secret-service-operator

evan.jarrett.net / secret-service-operator

Create Service Endpoints based on Secrets

Pull this chart

helm pull oci://atcr.io/evan.jarrett.net/secret-service-operator --version 0.3.1

Overview

secret-service-operator 😎

Create Service Endpoints based on Secrets

Description

This is designed to be used in tandom with a secrets manager.
It allows you to specify an endpoint IP and port via a secret, and convert that into a service endpoint.

Getting Started

Prerequisites

  • go version v1.22.0+
  • docker version 17.03+.
  • kubectl version v1.11.3+.
  • Access to a Kubernetes v1.11.3+ cluster.

To Deploy on the cluster

Build and push your image to the location specified by IMG:

make docker-build docker-push IMG=<some-registry>/secret-service-operator:tag

NOTE: This image ought to be published in the personal registry you specified.
And it is required to have access to pull the image from the working environment.
Make sure you have the proper permission to the registry if the above commands don’t work.

Install the CRDs into the cluster:

make install

Deploy the Manager to the cluster with the image specified by IMG:

make deploy IMG=<some-registry>/secret-service-operator:tag

NOTE: If you encounter RBAC errors, you may need to grant yourself cluster-admin
privileges or be logged in as admin.

Create instances of your solution
You can apply the samples (examples) from the config/sample:

kubectl apply -k config/samples/

NOTE: Ensure that the samples has default values to test it out.

To Uninstall

Delete the instances (CRs) from the cluster:

kubectl delete -k config/samples/

Delete the APIs(CRDs) from the cluster:

make uninstall

UnDeploy the controller from the cluster:

make undeploy

Project Distribution

Following are the steps to build the installer and distribute this project to users.

  1. Build the installer for the image built and published in the registry:
make build-installer IMG=<some-registry>/secret-service-operator:tag

NOTE: The makefile target mentioned above generates an ‘install.yaml’
file in the dist directory. This file contains all the resources built
with Kustomize, which are necessary to install this project without
its dependencies.

  1. Using the installer

Users can just run kubectl apply -f to install the project, i.e.:

kubectl apply -f https://raw.githubusercontent.com/<org>/secret-service-operator/<tag or branch>/dist/install.yaml

Contributing

// TODO(user): Add detailed information on how you would like others to contribute to this project

NOTE: Run make help for more information on all potential make targets

More information can be found via the Kubebuilder Documentation

License

Copyright 2025.

Licensed under the Apache License, Version 2.0 (the “License”);
you may not use this file except in compliance with the License.
You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an “AS IS” BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.

Tags

0.3.1 Helm chart
sha256:8f43ff42177c5c2ce1408aadd8551076ed313022ffb956b01b3d7cd620e76363
helm pull oci://atcr.io/evan.jarrett.net/secret-service-operator --version 0.3.1
0.3.0 Helm chart
sha256:9d97c829d17649c8f22853d73c22d8ab534a4b4c4e5eeda61b6719c268775fbe
helm pull oci://atcr.io/evan.jarrett.net/secret-service-operator --version 0.3.0
latest Multi-arch
sha256:32e0557753abfbcb2ff8c7b654af35a25b197c84c9e1a91d6ddda1e29205ad7c
linux/amd64 linux/arm64
docker pull atcr.io/evan.jarrett.net/secret-service-operator:latest
latest-linux-arm64
sha256:99e282ec2639504bd734f94f6958f785a99292a9fbeb3f8170442114f8471a62
docker pull atcr.io/evan.jarrett.net/secret-service-operator:latest-linux-arm64
latest-linux-amd64
sha256:8bb7f653dcd5acd6819279835387077be242ad3782fbdb36b9d9e4c3110b6cdd
docker pull atcr.io/evan.jarrett.net/secret-service-operator:latest-linux-amd64

Manifests

Helm Chart
sha256:8f43ff42177c5c2ce1408aadd8551076ed313022ffb956b01b3d7cd620e76363
Tags: 0.3.1
Helm Chart
sha256:9d97c829d17649c8f22853d73c22d8ab534a4b4c4e5eeda61b6719c268775fbe
Tags: 0.3.0
Image
sha256:99e282ec2639504bd734f94f6958f785a99292a9fbeb3f8170442114f8471a62
Tags: latest-linux-arm64
Image
sha256:8bb7f653dcd5acd6819279835387077be242ad3782fbdb36b9d9e4c3110b6cdd
Tags: latest-linux-amd64
Multi-arch
sha256:32e0557753abfbcb2ff8c7b654af35a25b197c84c9e1a91d6ddda1e29205ad7c
Tags: latest
linux/amd64 linux/arm64