Moritz Johner
5b8ab034ec
feat(vault): marshal nested value as json, add docs
...
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
Co-authored-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-08 08:05:10 +01:00
Elad Gabay
fe416890b1
oracle vault: Use instance principal if auth is empty
...
Currently the oracle vault's secretstore uses a specific user credentials.
This commit introduce a new way to access the vault, using the instance principal.
All user's details moved to "auth" section in the OracleProvider which now is optional.
If "auth" is empty, by default, we use the instance principal, otherwise if specified user's auth details, we use them.
In addition:
- Fixed the fingerprint secret reference which until now used the privatekey secret instead of its reference.
- Bump OCI SDK version.
2022-02-07 18:38:10 +02:00
Lucas Severo Alves
6630ab7494
Initial draft of reporter ( #466 )
...
* Initial draft of reporter
* Test out reporter in AWS provider
* trying out different events approach
* feat: implement store reconciler and events
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
* feat: add validate() method to provider interface
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
* fix: use static requeue interval in store ctrl
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
Co-authored-by: Mircea Cosbuc <mircea.cosbuc@container-solutions.com>
Co-authored-by: Moritz Johner <beller.moritz@googlemail.com>
2022-02-07 11:42:18 +01:00
Moritz Johner
2ac4053648
feat(vault): allow using nested json
...
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-02-05 22:11:41 +01:00
Moritz Johner
fe1cb8bc69
feat(provider): implement fake provider
...
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-02-01 11:18:43 +01:00
Moritz Johner
e015bed08d
chore: update k8s / envtest
2022-01-28 19:51:07 +01:00
paul-the-alien[bot]
6f4c03a75d
Merge pull request #645 from external-secrets/fix/delete-secret-using-tpl
...
fix: ensure that data is being deleted when using tpl
2022-01-27 14:49:00 +00:00
Jeroen Op 't Eynde
83afebe9b3
fix(metrics): ensure status_condition metrics reflect the status ( #612 )
...
* fix(metrics): ensure status_condition metrics reflect the status
* lint fixes
* fix(metrics): remove condition=deleted metric (+lint fixes)
2022-01-27 14:26:09 +01:00
Moritz Johner
e2701fa35a
fix: ensure that data is being deleted when using tpl
2022-01-26 20:14:59 +01:00
rodrmartinez
cbd350fef6
Adds lockbox again to register
2022-01-26 15:41:09 -03:00
rodrmartinez
5a766c1995
Adds GetSecret and GetSecretMaps methods
2022-01-26 15:29:14 -03:00
rodrmartinez
8620174449
Adds kubernetes provider to register
2022-01-26 15:28:37 -03:00
paul-the-alien[bot]
5a8df8cb18
Merge pull request #642 from external-secrets/fix/webhook-test-race
...
fix: webhook test race
2022-01-26 18:14:48 +00:00
rodrmartinez
1c5ce19a20
Adds Kubernetes Provider
2022-01-25 17:14:48 -03:00
Moritz Johner
edb2c290f4
fix(gcp): use gax-go v2 package
...
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-01-25 21:09:33 +01:00
Moritz Johner
ce6f5b1653
fix: webhook test race
2022-01-25 20:45:45 +01:00
paul-the-alien[bot]
0b9c142a22
Merge pull request #618 from external-secrets/feature/aws-e2e-managed
...
feat(e2e): implement aws tests, enhance gcp tests
2022-01-24 10:46:02 +00:00
Moritz Johner
008268ee00
feat(e2e): implement aws tests, enhance gcp tests
...
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-01-21 23:37:50 +01:00
Marc Ingram
07415bdabf
improve test?
2022-01-21 14:01:45 -07:00
Marc Ingram
e93a1716f5
fix format and lint
2022-01-21 13:36:41 -07:00
Marc Ingram
705ffbbd95
Optimise patching so as changes only happen with something changes
2022-01-21 12:36:05 -07:00
Marc Billow
01355b7653
Formatting and linting fixes
2022-01-19 16:28:23 -06:00
Marc Billow
0753da1cbd
Support for eventual consistency in Vault Enterprise
2022-01-19 16:25:01 -06:00
Lucas Severo Alves
16948ed572
Merge pull request #596 from EladGabay/elad/oci-secret-by-name
...
