You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: deploy/helm/secret-operator/crds/crds.yaml
+8-8Lines changed: 8 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -22,10 +22,10 @@ spec:
22
22
description: Auto-generated derived type for SecretClassSpec via `CustomResource`
23
23
properties:
24
24
spec:
25
-
description: A [SecretClass](https://docs.stackable.tech/home/nightly/secret-operator/secretclass) is a cluster-global Kubernetes resource that defines a category of secrets that the Secret Operator knows how to provision.
25
+
description: A [SecretClass](https://docs.stackable.tech/home/25.7/secret-operator/secretclass) is a cluster-global Kubernetes resource that defines a category of secrets that the Secret Operator knows how to provision.
26
26
properties:
27
27
backend:
28
-
description: Each SecretClass is associated with a single [backend](https://docs.stackable.tech/home/nightly/secret-operator/secretclass#backend), which dictates the mechanism for issuing that kind of Secret.
28
+
description: Each SecretClass is associated with a single [backend](https://docs.stackable.tech/home/25.7/secret-operator/secretclass#backend), which dictates the mechanism for issuing that kind of Secret.
29
29
oneOf:
30
30
- required:
31
31
- k8sSearch
@@ -38,7 +38,7 @@ spec:
38
38
properties:
39
39
autoTls:
40
40
description: |-
41
-
The [`autoTls` backend](https://docs.stackable.tech/home/nightly/secret-operator/secretclass#backend-autotls) issues a TLS certificate signed by the Secret Operator. The certificate authority can be provided by the administrator, or managed automatically by the Secret Operator.
41
+
The [`autoTls` backend](https://docs.stackable.tech/home/25.7/secret-operator/secretclass#backend-autotls) issues a TLS certificate signed by the Secret Operator. The certificate authority can be provided by the administrator, or managed automatically by the Secret Operator.
42
42
43
43
A new certificate and key pair will be generated and signed for each Pod, keys or certificates are never reused.
44
44
properties:
@@ -147,7 +147,7 @@ spec:
147
147
148
148
A new certificate will be requested the first time it is used by a Pod, it will be reused after that (subject to cert-manager renewal rules).
description: The [`k8sSearch` backend](https://docs.stackable.tech/home/nightly/secret-operator/secretclass#backend-k8ssearch) can be used to mount Secrets across namespaces into Pods.
204
+
description: The [`k8sSearch` backend](https://docs.stackable.tech/home/25.7/secret-operator/secretclass#backend-k8ssearch) can be used to mount Secrets across namespaces into Pods.
205
205
properties:
206
206
searchNamespace:
207
207
description: Configures the namespace searched for Secret objects.
@@ -231,7 +231,7 @@ spec:
231
231
- searchNamespace
232
232
type: object
233
233
kerberosKeytab:
234
-
description: The [`kerberosKeytab` backend](https://docs.stackable.tech/home/nightly/secret-operator/secretclass#backend-kerberoskeytab) creates a Kerberos keytab file for a selected realm. The Kerberos KDC and administrator credentials must be provided by the administrator.
234
+
description: The [`kerberosKeytab` backend](https://docs.stackable.tech/home/25.7/secret-operator/secretclass#backend-kerberoskeytab) creates a Kerberos keytab file for a selected realm. The Kerberos KDC and administrator credentials must be provided by the administrator.
A [TrustStore](https://docs.stackable.tech/home/nightly/secret-operator/truststore) requests information about how to validate secrets issued by a [SecretClass](https://docs.stackable.tech/home/nightly/secret-operator/secretclass).
383
+
A [TrustStore](https://docs.stackable.tech/home/25.7/secret-operator/truststore) requests information about how to validate secrets issued by a [SecretClass](https://docs.stackable.tech/home/25.7/secret-operator/secretclass).
384
384
385
385
The requested information is written to a ConfigMap with the same name as the TrustStore.
386
386
properties:
387
387
format:
388
-
description: The [format](https://docs.stackable.tech/home/nightly/secret-operator/secretclass#format) that the data should be converted into.
388
+
description: The [format](https://docs.stackable.tech/home/25.7/secret-operator/secretclass#format) that the data should be converted into.
0 commit comments