1
0
Fork 0
mirror of https://github.com/external-secrets/external-secrets.git synced 2024-12-14 11:57:59 +00:00
Commit graph

18 commits

Author SHA1 Message Date
Moritz Johner
74897535d2
feat: add PushSecret generator design (#2665)
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2023-11-22 21:45:55 +00:00
Moritz Johner
22ca0ad35d
feat: add design doc for PushSecret updatePolicy (#2664)
feat: add pushsecret updatePolicy design doc

Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
Co-authored-by: Gustavo Fernandes de Carvalho <gusfcarvalho@gmail.com>
2023-11-02 10:22:54 +01:00
Scott Andrews
2174a67575
Make ExternalSecret a provisioned service (#2263)
The Service Binding for Kubernetes project (servicebinding.io) is a spec
to make it easier for workloads to consume services. At runtime, the
ServiceBinding resource references a service resources and workload
resource to connect to the service. The Secret for a service is
projected into a workload resource at a well known path.

Services can advertise the name of the Secret representing the service
on it's status at `.status.binding.name`. Hosting the name of a Secret
at this location is the Provisioned Service duck type. It has the effect
of decoupling the logical consumption of a service from the physical
Secret holding state.

Using ServiceBindings with ExternalSecrets today requires the user to
directly know and reference the Secret created by the ExternalSecret as
the service reference. This PR adds the name of the Secret to the status
of the ExternalSecret at a well known location where it is be discovered
by a ServiceBinding. With this change, user can reference an
ExternalSecret from a ServiceBinding.

A ClusterRole is also added with a well known label for the
ServiceBinding controller to have permission to watch ExternalSecrets
and read the binding Secret.

ClusterExternalSecret was not modified as ServiceBindings are limited to
the scope of a single namespace.

Signed-off-by: Scott Andrews <andrewssc@vmware.com>
2023-05-16 22:06:55 +02:00
Moritz Johner
e2bc666a74
feat: LTS release process (#2155)
* feat: auto-update dependencies

Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>

* docs: add release docs

Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>

* fix: remove note about image tag

Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>

* fix: add variables to allow build from release branch

Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>

* Update design/006-LTS-release.md

Co-authored-by: Gustavo Fernandes de Carvalho <gusfcarvalho@gmail.com>
Signed-off-by: Moritz Johner <moolen@users.noreply.github.com>

* Update design/006-LTS-release.md

Co-authored-by: Gustavo Fernandes de Carvalho <gusfcarvalho@gmail.com>
Signed-off-by: Moritz Johner <moolen@users.noreply.github.com>

* Update design/006-LTS-release.md

Co-authored-by: Gustavo Fernandes de Carvalho <gusfcarvalho@gmail.com>
Signed-off-by: Moritz Johner <moolen@users.noreply.github.com>

* Update design/006-LTS-release.md

Co-authored-by: Gustavo Fernandes de Carvalho <gusfcarvalho@gmail.com>
Signed-off-by: Moritz Johner <moolen@users.noreply.github.com>

* fix: github ref regex match release branch

Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>

* feat: migrate to new issue template format

Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>

---------

Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
Signed-off-by: Moritz Johner <moolen@users.noreply.github.com>
Co-authored-by: Gustavo Fernandes de Carvalho <gusfcarvalho@gmail.com>
2023-05-15 09:06:15 +02:00
Gustavo Fernandes de Carvalho
0cb799b5cf
Feature/push secret (#1315)
Introduces Push Secret feature with implementations for the following providers:

* GCP Secret Manager
* AWS Secrets Manager
* AWS Parameter Store
* Hashicorp Vault KV

Signed-off-by: Dominic Meddick <dominic.meddick@engineerbetter.com>
Signed-off-by: Amr Fawzy <amr.fawzy@container-solutions.com>
Signed-off-by: William Young <will.young@engineerbetter.com>
Signed-off-by: James Cleveland <james.cleveland@engineerbetter.com>
Signed-off-by: Lilly Daniell <lilly.daniell@engineerbetter.com>
Signed-off-by: Adrienne Galloway <adrienne.galloway@engineerbetter.com>
Signed-off-by: Marcus Dantas <marcus.dantas@engineerbetter.com>
Signed-off-by: Gustavo Carvalho <gusfcarvalho@gmail.com>
Signed-off-by: Nick Ruffles <nick.ruffles@engineerbetter.com>
2022-11-29 16:04:46 -03:00
Christian Hüning
063af877f1
Proposal Draft for Secret Generators (#1338)
* Proposal Draft for Secret Generators

Signed-off-by: Christian Hüning <christian.huening@finleap.com>
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-11-23 20:06:46 +01:00
Gustavo Fernandes de Carvalho
4db9017d2e
🗺️ Design for dataFrom key rewrite (#1188)
* design for dataFrom key rewrite

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* Update design/004-datafrom-key-rewrite.md

Co-authored-by: Moritz Johner <moolen@users.noreply.github.com>

* Update design/004-datafrom-key-rewrite.md

Co-authored-by: Moritz Johner <moolen@users.noreply.github.com>

* Adding drawbacks and examples. Changing CRDs to have  block

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

Co-authored-by: Moritz Johner <moolen@users.noreply.github.com>
2022-07-22 13:15:11 -03:00
Daniel Hix
324c7def06
feat: implement ClusterExternalSecret (#542)
Co-authored-by: Gustavo Fernandes de Carvalho <gusfcarvalho@gmail.com>
2022-03-20 09:32:27 +01:00
Gustavo Fernandes de Carvalho
d4fc82eb11
Added draft proposal for Secret Sink (#641)
* Added draft for SecretSink

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* Fixing typo and adding more comments

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* Dedicating new CRD to SecretSink

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* Redoing secretSink proposal

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* Moved selector to spec level. Removed secretStore selector from remoteRef

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* Update wording on design/001-secretsink.md

Co-authored-by: Moritz Johner <moolen@users.noreply.github.com>
Co-authored-by: Moritz Johner <moolen@users.noreply.github.com>
2022-03-16 21:26:56 +01:00
Gustavo Carvalho
7d0c1027a3 Adding Deletion Policy to the spec, and approving it
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-16 14:32:40 -03:00
Gustavo Carvalho
f154293a7f Changing design doc number versioning to 001
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-10 14:15:39 -03:00
Gustavo Carvalho
7bf82ce278 Rewording and add message around dataFrom
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-08 14:10:19 -03:00
Gustavo Carvalho
57e976f224 Fixing SecretStore version
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-08 09:23:23 -03:00
Gustavo Carvalho
e12df3c97d First draft for v1beta1
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-08 09:04:46 -03:00
Moritz Johner
79adedcb20 feat(docs): add proposal process, add bi-weekly meeting 2022-01-22 23:26:59 +01:00
Pascal Hofmann
c8559c1be7 docs: Fix documentation for externalsecret dataFrom 2021-05-28 16:12:12 +02:00
Pascal Hofmann
b529d7355a docs: Fix typo apiVerson 2021-05-28 08:34:25 +02:00
Kellin McAvoy
8361f6d055 Move crd spec to directory 2021-04-28 10:33:09 -05:00