OCI Vault: Get secret by name from a specific Vault
2022-01-16 17:20:46 +00:00
Elad Gabay
dbedbedb96
make fmt
2022-01-16 13:30:21 +02:00
Lucas Severo Alves
2bacd30313
Merge pull request #569 from rodrmartinez/oci-patch
...
Replace vaults with secrets package to retrieve secrets
2022-01-16 11:13:50 +00:00
Elad Gabay
cab49e57f7
oracle: Get secret by name from a specific vault
2022-01-16 13:11:46 +02:00
Moritz Johner
27854adaa5
fix: force ownership when merging secrets
...
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-01-14 22:27:27 +01:00
paul-the-alien[bot]
4c6b6a1e84
Merge pull request #525 from HanseMerkur/vault_optional_path
...
Optional path for Vault SecretStore
2022-01-14 19:33:29 +00:00
rodmartinez
90abbdf642
remove byte conversion and add return error
2022-01-14 13:46:16 -03:00
rodmartinez
721086d520
encode apiOutput content
2022-01-14 12:59:59 -03:00
rodmartinez
4373bb2775
Decode base64 payoload
2022-01-14 12:59:59 -03:00
rodmartinez
b962666b1c
Remove unused constant, errInvalidSecret
2022-01-14 12:59:59 -03:00
rodmartinez
60454a4760
refactor apiOutput on TestGetSecretMap
2022-01-14 12:59:59 -03:00
rodmartinez
9f98cabe63
complete apiOutput
2022-01-14 12:59:59 -03:00
rodmartinez
a1f78cbae1
replace vault with secrets pkg
2022-01-14 12:59:59 -03:00
rodmartinez
9b4e9a919d
replace vault with secrets in fake package
2022-01-14 12:59:59 -03:00
rodmartinez
c8c67258c2
Replace OCI vault with secrets package
2022-01-14 12:59:59 -03:00
Sebastian Gomez
6f8a4c4a35
Removed duplicated code
2022-01-13 12:43:42 -05:00
Lennart Weller
015b35add2
Linter wasn't happy. Again
2022-01-13 18:40:23 +01:00
Sebastian Gomez
8784bfc5ba
Fixed lint issues
2022-01-13 12:13:33 -05:00
Sebastian Gomez
119d4b809b
Merge branch 'main' into akv-table-tests
2022-01-13 10:45:48 -05:00
Sebastian Gomez
d75fcb9269
Fixed some lint issues
2022-01-12 15:29:57 -05:00
Sebastian Gomez
385caa156f
Table driven test with anonymous functions implemented.
...
The NewClient tests were kept as they were.
2022-01-12 14:33:38 -05:00
paul-the-alien[bot]
44d4cf061b
Merge pull request #559 from willemm/feat/generic_webhook
...
Add generic webhook provider
2022-01-11 15:50:05 +00:00
Willem Monsuwe
00558e1dd5
Moved http client initialization to NewClient
2022-01-11 11:09:12 +01:00
Willem M
7160cab0b8
Use MethodGet field instead of hardcoded string literal
...
Co-authored-by: Moritz Johner <moolen@users.noreply.github.com>
2022-01-11 00:02:32 +01:00
Lennart Weller
23c859eaf9
Pull changes from linter
2022-01-10 10:12:17 +01:00
Lennart Weller
0d06247163
Made SecretStore path for Vault optional
...
* Backwards compatible change
* Added tests to check for a range of possible combinations for paths
2022-01-10 10:12:17 +01:00
Brent Spector
26f9be4fb1
add path to jwt vault auth
2022-01-05 15:22:00 -08:00
Brent Spector
561bd3ae56
Add support for mount path in ldap auth
2022-01-05 14:54:50 -08:00
Willem Monsuwe
aed3d30736
Apparently I was a bit overzealous in removing nil checks
2021-12-30 10:45:36 +01:00
Willem Monsuwe
fe043ed8ed
TIL you can range over nil slices in go
2021-12-30 09:02:29 +01:00
Willem Monsuwe
f971d4b9b3
Try to address some complexity code smells
2021-12-29 17:18:52 +01:00
Willem Monsuwe
d04508e974
Added generic webhook provider
...
