Skip to content

[minor] add external-secrets operator ansible role with helm deployment#2256

Open
terc1997 wants to merge 4 commits into
masterfrom
mascore-13690
Open

[minor] add external-secrets operator ansible role with helm deployment#2256
terc1997 wants to merge 4 commits into
masterfrom
mascore-13690

Conversation

@terc1997
Copy link
Copy Markdown
Contributor

Description

Introduce the installation of the External Secrets Operator in our ansible-devops collection. Supports install and uninstalls

Test Results

  1. Install
  2. Re-installation to check idempotency
  3. Uninstall

⚠️ Notes for Reviewers

  • Ensure you have understood the PR guidelines in the Playbook before proceeding with a review.
  • Ensure all sections in the PR template are appropriately completed.

@terc1997 terc1997 requested a review from a team as a code owner May 19, 2026 16:25
Copy link
Copy Markdown
Contributor

@durera durera left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We need to see it working end-to-end with a generated secret containing content from our secrets-manager.

e.g. I added some code from the other branch for the clustersecretstore and ran a quick test and this is as far as I got:

oc -n default get externalsecret example-arbitrary-secret -o yaml
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
  annotations:
    kubectl.kubernetes.io/last-applied-configuration: |
      {"apiVersion":"external-secrets.io/v1","kind":"ExternalSecret","metadata":{"annotations":{},"name":"example-arbitrary-secret","namespace":"default"},"spec":{"data":[{"remoteRef":{"key":"ibmcloud-apikey"},"secretKey":"IBMCLOUD_APIKEY"}],"refreshInterval":"1h","secretStoreRef":{"kind":"ClusterSecretStore","name":"ibm-secrets-manager"},"target":{"creationPolicy":"Owner","name":"my-secrets"}}}
  creationTimestamp: "2026-05-23T11:20:30Z"
  finalizers:
  - externalsecrets.external-secrets.io/externalsecret-cleanup
  generation: 1
  name: example-arbitrary-secret
  namespace: default
  resourceVersion: "1065400"
  uid: 0d29efbb-063b-43dd-b0d6-db25a8c0bc94
spec:
  data:
  - remoteRef:
      conversionStrategy: Default
      decodingStrategy: None
      key: ibmcloud-apikey
      metadataPolicy: None
      nullBytePolicy: Ignore
    secretKey: IBMCLOUD_APIKEY
  refreshInterval: 1h
  secretStoreRef:
    kind: ClusterSecretStore
    name: ibm-secrets-manager
  target:
    creationPolicy: Owner
    deletionPolicy: Retain
    name: my-secrets
status:
  binding:
    name: ""
  conditions:
  - lastTransitionTime: "2026-05-23T11:20:30Z"
    message: could not get secret data from provider
    reason: SecretSyncedError
    status: "False"
    type: Ready
  refreshTime: null

We don't need the to to support creating the secrets itself (just the operator install + the store creation)

webhook:
replicaCount: 2
roles:
- ibm.mas_devops.external-secrets
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Various places where the role name is incorrect (- instead of _)


**Purpose**: Determines whether to install or uninstall the External Secrets Operator.

**When to use**:
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants