Documentation
¶
Index ¶
- func JoinPath(base string, append ...string) string
- func Parse(gitClient *git.Client, files ...string) (trees []*tree.Tree, err error)
- func Read(monitor mntr.Monitor, gitClient *git.Client, secretFunc GetFunc, path string) (string, error)
- func Rewrite(monitor mntr.Monitor, gitClient *git.Client, secretFunc GetFunc, ...) error
- func Write(monitor mntr.Monitor, gitClient *git.Client, secretFunc GetFunc, ...) error
- type Existing
- type ExistingIDSecret
- type Func
- type GetFunc
- type Secret
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
Types ¶
type Existing ¶
type Existing struct {
//Name of the Secret
Name string `json:"name" yaml:"name"`
//Key in the secret from where the value should be used
Key string `json:"key" yaml:"key"`
//Name which should be used internal, should be unique for the volume and volumemounts
InternalName string `json:"internalName" yaml:"internalName"`
}
Existing: Used secret that has to be already existing in the cluster
type ExistingIDSecret ¶
type ExistingIDSecret struct {
//Name of the Secret
Name string `json:"name" yaml:"name"`
//Key in the secret which contains the ID
IDKey string `json:"idKey" yaml:"idKey"`
//Key in the secret which contains the secret
SecretKey string `json:"secretKey" yaml:"secretKey"`
//Name which should be used internal, should be unique for the volume and volumemounts
InternalName string `json:"internalName" yaml:"internalName"`
}
Existing: Used secret that has to be already existing in the cluster and should contain id/username and secret/password
type Secret ¶
type Secret struct {
//Used encryption for the secret
Encryption string
//Used encoding for the secret
Encoding string
//Value after encryption and encoding
Value string
Masterkey string `yaml:"-"`
}
Secret: Secret handled with orbctl so no manual changes are required
func ClearEmpty ¶
func (*Secret) MarshalYAML ¶
Click to show internal directories.
Click to hide internal directories.