This provider allows a secretstore with a generic url (templated)
which will be called with a defined method, headers (templated)
and optional body (also templated)
The response can be parsed out with a jsonPath expression
2021-12-29 10:53:29 +01:00
Lucas Severo Alves
fc4eedfd63
Merge pull request #427 from jack-evans/concurrency
...
add concurrent flag to allow more reconciles at the same time
2021-12-27 11:10:45 +01:00
Moritz Johner
b9f2910182
fix: supported nested json with dataFrom
...
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2021-12-22 21:11:39 +01:00
Jack Evans
d77f543c98
add concurrent flag to allow more reconciles at the same time
2021-12-17 15:36:51 +00:00
Moritz Johner
80fac0f697
feat: add gcp workload identity via SA
...
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2021-12-17 12:20:12 +01:00
paul-the-alien[bot]
78d046b712
Merge pull request #530 from ADustyOldMuffin/add-docs-and-fix-ca-vault
...
Add documentation for CAProvider namespace and fix issue with SecretStore
2021-12-16 19:44:24 +00:00
Vladimir Fedin
c351efcc15
Add ability provide CA for Yandex' Lockbox provider ( #487 )
...
* Add ability provide CA for Yandex' Lockbox provider
* Add tests for getting CA from secrets at Lockbox provider
* fixup! Add tests for getting CA from secrets at Lockbox provider
Co-authored-by: Vladimir Fedin <vladimirfedin@yandex-team.ru>
2021-12-16 20:16:23 +01:00
Andrew Leap
60fd67aeec
Add testcase
2021-12-16 15:14:27 +00:00
Andrew Leap
f1fad4576c
Support common idiom for GCP SM
...
Common idiom for GCP SM is like:
{
"name": {
"client_id": "<client_id>",
"client_secret": "<client_secret>",
}
}
Using DataFrom, the current GCP SM will fail to unmarshal cause it's expecting
{
"name": "{\"client_id\": \"<client_id>\", \"client_secret\": \"<client_secret>\"}",
}
which is much more annoying to work with. By tweaking the implementation to
try to decode to a string, but if that fails, use the raw []byte of the value
we get the best of both worlds.
2021-12-15 18:47:43 +00:00
Daniel Hix
d53b3df7f8
Remove namespace requirement for secret store and require for cluster secret store
2021-12-13 17:07:32 -06:00
Daniel Hix
e8791280a9
Some quick lint fixes.
2021-12-13 14:27:15 -06:00
Daniel Hix
d0a46060cc
Add test to check for invalid duration input.
2021-12-13 14:14:37 -06:00
Daniel Hix
082cee230f
Merge branch 'main' into ibm-enable-retries
2021-12-13 13:27:57 -06:00
Laszlo Varadi
a976e32831
Supporting Managed Identity authentication for Azure Keyvault
2021-12-06 10:26:34 +01:00
Moritz Johner
12a25fca8b
fix: IsNil fails on struct value
2021-11-26 09:59:10 +01:00
Martin Montes
394c4257f1
Checking nil value when parsing secret values. Added tests
2021-11-19 11:15:07 +01:00
Martin Montes
d09beae10b
fix: checking nil values when reading secret in vault provider
2021-11-18 19:23:17 +01:00
renanaAkeyless
ecef240319
Merge branch 'external-secrets:main' into main
2021-11-09 20:43:31 +02:00
renanaAkeyless
7ae9c40668
Update akeyless.go
2021-11-09 20:35:01 +02:00
renanaAkeyless
0348bbb59d
lint
2021-11-08 13:27:12 +02:00
renanaAkeyless
4a5877d926
Adde Akeyless
2021-11-07 16:18:40 +02:00
paul-the-alien[bot]
0fb03e4650
Merge pull request #450 from external-secrets/feature/log-on-success
...
Added log for first secret reconciliation after errors
2021-11-02 23:34:57 +00:00
Lucas Severo Alves
54c1a3d9d8
Merge pull request #460 from jmhobbs/golangci-lint-update
...
golangci-lint install and version update
2021-11-02 20:05:20 -03:00
paul-the-alien[bot]
cc79b7b615
Merge pull request #422 from FGA-GCES/eduardo/code_smells
...
Fixing some codeSmells
2021-11-02 23:04:05 +00:00
Eduardo Vieira
1742b9c9fc
Adjsuting lint
2021-11-02 18:30:39 -03:00
Gustavo Carvalho
03afd1099c
Adding inline comments explaining log functionality
...
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2021-11-01 17:53:59 -03:00
andreabenf
a0385ef7f2
Changing variables names
2021-10-28 14:11:14 -03:00
andreabenf
460de06636
adjusting code smells
2021-10-28 14:09:19 -03:00
John Hobbs
33cee58948
Replace deprecated golangci-lint checkers.
2021-10-27 17:01:15 -05:00
paul-the-alien[bot]
91140d0d83
Merge pull request #445 from external-secrets/fix/aws-provider-panic
...
Fixing panic due to no Namespace on ServiceAccountRef
2021-10-27 12:48:31 +00:00
Gustavo Fernandes de Carvalho
b8ba78d1b1
Added log for first secret reconciliation after errors
...
Fixes #444
Signed-off-by: Gustavo Fernandes de Carvalho <gustavo.carvalho@container-solutions.com>
2021-10-25 16:29:22 -03:00
paul-the-alien[bot]
6279801382
Merge pull request #437 from external-secrets/fix/codesmells
...
Fixed Sonarqube yandex codesmell
2021-10-25 17:31:33 +00:00
Gustavo Carvalho
403b1a34a0
Fixing lint
...
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2021-10-22 14:45:21 -03:00
Gustavo Carvalho
389f7e45de
Reducing duplications and fixing code smells
...
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2021-10-22 14:39:37 -03:00
Gustavo Carvalho
d022cc31ab
Fixing panic due to no Namespace on ServiceAccountRef
...
Fixes #419
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2021-10-22 14:22:40 -03:00
Eduardo Lima
ff90d4eb44
Removing "map" from test const name
2021-10-21 14:46:47 -03:00
Daniel Hix
3b743a39b8
Enable retries on the IBM provider
2021-10-20 18:50:21 -05:00
Arthur
dc8398b6c1
merge main into refactor/cognitifeComplexity
2021-10-20 19:15:29 -03:00
Arthur
e44b025cdd
fix lint
2021-10-20 19:04:58 -03:00
paul-the-alien[bot]
d9f30a3350
Merge pull request #414 from ADustyOldMuffin/vault-ca-provider
...
Add the ability to specify cert for Vault from K8s Secrets
2021-10-20 21:43:37 +00:00
paul-the-alien[bot]
7ab0fcf502
Merge pull request #438 from gusfcarvalho/fix/433
...
Fixing ClusterScope access for AzureKV Provider
2021-10-20 19:39:15 +00:00
Gustavo Carvalho
8e7da7b6ed
Fixing sonar cloud duplication
...
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2021-10-18 17:24:18 -03:00
Gustavo Carvalho
a5f5ecf6a5
Fixing ClusterScope access for AzureKV Provider
...
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2021-10-18 17:17:42 -03:00
Sebastian Gomez
aa182f4e0f
Fixed Sonarqube yandex codesmell
2021-10-18 12:02:14 -04:00
Daniel Hix
8bfa7cffa1
Update tests to remove code duplication
2021-10-12 16:06:01 -05:00
Daniel Hix
1ab920bc6b
Swap to switch statements to ease readability
2021-10-12 15:49:41 -05:00
Daniel Hix
9c5c588b19
Move logic into separate function to try and help code smell
2021-10-12 15:42:26 -05:00
Daniel Hix
1b3a1f1941
Add tests for ConfigMaps
2021-10-12 14:34:26 -05:00
Daniel Hix
0f71dd0846
Add config map option/ability to specify for cert in caProvider
2021-10-12 14:33:38 -05:00
Lucas Severo Alves
9e3914b944
Merge pull request #420 from FGA-GCES/mateus/code_smells
...
Fix some code smells
2021-10-12 18:50:38 +02:00
Lucas Severo Alves
c00afc9ff7
Merge pull request #329 from FGA-GCES/feat/immutable-secrets
...
Add immutable secrets
2021-10-12 18:20:23 +02:00
Daniel Hix
e6c6749a86
utilize new test function to remove code smells
2021-10-11 19:19:46 -05:00
Daniel Hix
87204969c7
Fix code smell.
