1
0
Fork 0
mirror of https://github.com/external-secrets/external-secrets.git synced 2024-12-14 11:57:59 +00:00
Commit graph

122 commits

Author SHA1 Message Date
Daniel Hix
324c7def06
feat: implement ClusterExternalSecret (#542)
Co-authored-by: Gustavo Fernandes de Carvalho <gusfcarvalho@gmail.com>
2022-03-20 09:32:27 +01:00
paul-the-alien[bot]
fb056cc9b5
Merge pull request #784 from external-secrets/feature/hashivault-getallsecrets
Implements Hashicorp Vault GetAllSecrets
2022-03-12 11:19:04 +00:00
Gustavo Carvalho
caf00a43aa Chore: bumping gitlab-go to 0.58.0
Signed-off-by: Gustavo Carvalho <gusfcarvalho@gmail.com>
2022-03-10 08:46:17 -03:00
Gustavo Carvalho
94d68f6a18 Adding EngineVersion=v1 to GCP e2e tests
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-03-09 14:42:41 -03:00
Gustavo Carvalho
10c3ba355d Changes e2e test default api to v1beta1. Adds GetAllSecrets test
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-03-09 13:43:37 -03:00
Gustavo Carvalho
40ec693479 Merge branch 'main' into feature/conversion-webhook
Fixed conflicts and implemented necessary changes for v1beta1
2022-02-16 16:00:32 -03:00
Gustavo Carvalho
2e6017dd4b Using cobra commands instead of several binaries
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-15 08:52:52 -03:00
Gustavo Carvalho
23eb831571 Fixing cert-controller image tag
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-13 19:08:30 -03:00
Gustavo Carvalho
0db78819bb Fixing lints and adding correct image names in eso.go
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-13 16:37:32 -03:00
Gustavo Carvalho
3c167edd4b Fixing some helm linting and an error on e2e Makefile
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-13 16:05:34 -03:00
Gustavo Carvalho
c40aebdfba Adding variables to configure versions of webhook and certcontroller
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-13 15:59:18 -03:00
Gustavo Carvalho
bbedad6053 WIP: improve deployment manifests to be on a functional state
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-13 15:53:40 -03:00
Moritz Johner
a627e82639 chore: fix smells
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-02-11 08:26:32 +01:00
Moritz Johner
54e68399ec feat: implement template engine v2
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-02-11 08:26:31 +01:00
paul-the-alien[bot]
027f28ec97
Merge pull request #700 from EladGabay/elad/oci-secret-by-name
oracle vault: Use instance principal if auth is empty
2022-02-10 10:34:40 +00:00
Moritz Johner
5b8ab034ec feat(vault): marshal nested value as json, add docs
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
Co-authored-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-08 08:05:10 +01:00
Elad Gabay
fe416890b1 oracle vault: Use instance principal if auth is empty
Currently the oracle vault's secretstore uses a specific user credentials.
This commit introduce a new way to access the vault, using the instance principal.

All user's details moved to "auth" section in the OracleProvider which now is optional.
If "auth" is empty, by default, we use the instance principal, otherwise if specified user's auth details, we use them.

