ -0,0 +1,99 @@ +# gen3-external-secrets + +![Version: 0.1.0](https://img.shields.io/badge/Version-0.1.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 1.16.0](https://img.shields.io/badge/AppVersion-1.16.0-informational?style=flat-square) + +A Helm chart for installing ClusterSecretStore and external secrets + +## Requirements + +| Repository | Name | Version | +|------------|------|---------| +| https://charts.external-secrets.io | external-secrets | 0.9.11 | + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| clusterSecretStore.enabled | bool | `true` | Whether the ClusterSecretStore should be created. | +| clusterSecretStore.name | string | `"gen3"` | Name of the cluster store | +| clusterSecretStore.provider.aws | map | `{"auth":{"jwt":{"serviceAccountRef":{"name":"external-secrets-sa","namespace":"external-secrets"}}},"region":"ap-southeast-2","service":"SecretsManager"}` | provider properties (defaulted to aws) | +| clusterSecretStore.provider.aws.auth.jwt | map | `{"serviceAccountRef":{"name":"external-secrets-sa","namespace":"external-secrets"}}` | Authentication method | +| clusterSecretStore.provider.aws.auth.jwt.serviceAccountRef | map | `{"name":"external-secrets-sa","namespace":"external-secrets"}` | Existing Iam role for the service account in the cluster | +| clusterSecretStore.provider.aws.region | string | `"ap-southeast-2"` | Cloud provider's region | +| clusterSecretStore.provider.aws.service | string | `"SecretsManager"` | Cloud provider's service | +| fence.fencecreds | map | `{"data":[{"remoteRef":{"key":"gen3-fence-creds"},"secretKey":"creds.json"}],"name":"gen3-fence-creds","namespace":"argocd","secretStoreRefKind":"ClusterSecretStore","secretStoreRefName":"gen3","targetName":"fence-creds"}` | Fence credentials configuration | +| fence.fencecreds.data | list | `[{"remoteRef":{"key":"gen3-fence-creds"},"secretKey":"creds.json"}]` | Data defines the connection between the Kubernetes Secret keys and the Provider data | +| fence.fencecreds.name | string | `"gen3-fence-creds"` | External Secrets name | +| fence.fencecreds.namespace | string | `"argocd"` | Namespace | +| fence.fencecreds.secretStoreRefKind | string | `"ClusterSecretStore"` | Cluster Secret Store type (SecretStore or ClusterSecretStore) | +| fence.fencecreds.secretStoreRefName | string | `"gen3"` | Cluster Secret Store name | +| fence.fencecreds.targetName | string | `"fence-creds"` | the target describes the secret that shall be created | +| postgresql | map | `{"arboristcreds":{"data":[{"remoteRef":{"key":"master-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"master-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"master-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"master-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-arborist","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-arborist","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-arborist","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-arborist","property":"dbcreated"},"secretKey":"dbcreated"}],"name":"gen3-postgres-arborist","secretStoreRefKind":"ClusterSecretStore","secretStoreRefName":"gen3","targetName":"arborist-dbcreds"},"auditcreds":{"data":[{"remoteRef":{"key":"master-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"master-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"master-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"master-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-audit","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-audit","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-audit","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-audit","property":"dbcreated"},"secretKey":"dbcreated"}],"name":"gen3-postgres-audit","secretStoreRefKind":"ClusterSecretStore","secretStoreRefName":"gen3","targetName":"audit-dbcreds"},"fencecreds":{"data":[{"remoteRef":{"key":"fence-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"fence-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"fence-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"fence-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-fence","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-fence","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-fence","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-fence","property":"dbcreated"},"secretKey":"dbcreated"}],"name":"gen3-postgres-fence","secretStoreRefKind":"ClusterSecretStore","secretStoreRefName":"gen3","targetName":"fence-dbcreds"},"indexdcreds":{"data":[{"remoteRef":{"key":"indexd-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"indexd-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"indexd-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"indexd-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-indexd","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-indexd","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-indexd","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-indexd","property":"dbcreated"},"secretKey":"dbcreated"}],"name":"gen3-postgres-indexd","secretStoreRefKind":"ClusterSecretStore","secretStoreRefName":"gen3","targetName":"indexd-dbcreds"},"mastercreds":{"data":[{"remoteRef":{"key":"master-dev-rds","property":"username"},"secretKey":"postgres-username"},{"remoteRef":{"key":"master-dev-rds","property":"password"},"secretKey":"postgres-password"},{"remoteRef":{"key":"master-dev-rds","property":"port"},"secretKey":"postgres-port"},{"remoteRef":{"key":"master-dev-rds","property":"host"},"secretKey":"postgres-host"}],"name":"gen3-postgres-master","secretStoreRefKind":"ClusterSecretStore","secretStoreRefName":"gen3","targetName":"postgresql-secret"},"metadatacreds":{"data":[{"remoteRef":{"key":"master