2021-10-11 19:11:25 -05:00
Daniel Hix
a075963b10
Add test for missing cert secret
2021-10-11 19:08:16 -05:00
Daniel Hix
4b17163501
Added simple test making the store with CA in secrets
2021-10-11 18:57:13 -05:00
Daniel Hix
275f1c4094
Added simple test to make sure it's getting the cert.
2021-10-09 13:26:26 -05:00
Arthur
7649fe2c47
create function for each ibm provider secret get case
2021-10-07 15:45:37 -03:00
Arthur
6eba9df3b1
separate function to remap secret data on ibm.GetSecretMap to reduce cognitive complexity
2021-10-07 15:22:19 -03:00
Arthur
1600960b36
separate vault test cases run function for better cognitive complexity
2021-10-07 14:48:13 -03:00
Eduardo Vieira
c68e00ce0c
Creating map-foo and bar const for testing
2021-10-07 10:55:04 -03:00
Eduardo Vieira
b2b6b5255d
Defining targetProp const for reutilization
2021-10-07 10:50:27 -03:00
Eduardo Vieira
3d5c0b54e6
Changing expectedSecretValue declaration scope
2021-10-07 10:43:59 -03:00
Eduardo Vieira
7502e2c557
Adding FakeManager and test-secret const for testing
2021-10-07 10:39:13 -03:00
Arthur
e617ce9e23
refactor vault token functions for better cognitive complexity
2021-10-07 10:21:49 -03:00
Mateus Oliveira Patrício
1a5bd14eea
create const for "provider should be registered"
2021-10-07 09:26:29 -03:00
Mateus Oliveira Patrício
269c65bd24
create const for string literal
...
"[%d] unexpected error: %s, expected: '%s'"
2021-10-07 09:26:16 -03:00
Mateus Oliveira Patrício
4760525ed3
refactored 4 string literals to consts
2021-10-07 09:25:45 -03:00
Arthur
0990f29876
Merge branch 'feat/immutable-secrets' of github.com:FGA-GCES/external-secrets into feat/immutable-secrets
2021-10-06 21:24:50 -03:00
Arthur
1f5978eb13
add tests for controller reconciling logic
2021-10-06 21:23:41 -03:00
Daniel Hix
3ff2bfd559
Fix linting issue
2021-10-06 11:28:13 -05:00
Daniel Hix
b3a44fdbd0
Merge branch 'external-secrets:main' into vault-ca-provider
2021-10-06 10:38:59 -05:00
Daniel Hix
d7c861d38d
Add logic to pull cert from K8s secret.
2021-10-05 23:55:57 -05:00
Lucas Severo Alves
91851bb738
Merge pull request #381 from cooperbenson-qz/cooperbenson-qz/issue376
...
Revoke Vault token on Close
2021-10-05 08:55:01 +02:00
Cooper Benson
af5b8295bb
Revoke Vault token on Close
...
Fixes #376
2021-09-22 16:10:54 -06:00
Mateus Oliveira Patrício
b16d4389b9
refactor: remove unnecessary convert
2021-09-22 23:57:36 +02:00
Mateus Oliveira Patrício
b2adb77f1b
fix: syncWithoutTargetName test case
2021-09-22 23:57:36 +02:00
Mateus Oliveira Patrício
42a658c2b1
WiP: no target name unit test
2021-09-22 23:57:36 +02:00
Arthur
9f2a17f220
Merge branch 'main' into feat/immutable-secrets
2021-09-22 14:20:35 -03:00
Arthur
4de31e9d4d
stopping reconciling for immutable secrets based on es conditions
2021-09-17 21:37:21 -03:00
Moritz Johner
ce02f98db9
fix: add explicit test for using dataFrom + template
2021-09-10 16:07:39 +02:00
Lucas Severo Alves
9d3b05a2c7
Merge pull request #365 from KianTigger/oracle-provider
...
Oracle provider
2021-09-10 12:17:37 +01:00
Alexander Chernov
280964f84e
fix: dependent kind=secret are not recreated in case of deletion. ( #349 )
...
* chore: whitespace, typos, superflous aliases
* fix: deleted child secret is not recreated straight away.
