jabray5
d45469acc7
operator functional and retrieves secrets from gitlab
2021-08-25 16:47:05 +02:00
jabray5
92f6077079
Added gitlab provider
2021-08-25 16:45:39 +02:00
zamysel
0dc8842b85
Merge branch 'main' into lockbox
2021-08-25 11:23:15 +03:00
Mouhsen Ibrahim
03f3622c2c
make auth key for GCPSM provider optional
2021-08-24 14:22:06 +02:00
Mouhsen Ibrahim
403a47c116
Add support for Google Cloud Identity
...
If the name of the service account secret is kept
empty, this means we want to use Google Cloud Identity
to authenticate against the GCP project
2021-08-23 22:28:24 +02:00
zamysel
c7229199f3
Add support for Yandex Lockbox: custom API endpoint
2021-08-20 16:16:35 +03:00
zamysel
42a3e2c457
Add support for Yandex Lockbox: docs
2021-08-19 17:33:36 +03:00
Arthur
c8315865a1
add immutable field on ExternalSecretTarget and on v1.Secret creation
...
Co-authored-by: mouhsen-ibrahim <mouhsen.ibrahim@gmail.com>
2021-08-18 19:55:10 -03:00
Kian
b030aed0a2
Merge remote-tracking branch 'origin/main' into oracle-provider
2021-08-18 14:41:30 +01:00
Kian
42d834aedf
Adding fixes to necessary files
2021-08-18 13:46:24 +01:00
Kian
3ae7015725
Setting up all necessary files for provider.
2021-08-18 13:42:12 +01:00
zamysel
6b2f852eb6
Add support for Yandex Lockbox: custom API endpoint
2021-08-17 20:13:13 +03:00
zamysel
7017935888
Add support for Yandex Lockbox
2021-08-12 20:05:02 +03:00
HenningE
328cf881b8
feat: add status printcolumn to ES CRD ( #318 )
2021-08-10 17:10:56 +02:00
Spiros Economakis
f1829f0445
Set the metric when is deleted to condition deleted and false ( #306 )
...
* Set the metric when is deleted to condition deleted and false
When a metrics is deleted metrics are still shown ready and condition true.
In practice this gives the wrong monitoring as the external secret in practice
is deleted.
Issue: #231
* Fix name and namespace for the metric of deletion
2021-08-07 23:40:26 +02:00
ric
2ab70cc510
Merge branch 'main' into mtls-auth
2021-07-26 09:43:56 +01:00
ric
44ef7756ef
refactoring to implement changes suggested in pull request 265 ,namely, 1) fetch client certificate and key as tls k8s secrets and 2) pass them directly to TLSClientConfig avoiding storing in disk
2021-07-21 22:30:49 +01:00
ric
4221c1b151
remove cacert from client Authentication. It's already in CABundle.
2021-07-20 14:44:58 +01:00
Moritz Johner
466938522c
feat(aws): add jwt authentication
2021-07-17 20:39:24 +02:00
ric
0edf4154da
merge with main
2021-07-14 14:26:04 +01:00
ric
7d2d83d695
update crds to inclue client and ca certs but not client private key
2021-07-14 12:59:04 +01:00
ric
73be01d492
most work done - missing unit tests and path do certs
2021-07-13 21:44:10 +01:00
Moritz Johner
59a851c941
feat(ctrl): implement creationPolicy=Merge/None
2021-07-12 18:45:44 +02:00
ric
fd53e76247
feat: ibm provider implementation
...
