#secret #pass #kubernetes #password #yaml #kustomize

app kustomize-pass

kustomize generator and transformer plugin for pass managed secrets

7 unstable releases (3 breaking)

0.5.1 Jun 30, 2022
0.5.0 Jun 30, 2022
0.4.0 Jun 28, 2022
0.3.1 Jun 28, 2022
0.2.11 Jun 24, 2022

#625 in Configuration

Download history 23/week @ 2024-02-21 14/week @ 2024-02-28 1/week @ 2024-03-13 27/week @ 2024-03-27 57/week @ 2024-04-03

84 downloads per month

MIT and LGPL-2.1

41KB
662 lines

kustomize-pass

crates.io Badge Maintenance Status Badge

A kustomize plugin that is able to generate secrets by extracting them from pass or replace placeholders in other manifests from pass.

Installation

For installation, this package depends on gpgme-rs which requires the gpgme library and its development files (e.g., headers, gpgme-config) to be installed during the build process. You should install these using your operating systems package manager.

Afterwards, you can install the package either using one of the provided binaries from the releases page or compile and install it yourself by running

cargo install kustomize-pass

Usage

Once kustomize-pass is installed, you can use the generator by providing kustomize with the following example resource manifests.

A detailed description of the supported input manifest is provided in openapi format in the schema.openapi.yaml. It can also be generated and printed on-demand by the application.

# generator.yml
apiVersion: ftsell.de/v1beta1
kind: PassSecret
metadata:
  name: example-secret
  annotations:
    config.kubernetes.io/function: |
      exec:
        path: kustomize-pass
data:
  example-key: example-pass-name
# kustomization.yml
apiVersion: kustomize.config.k8s.io/v1beta1
generators:
  - generator.yml

When running the shown example and if you have a password named example-pass-name in your password store, the following resulting resource will be produced:

apiVersion: v1
kind: Secret
metadata:
  name: example-secret
data:
  example-key: foobar123

Dependencies

~18–29MB
~489K SLoC