* fix: e2e run
2021-09-09 11:14:17 +02:00
Arthur
8417b34d26
make reconciling stop if es is synced and immutable
2021-09-08 20:44:23 -03:00
Kian
e448c77833
Fixing incorrect naming of services
2021-09-03 17:28:20 +01:00
Kian
344d7fd2e9
fixing unnecessary conversion
2021-09-03 11:20:21 +01:00
Kian
694db476f9
Making changes based on feedback
2021-09-03 11:14:17 +01:00
Moritz Johner
059c54bc53
fix: allow using tpl metadata
2021-09-02 18:14:03 +02:00
Kian
700c2b5869
fixing kms issue
2021-09-02 15:28:36 +01:00
KianTigger
9d6f7ac46f
Merge branch 'main' of https://github.com/external-secrets/external-secrets into external-secrets-main
2021-09-02 15:23:54 +01:00
Kian
baa91c75c8
Completed Oracle provider, e2e tests non functional due to lack of company OCI account
2021-09-02 15:19:47 +01:00
Elsa Chelala
db5b4c5044
eat: add status printcolumn to ES CRD ( #318 )
...
Formatting changes
2021-08-31 13:14:09 -04:00
Elsa Chelala
ab1b51534f
Remove old non working e2e tests
2021-08-30 16:04:16 -04:00
Elsa Chelala
55441ecd77
Working unit tests
2021-08-30 15:25:33 -04:00
Elsa Chelala
882b348ff5
WiP: e2e and unit tests
2021-08-30 15:25:33 -04:00
Elsa Chelala
e053010e67
WiP: Working provider, implementing the e2e tests
2021-08-30 15:25:33 -04:00
Elsa Chelala
7f6dcb5edb
WiP: Alibaba Provider
2021-08-30 15:25:26 -04:00
Ted
6f1fae0637
feat: specify GitLab URL to connect to
2021-08-27 18:19:28 -04:00
Kian
926e37448a
Developing unit tests and fixing provider files. In process of starting to write e2e test files
2021-08-27 16:09:39 +01:00
Arthur
e32353c8a4
fixing tests for immutable secret
2021-08-26 15:05:15 -03:00
paul-the-alien[bot]
5e433b6ac9
Merge pull request #319 from Jabray5/gitlab-ci-secrets
...
Gitlab CI variables
2021-08-26 08:16:49 +00:00
Lucas Severo Alves
a4c2c93255
fix: rebase conflits
2021-08-25 16:54:16 +02:00
Lucas Severo Alves
21df9b5729
fix: error strings
2021-08-25 16:47:06 +02:00
jabray5
aca08e09d9
fixed E2E and unit tests
2021-08-25 16:47:06 +02:00
jabray5
cac9a72797
e2e tests pass
2021-08-25 16:47:06 +02:00
jabray5
f83926c5e6
passes 1st e2e test
2021-08-25 16:47:06 +02:00
jabray5
d45469acc7
operator functional and retrieves secrets from gitlab
2021-08-25 16:47:05 +02:00
jabray5
8211200e4d
added GetSecret and GetSecretMap functions to Gitlab
2021-08-25 16:45:41 +02:00
jabray5
16c0d81290
fixed environment variable names
2021-08-25 16:45:41 +02:00
jabray5
349c193131
made env variables more consistent with other providers
2021-08-25 16:45:41 +02:00
jabray5
92f6077079
Added gitlab provider
2021-08-25 16:45:39 +02:00
Lucas Severo Alves
fb51f8bc57
fix: wi for clusterstore
2021-08-25 14:56:28 +02:00
paul-the-alien[bot]
ee830e47e3
Merge pull request #323 from AndreyZamyslov/lockbox
...
Add support for Yandex Lockbox
2021-08-25 10:06:21 +00:00
zamysel
0dc8842b85
Merge branch 'main' into lockbox
2021-08-25 11:23:15 +03:00
Alexander Chernov
29ff7e797d
Merge branch 'external-secrets:main' into feat/aws-cache
2021-08-25 07:42:28 +01:00
Alexander Chernov
dae7237953
feat: added cache in aws secret manager provider
2021-08-25 07:38:13 +01:00
zamysel
1e66d123b9
Add support for Yandex Lockbox: long lived connections to lockbox api
2021-08-24 21:41:45 +03:00
Mouhsen Ibrahim
403a47c116
Add support for Google Cloud Identity
...
If the name of the service account secret is kept
empty, this means we want to use Google Cloud Identity
to authenticate against the GCP project
2021-08-23 22:28:24 +02:00
paul-the-alien[bot]
201e43f4af
Merge pull request #327 from spirosoik/fix/iss-315
...