-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"master-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"master-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"master-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-metadata","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-metadata","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-metadata","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-metadata","property":"dbcreated"},"secretKey":"dbcreated"}],"name":"gen3-postgres-metadata","secretStoreRefKind":"ClusterSecretStore","secretStoreRefName":"gen3","targetName":"metadata-dbcreds"},"namespace":"argocd","peregrinecreds":{"data":[{"remoteRef":{"key":"peregrine-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"peregrine-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"peregrine-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"peregrine-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-peregrine","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-peregrine","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-peregrine","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-peregrine","property":"dbcreated"},"secretKey":"dbcreated"}],"name":"gen3-postgres-peregrine","secretStoreRefKind":"ClusterSecretStore","secretStoreRefName":"gen3","targetName":"peregrine-dbcreds"},"requestorcreds":{"data":[{"remoteRef":{"key":"master-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"master-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"master-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"master-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-requestor","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-requestor","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-requestor","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-requestor","property":"dbcreated"},"secretKey":"dbcreated"}],"name":"gen3-postgres-requestor","secretStoreRefKind":"ClusterSecretStore","secretStoreRefName":"gen3","targetName":"requestor-dbcreds"},"sheepdogcreds":{"data":[{"remoteRef":{"key":"sheepdod-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"sheepdod-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"sheepdod-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"sheepdod-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-sheepdog","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-sheepdog","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-sheepdog","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-sheepdog","property":"dbcreated"},"secretKey":"dbcreated"}],"name":"gen3-postgres-sheepdog","secretStoreRefKind":"ClusterSecretStore","secretStoreRefName":"gen3","targetName":"sheepdog-dbcreds"},"wtscreds":{"data":[{"remoteRef":{"key":"master-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"master-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"master-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"master-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-wts","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-wts","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-wts","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-wts","property":"dbcreated"},"secretKey":"dbcreated"}],"name":"gen3-postgres-wts","secretStoreRefKind":"ClusterSecretStore","secretStoreRefName":"gen3","targetName":"wts-dbcreds"}}` | Postgres External Secrets | +| postgresql.arboristcreds | map | `{"data":[{"remoteRef":{"key":"master-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"master-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"master-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"master-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-arborist","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-arborist","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-arborist","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-arborist","property":"dbcreated"},"secretKey":"dbcreated"}],"name":"gen3-postgres-arborist","secretStoreRefKind":"ClusterSecretStore","secretStoreRefName":"gen3","targetName":"arborist-dbcreds"}` | Postgres credentials for Arborist service | +| postgresql.arboristcreds.data | list | `[{"remoteRef":{"key":"master-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"master-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"master-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"master-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-arborist","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-arborist","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-arborist","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-arborist","property":"dbcreated"},"secretKey":"dbcreated"}]` | Data defines the connection between the Kubernetes Secret keys and the Provider data | +| postgresql.arboristcreds.name | string | `"gen3-postgres-arborist"` | External Secrets name for Arborist db Creds | +| postgresql.arboristcreds.secretStoreRefKind | string | `"ClusterSecretStore"` | Cluster Secret Store type (SecretStore or ClusterSecretStore) | +| postgresql.arboristcreds.secretStoreRefName | string | `"gen3"` | Cluster Secret Store name | +| postgresql.arboristcreds.targetName | string | `"arborist-dbcreds"` | the target describes the secret that shall be created | +| postgresql.auditcreds | map | `{"data":[{"remoteRef":{"key":"master-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"master-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"master-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"master-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-audit","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-audit","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-audit","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-audit","property":"dbcreated"},"secretKey":"dbcreated"}],"name":"gen3-postgres-audit","secretStoreRefKind":"ClusterSecretStore","secretStoreRefName":"gen3","targetName":"audit-dbcreds"}` | Postgres