In addition:
- Fixed the fingerprint secret reference which until now used the privatekey secret instead of its reference.
- Bump OCI SDK version.
2022-02-07 18:38:10 +02:00
Lucas Severo Alves
5a464df585
Revert "GetAllSecrets CRD and Azure implementation" 2022-02-01 16:52:18 +01:00
paul-the-alien[bot]
ca0cda7c16
Merge pull request #613 from external-secrets/getall-Secrets
GetAllSecrets CRD and Azure implementation
2022-02-01 13:18:20 +00:00
paul-the-alien[bot]
b54b8c7588
Merge pull request #653 from external-secrets/chore/update-k8s
chore: update k8s / envtest
2022-01-29 16:25:32 +00:00
Moritz Johner
d651f689e7 feat(e2e): add tests for type=cert and type=key
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-01-28 20:24:37 +01:00
Moritz Johner
e015bed08d chore: update k8s / envtest 2022-01-28 19:51:07 +01:00
Sebastian Gomez
43e4eb320a Merge branch 'main' into getall-Secrets 2022-01-27 16:44:29 -05:00
Moritz Johner
64589cddda chore: implement aws parameterstore e2e tests
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-01-27 08:36:45 +01:00
Sebastian Gomez
dd23a813d6 Merge branch 'main' into getall-Secrets 2022-01-26 12:35:35 -05:00
Sebastian Gomez
48ac7b991f Created new struct for dataFrom 2022-01-25 16:01:33 -05:00
Moritz Johner
5d396e1351 chore: test e2e-managed
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-01-25 08:04:17 +01:00
Sebastian Gomez
d607eb60df main conflict resolution 2022-01-24 16:52:20 -05:00
Sebastian Gomez
0cc03caae4 Fixed lint issues 2022-01-24 16:17:18 -05:00
Moritz Johner
759d241cd9 chore: test e2e
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-01-24 21:28:37 +01:00
Moritz Johner
ea5689a945 chore: test e2e
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-01-24 20:23:33 +01:00
Moritz Johner
008268ee00 feat(e2e): implement aws tests, enhance gcp tests
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-01-21 23:37:50 +01:00
Moritz Johner
e392839e43 fix(e2e): use correct auth compsition 2022-01-14 20:37:02 +01:00
paul-the-alien[bot]
4c6b6a1e84
Merge pull request #525 from HanseMerkur/vault_optional_path
Optional path for Vault SecretStore
2022-01-14 19:33:29 +00:00
paul-the-alien[bot]
6acb8852b5
Merge pull request #469 from external-secrets/chore/specific_e2e_setup
Initial setup for wi gcp testing
2022-01-14 19:27:54 +00:00
Lucas Severo Alves
e88ec163e0 Add a methods for gcp and aws prep
Signed-off-by: Lucas Severo Alves <lucassalves65@gmail.com>
2022-01-14 20:15:30 +01:00
Moritz Johner
73472be795
fix: try to fix cluster location 2022-01-12 23:43:45 +01:00
Lennart Weller
23c859eaf9 Pull changes from linter 2022-01-10 10:12:17 +01:00
Lennart Weller
0d06247163 Made SecretStore path for Vault optional
* Backwards compatible change
  * Added tests to check for a range of possible combinations for paths
2022-01-10 10:12:17 +01:00
Brent Spector
f76188026d proposed fix for JWT tests 2022-01-07 13:09:22 -08:00
Lucas Severo Alves
ae6cadf70c Use ClusterSecretStore so we set namespace of SA 2021-12-31 11:26:14 +01:00
Lucas Severo Alves
25763fde81 e2e testing for gcp Workload Identity 2021-12-30 22:08:00 +01:00
Hao Xin
9b9d2d1a33 chore: fix git ignore 2021-12-27 11:13:03 +08:00
Moritz Johner
9c7abdfdac chore: update go to 1.17 2021-12-17 12:23:57 +01:00
Moritz Johner
80fac0f697 feat: add gcp workload identity via SA
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2021-12-17 12:20:12 +01:00
Lucas Severo Alves
8a99845d70 chore: replace alpine by distroless 2021-12-06 14:17:24 +01:00
Lucas Severo Alves
2c07e7d49a
Merge pull request #475 from renanaAkeyless/main
Add Akeyless provider
2021-11-16 13:09:20 +01:00
Lucas Severo Alves
d112e6c67a Bump jwt module 2021-11-11 14:45:31 +01:00
renanaAkeyless
5d400f4a43
Merge branch 'external-secrets:main' into main 2021-11-10 17:18:51 +02:00
renanaAkeyless
91a34bbbc6 PR Suggested change 2021-11-10 15:57:37 +02:00