Co-authored-by: Sebastián Gómez <sebastiangomezcorrea@gmail.com>
Co-authored-by: Lucas Severo <lucassalves65@gmail.com>
Co-authored-by: Joey Brayshaw <joeybrayshaw@gmail.com>
Co-authored-by: Elsa Chelala <elsachelala@gmail.com>
Co-authored-by: choilmto <choilmto@gmail.com>
Co-authored-by: Adrian Mouat <adrian.mouat@gmail.com>
Co-authored-by: ricardoptcosta <ricardoptcosta@gmail.com>
Co-authored-by: Gabi Beyer <Gabrielle.Beyer@container-solutions.com>
Co-authored-by: Tomasz Tarczynski <ttarczynski@users.noreply.github.com>
Co-authored-by: Mircea Cosbuc <mircea.cosbuc@container-solutions.com>
2021-07-02 16:00:05 +02:00
paul-the-alien[bot]
04219ded4e
Merge pull request #222 from external-secrets/feat/template-from
...
implement templateFrom
2021-06-29 13:43:48 +00:00
Moritz Johner
73ca014cfb
feat: implement templateFrom
2021-06-28 21:29:09 +02:00
Moritz Johner
fb726dfb17
chore(docs): document es update behavior
2021-06-25 22:48:54 +02:00
Moritz Johner
5ac02ed2c4
feat: add synced resource version status
2021-06-25 21:23:29 +02:00
Nicolas Courbet
0e49b84f6d
Rebase on master, and rework unit tests
2021-06-02 17:14:58 +02:00
Ahmed MUSTAFA
4733427527
refactor vaultUrl and move it from External secrets to secret store
2021-06-02 17:04:50 +02:00
mjiao
fc95068034
Support azure kv as provider
2021-06-02 17:03:15 +02:00
1aziz
c3197051cb
add provider for gcp
2021-05-27 11:43:34 +02:00
Moritz Johner
e5d6e30d00
fix: template data should be string, fix update mechanics
2021-05-20 08:46:22 +02:00
xxxbobrxxx
f112d45aef
#150 Fix json fields names
2021-05-14 12:39:41 +03:00
xxxbobrxxx
c900c8deb5
#150 Fix JWT bugs
2021-05-14 09:40:13 +03:00
xxxbobrxxx
e4d8fb4046
#150 Implement LDAP and JWT/OIDC auth methods
2021-05-13 19:19:57 +03:00
xxxbobrxxx
704e7a785b
#150 Define data model for the Vault LDAP auth method
2021-05-13 18:02:04 +03:00
Moritz Johner
aaa6ad0ca8
fix: make vault version optional w/ defaults
...
fixes #117
2021-04-28 18:46:16 +02:00
Moritz Johner
8c8064e0e1
Draft: feat: implement template ( #69 )
...
* feat: implement template
2021-04-23 08:22:23 +02:00
Cameron McAvoy
f2d77e0324
Add service account selector to vault provider to look up the sa token
2021-04-19 13:26:29 -05:00
Kellin McAvoy
7be249ba63
Add vault provider implementation
2021-03-26 03:36:48 -05:00
Moritz Johner
640978ca9e
feat: awssm refactoring ( #57 )
...
* fix: refactor awssm provider
2021-03-10 11:43:25 +01:00
Moritz Johner
a017255464
fix: validate refresh interval, refresh externalsecret ( #48 )
...
* fix: refresh es
2021-03-05 23:58:08 +01:00
Moritz Johner
53cc579ee8
fix: ssm may respond with nil SecretString ( #41 )
...
also: support nested json keys like foo.bar
details here: https://github.com/tidwall/gjson
2021-02-26 09:11:16 +01:00
Moritz Johner
92be45df6a
add awssm support ( #34 )
...
* feat: add awssm
fixes #26
2021-02-24 20:01:28 +01:00
Moritz Johner
89c56c269f
feat: status conditions ( #25 )
...
* feat: implement es ready condition
Co-authored-by: Kellin <kellinmcavoy@gmail.com>
2021-02-15 21:51:38 +01:00
Moritz Johner
b460153452
chore: update crd-spec
...
see https://github.com/external-secrets/crd-spec/pull/3
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2021-02-06 13:10:00 +01:00
Lucas Severo Alves
3227e730f1
Change dir structure and adapt
2021-01-27 12:08:28 +01:00