This repository was archived by the owner on Jul 26, 2022. It is now read-only.
File tree 3 files changed +26
-0
lines changed
charts/kubernetes-external-secrets
3 files changed +26
-0
lines changed Original file line number Diff line number Diff line change @@ -79,6 +79,12 @@ Access to AWS secrets backends (SSM & secrets manager) can be granted in various
79
79
80
80
4 . Directly provide AWS access credentials to the ` kubernetes-external-secrets ` pod by environmental variables.
81
81
82
+ 5 . Optionally configure custom endpoints using environment variables
83
+ * [ AWS_SM_ENDPOINT] ( https://docs.aws.amazon.com/general/latest/gr/asm.html ) - Useful to set endpoints for FIPS compliance.
84
+ * [ AWS_STS_ENDPOINT] ( https://docs.aws.amazon.com/general/latest/gr/sts.html ) - Useful to set endpoints for FIPS compliance or regional latency.
85
+ * [ AWS_SSM_ENDPOINT] ( https://docs.aws.amazon.com/general/latest/gr/ssm.html ) - Useful to set endpoints for FIPS compliance or custom VPC endpoint.
86
+
87
+
82
88
##### Using AWS access credentials
83
89
84
90
Set AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY env vars in the ` kubernetes-external-secrets ` session/pod.
Original file line number Diff line number Diff line change 26
26
# Set a role to be used when assuming roles specified in external secret (AWS only)
27
27
# AWS_INTERMEDIATE_ROLE_ARN:
28
28
# GOOGLE_APPLICATION_CREDENTIALS: /app/gcp-creds/gcp-creds.json
29
+ # Use custom endpoints for FIPS compliance
30
+ # AWS_STS_ENDPOINT: https://sts-fips.us-east-1.amazonaws.com
31
+ # AWS_SSM_ENDPOINT: http://ssm-fips.us-east-1.amazonaws.com
32
+ # AWS_SM_ENDPOINT: http://secretsmanager-fips.us-east-1.amazonaws.com
29
33
30
34
# Create environment variables from existing k8s secrets
31
35
# envVarsFromSecret:
Original file line number Diff line number Diff line change @@ -18,13 +18,29 @@ const localstack = process.env.LOCALSTACK || 0
18
18
19
19
const intermediateRole = process . env . AWS_INTERMEDIATE_ROLE_ARN || 0
20
20
21
+ const stsEndpoint = process . env . AWS_STS_ENDPOINT || 0
22
+ const ssmEndpoint = process . env . AWS_SSM_ENDPOINT || 0
23
+ const smEndpoint = process . env . AWS_SM_ENDPOINT || 0
24
+
21
25
let secretsManagerConfig = { }
22
26
let systemManagerConfig = { }
23
27
let stsConfig = {
24
28
region : process . env . AWS_REGION || 'us-west-2' ,
25
29
stsRegionalEndpoints : process . env . AWS_STS_ENDPOINT_TYPE || 'regional'
26
30
}
27
31
32
+ if ( smEndpoint ) {
33
+ secretsManagerConfig . endpoint = smEndpoint
34
+ }
35
+
36
+ if ( ssmEndpoint ) {
37
+ systemManagerConfig . endpoint = ssmEndpoint
38
+ }
39
+
40
+ if ( stsEndpoint ) {
41
+ stsConfig . endpoint = stsEndpoint
42
+ }
43
+
28
44
if ( localstack ) {
29
45
secretsManagerConfig = {
30
46
endpoint : process . env . LOCALSTACK_SM_URL || 'http://localhost:4584' ,
You can’t perform that action at this time.
0 commit comments