Fix the issue for non deleting one/more key-value pair
2021-08-20 15:26:37 +00:00
zamysel
c7229199f3
Add support for Yandex Lockbox: custom API endpoint
2021-08-20 16:16:35 +03:00
Mateus Oliveira Patrício
6655ed120e
fix: use es name if target secret is empty
2021-08-19 18:43:34 -03:00
Arthur
c8315865a1
add immutable field on ExternalSecretTarget and on v1.Secret creation
...
Co-authored-by: mouhsen-ibrahim <mouhsen.ibrahim@gmail.com>
2021-08-18 19:55:10 -03:00
Kian
b030aed0a2
Merge remote-tracking branch 'origin/main' into oracle-provider
2021-08-18 14:41:30 +01:00
Kian
3ae7015725
Setting up all necessary files for provider.
2021-08-18 13:42:12 +01:00
Spiros Economakis
73ec3a5368
Fix the issue for non deleting one/more key-value pair
...
The issue is that the `dataMap` from the provider returns only the remaining data
and we were updating partially the current `secretMap` only for the keys included
in the new value.
Ticket: #315
2021-08-18 14:30:20 +03:00
zamysel
6b2f852eb6
Add support for Yandex Lockbox: custom API endpoint
2021-08-17 20:13:13 +03:00
zamysel
0815fcf857
Add support for Yandex Lockbox: tests
2021-08-17 19:30:05 +03:00
zamysel
7017935888
Add support for Yandex Lockbox
2021-08-12 20:05:02 +03:00
Spiros Economakis
f1829f0445
Set the metric when is deleted to condition deleted and false ( #306 )
...
* Set the metric when is deleted to condition deleted and false
When a metrics is deleted metrics are still shown ready and condition true.
In practice this gives the wrong monitoring as the external secret in practice
is deleted.
Issue: #231
* Fix name and namespace for the metric of deletion
2021-08-07 23:40:26 +02:00
paul-the-alien[bot]
e0a3eb648b
Merge pull request #302 from ContainerSolutions/k8s_common_types_e2e_tests
...
K8s common types e2e tests
2021-08-04 09:29:07 +00:00
Kian
abe1a9a202
Fixing incoming changes
2021-08-03 22:38:59 +02:00
Kian
17fa30737c
Attempting to fix lint issues with gofmt -s
2021-08-03 13:20:18 +01:00
KianTigger
28b50123e3
Adding back removals caused by incorrect commit.
...
Pulled wrong version to edit and commit. Undoing changes.
2021-08-03 13:09:30 +01:00
KianTigger
3eeb69c897
Merge branch 'main' into k8s_common_types_e2e_tests
2021-08-03 13:01:59 +01:00
Kian
0558fb6f13
Fixing merge issues and secret logging
2021-08-03 12:53:45 +01:00
Kian
7167e042b6
Fixing merge issues and secret logging
2021-08-03 12:51:55 +01:00
Kian
3514227291
Amending logging secret values when debugging. Kept different error messages
2021-08-03 11:59:22 +01:00
KianTigger
78b0589a07
Merge branch 'external-secrets:main' into main
2021-08-03 11:49:55 +01:00
Kian
f413c5e5d7
Amending logging secret values when debugging. Kept different error messages
2021-08-03 11:42:10 +01:00
Moritz Johner
49fbf72bf6
fix: zero refreshInterval shouldn't sync
2021-08-02 22:48:13 +02:00
Lucas Severo Alves
3c6e548cfa
we want inner values to be strings, even if it is json strings
2021-08-01 10:36:52 +02:00
Kian
6f3adf91d5
fixing lint issues
2021-08-01 10:11:21 +02:00
paul-the-alien[bot]
e65658d543
Merge pull request #265 from ricardoptcosta/mtls-auth
...
feat: adding Vault TLS client authentication
2021-07-30 14:20:42 +00:00
Kian
fec30259e9
fixing lint issues
2021-07-29 13:17:07 +01:00
Kian
77638df745
fixing lint issues
2021-07-29 13:14:34 +01:00
Kian
5558a90523
fixing lint issues
2021-07-29 13:11:23 +01:00
Kian
1164ea56c5
fixing lint issues
2021-07-29 13:05:08 +01:00