credentials for Audit service | +| postgresql.auditcreds.data | list | `[{"remoteRef":{"key":"master-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"master-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"master-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"master-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-audit","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-audit","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-audit","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-audit","property":"dbcreated"},"secretKey":"dbcreated"}]` | Data defines the connection between the Kubernetes Secret keys and the Provider data | +| postgresql.auditcreds.name | string | `"gen3-postgres-audit"` | External Secrets name for Audit db Creds | +| postgresql.auditcreds.secretStoreRefKind | string | `"ClusterSecretStore"` | Cluster Secret Store type (SecretStore or ClusterSecretStore) | +| postgresql.auditcreds.secretStoreRefName | string | `"gen3"` | Cluster Secret Store name | +| postgresql.auditcreds.targetName | string | `"audit-dbcreds"` | the target describes the secret that shall be created | +| postgresql.fencecreds | map | `{"data":[{"remoteRef":{"key":"fence-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"fence-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"fence-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"fence-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-fence","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-fence","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-fence","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-fence","property":"dbcreated"},"secretKey":"dbcreated"}],"name":"gen3-postgres-fence","secretStoreRefKind":"ClusterSecretStore","secretStoreRefName":"gen3","targetName":"fence-dbcreds"}` | Credentials for fence Postgres instance | +| postgresql.fencecreds.data | list | `[{"remoteRef":{"key":"fence-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"fence-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"fence-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"fence-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-fence","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-fence","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-fence","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-fence","property":"dbcreated"},"secretKey":"dbcreated"}]` | Data defines the connection between the Kubernetes Secret keys and the Provider data | +| postgresql.fencecreds.data[0] | string | `{"remoteRef":{"key":"fence-dev-rds","property":"username"},"secretKey":"username"}` | Postgres admin username (e.g. postgres) | +| postgresql.fencecreds.data[1] | string | `{"remoteRef":{"key":"fence-dev-rds","property":"password"},"secretKey":"password"}` | Postgres admin password password | +| postgresql.fencecreds.data[2] | string | `{"remoteRef":{"key":"fence-dev-rds","property":"port"},"secretKey":"port"}` | Postgres port (e.g 5432) | +| postgresql.fencecreds.data[3] | string | `{"remoteRef":{"key":"fence-dev-rds","property":"host"},"secretKey":"host"}` | Postgres host (e.g. mydb.example.com) | +| postgresql.fencecreds.name | string | `"gen3-postgres-fence"` | External Secrets name for Fence Creds | +| postgresql.fencecreds.secretStoreRefKind | string | `"ClusterSecretStore"` | Cluster Secret Store type (SecretStore or ClusterSecretStore) | +| postgresql.fencecreds.secretStoreRefName | string | `"gen3"` | Cluster Secret Store name | +| postgresql.fencecreds.targetName | string | `"fence-dbcreds"` | the target describes the secret that shall be created | +| postgresql.indexdcreds | map | `{"data":[{"remoteRef":{"key":"indexd-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"indexd-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"indexd-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"indexd-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-indexd","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-indexd","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-indexd","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-indexd","property":"dbcreated"},"secretKey":"dbcreated"}],"name":"gen3-postgres-indexd","secretStoreRefKind":"ClusterSecretStore","secretStoreRefName":"gen3","targetName":"indexd-dbcreds"}` | Credentials for Indexd Postgres instance | +| postgresql.indexdcreds.data | list | `[{"remoteRef":{"key":"indexd-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"indexd-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"indexd-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"indexd-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-indexd","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-indexd","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-indexd","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-indexd","property":"dbcreated"},"secretKey":"dbcreated"}]` | Data defines the connection between the Kubernetes Secret keys and the Provider data | +| postgresql.indexdcreds.name | string | `"gen3-postgres-indexd"` | External Secrets name for Indexd Creds | +| postgresql.indexdcreds.secretStoreRefKind | string | `"ClusterSecretStore"` | Cluster Secret Store type (SecretStore or ClusterSecretStore) | +| postgresql.indexdcreds.secretStoreRefName | string | `"gen3"` | Cluster Secret Store name | +| postgresql.indexdcreds.targetName | string | `"indexd-dbcreds"` | the target describes the secret that shall be