diff --git a/examples/install.yaml b/examples/install.yaml new file mode 100644 index 0000000..d112112 --- /dev/null +++ b/examples/install.yaml @@ -0,0 +1,6 @@ +apiVersion: pkg.crossplane.io/v1 +kind: Provider +metadata: + name: provider-opensearch +spec: + package: tages/provider-opensearch:v0.1.0 diff --git a/examples/providerconfig/.gitignore b/examples/providerconfig/.gitignore new file mode 100644 index 0000000..4a424df --- /dev/null +++ b/examples/providerconfig/.gitignore @@ -0,0 +1 @@ +secret.yaml diff --git a/examples/providerconfig/providerconfig.yaml b/examples/providerconfig/providerconfig.yaml new file mode 100644 index 0000000..0e0056a --- /dev/null +++ b/examples/providerconfig/providerconfig.yaml @@ -0,0 +1,11 @@ +apiVersion: opensearch.upbound.io/v1beta1 +kind: ProviderConfig +metadata: + name: default +spec: + credentials: + source: Secret + secretRef: + name: example-creds + namespace: crossplane-system + key: credentials diff --git a/examples/providerconfig/secret.yaml.tmpl b/examples/providerconfig/secret.yaml.tmpl new file mode 100644 index 0000000..029ade8 --- /dev/null +++ b/examples/providerconfig/secret.yaml.tmpl @@ -0,0 +1,34 @@ +apiVersion: v1 +kind: Secret +metadata: + name: example-creds + namespace: crossplane-system +type: Opaque +stringData: + credentials: | + { + "url": "http://127.0.0.1:9200" + "aws_access_key": "", + "aws_assume_role_arn": "", + "aws_assume_role_external_id": "", + "aws_profile": "", + "aws_region": "", + "aws_secret_key": "", + "aws_signature_service": "", + "aws_token": "", + "cacert_file": "", + "client_cert_path": "", + "client_key_path": "", + "healthcheck": true, + "host_override": "", + "insecure": false, + "opensearch_version": "", + "password": "t0ps3cr3t11" + "proxy": "", + "sign_aws_requests": false, + "sniff": false, + "token": "", + "token_name": "", + "username": "admin", + "version_ping_timeout": 30 + } diff --git a/examples/storeconfig/vault.yaml b/examples/storeconfig/vault.yaml new file mode 100644 index 0000000..339c512 --- /dev/null +++ b/examples/storeconfig/vault.yaml @@ -0,0 +1,19 @@ +apiVersion: opensearch.upbound.io/v1alpha1 +kind: StoreConfig +metadata: + name: vault +spec: + type: Vault + defaultScope: crossplane-system + vault: + server: http://vault.vault-system:8200 + mountPath: kv2/ + version: v2 + auth: + method: Token + token: + source: Secret + secretRef: + namespace: crossplane-system + name: vault-token + key: token \ No newline at end of file