created | +| postgresql.mastercreds | map | `{"data":[{"remoteRef":{"key":"master-dev-rds","property":"username"},"secretKey":"postgres-username"},{"remoteRef":{"key":"master-dev-rds","property":"password"},"secretKey":"postgres-password"},{"remoteRef":{"key":"master-dev-rds","property":"port"},"secretKey":"postgres-port"},{"remoteRef":{"key":"master-dev-rds","property":"host"},"secretKey":"postgres-host"}],"name":"gen3-postgres-master","secretStoreRefKind":"ClusterSecretStore","secretStoreRefName":"gen3","targetName":"postgresql-secret"}` | Credentials for shared services Postgres Instance | +| postgresql.mastercreds.data | list | `[{"remoteRef":{"key":"master-dev-rds","property":"username"},"secretKey":"postgres-username"},{"remoteRef":{"key":"master-dev-rds","property":"password"},"secretKey":"postgres-password"},{"remoteRef":{"key":"master-dev-rds","property":"port"},"secretKey":"postgres-port"},{"remoteRef":{"key":"master-dev-rds","property":"host"},"secretKey":"postgres-host"}]` | Data defines the connection between the Kubernetes Secret keys and the Provider data | +| postgresql.mastercreds.name | string | `"gen3-postgres-master"` | External Secrets name | +| postgresql.mastercreds.secretStoreRefKind | string | `"ClusterSecretStore"` | Cluster Secret Store type (SecretStore or ClusterSecretStore) | +| postgresql.mastercreds.secretStoreRefName | string | `"gen3"` | Cluster Secret Store name | +| postgresql.mastercreds.targetName | string | `"postgresql-secret"` | the target describes the secret that shall be created | +| postgresql.metadatacreds | map | `{"data":[{"remoteRef":{"key":"master-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"master-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"master-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"master-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-metadata","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-metadata","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-metadata","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-metadata","property":"dbcreated"},"secretKey":"dbcreated"}],"name":"gen3-postgres-metadata","secretStoreRefKind":"ClusterSecretStore","secretStoreRefName":"gen3","targetName":"metadata-dbcreds"}` | Postgres credentials for metadata service | +| postgresql.metadatacreds.data | list | `[{"remoteRef":{"key":"master-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"master-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"master-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"master-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-metadata","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-metadata","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-metadata","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-metadata","property":"dbcreated"},"secretKey":"dbcreated"}]` | Data defines the connection between the Kubernetes Secret keys and the Provider data | +| postgresql.metadatacreds.name | string | `"gen3-postgres-metadata"` | External Secrets name for metadata db Creds | +| postgresql.metadatacreds.secretStoreRefKind | string | `"ClusterSecretStore"` | Cluster Secret Store type (SecretStore or ClusterSecretStore) | +| postgresql.metadatacreds.secretStoreRefName | string | `"gen3"` | Cluster Secret Store name | +| postgresql.metadatacreds.targetName | string | `"metadata-dbcreds"` | the target describes the secret that shall be created | +| postgresql.namespace | string | `"argocd"` | Namespace to create the External Secrets | +| postgresql.peregrinecreds | map | `{"data":[{"remoteRef":{"key":"peregrine-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"peregrine-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"peregrine-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"peregrine-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-peregrine","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-peregrine","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-peregrine","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-peregrine","property":"dbcreated"},"secretKey":"dbcreated"}],"name":"gen3-postgres-peregrine","secretStoreRefKind":"ClusterSecretStore","secretStoreRefName":"gen3","targetName":"peregrine-dbcreds"}` | Credentials for Peregrine Postgres instance | +| postgresql.peregrinecreds.data | list | `[{"remoteRef":{"key":"peregrine-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"peregrine-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"peregrine-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"peregrine-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-peregrine","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-peregrine","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-peregrine","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-peregrine","property":"dbcreated"},"secretKey":"dbcreated"}]` | Data defines the connection between the Kubernetes Secret keys and the Provider data | +| postgresql.peregrinecreds.name | string | `"gen3-postgres-peregrine"` | External Secrets name for Peregrine Creds | +| postgresql.peregrinecreds.secretStoreRefKind | string | `"ClusterSecretStore"` | Cluster Secret Store type (SecretStore or ClusterSecretStore) | +| postgresql.peregrinecreds.secretStoreRefName | string | `"gen3"` | Cluster Secret Store name | +| postgresql.peregrinecreds.targetName | string | `"peregrine-dbcreds"` | the target describes the secret that shall be created | +| postgresql.requestorcreds | map | `{"data":[{"remoteRef":{"key":"master-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"master-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"master-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"master-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-requestor","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-requestor","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-requestor","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-requestor","property":"dbcreated"},"secretKey":"dbcreated"}],"name":"gen3-postgres-requestor","secretStoreRefKind":"ClusterSecretStore","secretStoreRefName":"gen3","targetName":"requestor-dbcreds"}` | Postgres credentials for requestor service | +| postgresql.requestorcreds.data | list | `[{"remoteRef":{"key":"master-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"master-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"master-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"master-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-requestor","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-requestor","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-requestor","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-requestor","property":"dbcreated"},"secretKey":"dbcreated"}]` | Data defines the connection between the Kubernetes Secret keys and the Provider data | +| postgresql.requestorcreds.name | string | `"gen3-postgres-requestor"` | External Secrets name for requestor db Creds | +| postgresql.requestorcreds.secretStoreRefKind | string | `"ClusterSecretStore"` | Cluster Secret Store type (SecretStore or ClusterSecretStore) | +| postgresql.requestorcreds.secretStoreRefName | string | `"gen3"` | Cluster Secret Store name | +| postgresql.requestorcreds.targetName | string | `"requestor-dbcreds"` | the target describes the secret that shall be created | +| postgresql.sheepdogcreds | map | `{"data":[{"remoteRef":{"key":"sheepdod-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"sheepdod-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"sheepdod-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"sheepdod-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-sheepdog","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-sheepdog","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-sheepdog","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-sheepdog","property":"dbcreated"},"secretKey":"dbcreated"}],"name":"gen3-postgres-sheepdog","secretStoreRefKind":"ClusterSecretStore","secretStoreRefName":"gen3","targetName":"sheepdog-dbcreds"}` | Credentials for Sheepdog Postgres instance | +| postgresql.sheepdogcreds.data | list | `[{"remoteRef":{"key":"sheepdod-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"sheepdod-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"sheepdod-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"sheepdod-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-sheepdog","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-sheepdog","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-sheepdog","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-sheepdog","property":"dbcreated"},"secretKey":"dbcreated"}]` | Data defines the connection between the Kubernetes Secret keys and the Provider data | +| postgresql.sheepdogcreds.name | string | `"gen3-postgres-sheepdog"` | External Secrets name for Sheepdog db Creds | +| postgresql.sheepdogcreds.secretStoreRefKind | string | `"ClusterSecretStore"` | Cluster Secret Store type (SecretStore or ClusterSecretStore) | +| postgresql.sheepdogcreds.secretStoreRefName | string | `"gen3"` | Cluster Secret Store name | +| postgresql.sheepdogcreds.targetName | string | `"sheepdog-dbcreds"` | the target describes the secret that shall be created | +| postgresql.wtscreds | map | `{"data":[{"remoteRef":{"key":"master-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"master-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"master-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"master-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-wts","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-wts","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-wts","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-wts","property":"dbcreated"},"secretKey":"dbcreated"}],"name":"gen3-postgres-wts","secretStoreRefKind":"ClusterSecretStore","secretStoreRefName":"gen3","targetName":"wts-dbcreds"}` | Postgres credentials for wts service | +| postgresql.wtscreds.data | list | `[{"remoteRef":{"key":"master-dev-rds","property":"username"},"secretKey":"username"},{"remoteRef":{"key":"master-dev-rds","property":"password"},"secretKey":"password"},{"remoteRef":{"key":"master-dev-rds","property":"port"},"secretKey":"port"},{"remoteRef":{"key":"master-dev-rds","property":"host"},"secretKey":"host"},{"remoteRef":{"key":"dev-service-wts","property":"database"},"secretKey":"database"},{"remoteRef":{"key":"dev-service-wts","property":"serviceusername"},"secretKey":"serviceusername"},{"remoteRef":{"key":"dev-service-wts","property":"servicepassword"},"secretKey":"servicepassword"},{"remoteRef":{"key":"dev-service-wts","property":"dbcreated"},"secretKey":"dbcreated"}]` | Data defines the connection between the Kubernetes Secret keys and the Provider data | +| postgresql.wtscreds.name | string | `"gen3-postgres-wts"` | External Secrets name for WTS db Creds | +| postgresql.wtscreds.secretStoreRefKind | string | `"ClusterSecretStore"` | Cluster Secret Store type (SecretStore or ClusterSecretStore) | +| postgresql.wtscreds.secretStoreRefName | string | `"gen3"` | Cluster Secret Store name | +| postgresql.wtscreds.targetName | string | `"wts-dbcreds"` | the target describes the secret that shall be created | + +---------------------------------------------- +Autogenerated from chart metadata using [helm-docs v1.12.0](https://github.com/norwoodj/helm-docs/releases/v1.12.0)