1
0
Fork 0
mirror of https://github.com/external-secrets/external-secrets.git synced 2024-12-14 11:57:59 +00:00
Commit graph

114 commits

Author SHA1 Message Date
Daniel Hix
324c7def06
feat: implement ClusterExternalSecret (#542)
Co-authored-by: Gustavo Fernandes de Carvalho <gusfcarvalho@gmail.com>
2022-03-20 09:32:27 +01:00
Gustavo Carvalho
164e8776ec Adding docs and implementing ConversionStrategy
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-03-09 06:59:54 -03:00
Gustavo Carvalho
2f23fd28ed Adding GetAllSecrets for Hashicorp Vault
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-03-09 05:40:09 -03:00
paul-the-alien[bot]
439ecfaf9d
Merge pull request #783 from AtzeDeVries/allow-gcp-cross-project-secrets
GCP: allow cluster to be in different project
2022-03-09 10:03:20 +00:00
Atze de Vries
2f53ab8220 also make optional for v1beta1 and add note to docs 2022-03-03 19:35:38 +01:00
Atze de Vries
739043283c make clusterProjectID omitemtpy 2022-03-02 18:03:45 +01:00
Atze de Vries
da47ad2cac GCP: allow cluster to be in different project 2022-03-02 11:24:04 +01:00
Moritz Johner
8fc4484cc6 feat: implement validating webhook
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-03-01 21:25:15 +01:00
Moritz Johner
fb8f496204 Merge branch 'main' into feature/conversion-webhook 2022-02-23 08:15:03 +01:00
rodrmartinez
39038b03c8 enforce that exactly one auth property is used 2022-02-22 15:45:45 -03:00
rodrmartinez
0392777965 Merge branch 'main' into feature/kubernetes-provider 2022-02-22 14:57:50 -03:00
rodrmartinez
7c4a17a9c3 Merge branch 'main' into feature/kubernetes-provider 2022-02-17 15:38:45 -03:00
rodrmartinez
86d7710727 changing kubernetes api struct 2022-02-17 14:45:43 -03:00
Gustavo Carvalho
c0ed7de5f7 Adding status information to kubectl get css
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-17 13:13:59 -03:00
Gustavo Carvalho
40ec693479 Merge branch 'main' into feature/conversion-webhook
Fixed conflicts and implemented necessary changes for v1beta1
2022-02-16 16:00:32 -03:00
Gustavo Carvalho
1d8cfc4a12 Changed logic of Webhook check for certs.
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-14 15:46:10 -03:00
Gustavo Carvalho
31eedfbb26 Fixing up some code smells
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-14 10:36:12 -03:00
Gustavo Carvalho
cb7f936228 Adding tests for externalSecrets, secretStores and ClusterSecretStores conversion methods
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-11 11:31:00 -03:00
Moritz Johner
54e68399ec feat: implement template engine v2
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-02-11 08:26:31 +01:00
Gustavo Carvalho
23784803ff Merge branch 'main' into feature/conversion-webhook
Updated Oracle provider new specs for v1beta1
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-10 16:55:37 -03:00
Gustavo Carvalho
e9cfe551b9 Fixing sonar cloud code smells
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-09 11:51:08 -03:00
Gustavo Carvalho
574953d2d8 Fixing lint and checkdiffs
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-09 11:41:31 -03:00
Gustavo Carvalho
ba8a5b7b64 Adding first structure for webhook service.
Rewrote webhook conversion for ExternalSecrets

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-09 11:28:44 -03:00
Gustavo Carvalho
58c6e35010 Loading ConvertWebhook on main routine
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-08 16:37:01 -03:00
Gustavo Carvalho
0530385992 v1beta1 initial commit
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-08 14:07:34 -03:00
Elad Gabay
fe416890b1 oracle vault: Use instance principal if auth is empty
Currently the oracle vault's secretstore uses a specific user credentials.
This commit introduce a new way to access the vault, using the instance principal.

All user's details moved to "auth" section in the OracleProvider which now is optional.
If "auth" is empty, by default, we use the instance principal, otherwise if specified user's auth details, we use them.

In addition:
- Fixed the fingerprint secret reference which until now used the privatekey secret instead of its reference.
- Bump OCI SDK version.
2022-02-07 18:38:10 +02:00
Lucas Severo Alves
6630ab7494
Initial draft of reporter (#466)
* Initial draft of reporter

* Test out reporter in AWS provider

* trying out different events approach

* feat: implement store reconciler and events

Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>

* feat: add validate() method to provider interface

Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>

* fix: use static requeue interval in store ctrl

Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>

Co-authored-by: Mircea Cosbuc <mircea.cosbuc@container-solutions.com>
Co-authored-by: Moritz Johner <beller.moritz@googlemail.com>
2022-02-07 11:42:18 +01:00
Moritz Johner
fe1cb8bc69 feat(provider): implement fake provider
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-02-01 11:18:43 +01:00
rodrmartinez
d0cbbe2470 Adds default values for Server and RemoteNamespace 2022-01-26 15:27:30 -03:00
rodrmartinez
b6b74350d5 Creates Kubernetes Provider secretstore 2022-01-25 17:11:12 -03:00
Marc Billow
0753da1cbd Support for eventual consistency in Vault Enterprise 2022-01-19 16:25:01 -06:00
Lucas Severo Alves
16948ed572
Merge pull request #596 from EladGabay/elad/oci-secret-by-name
OCI Vault: Get secret by name from a specific Vault
2022-01-16 17:20:46 +00:00
Elad Gabay
f50438353e oracle: Add Vault OCID to provider 2022-01-16 12:05:58 +02:00
Elad Gabay
137ce182c1 oracle: Fix provider fields docs 2022-01-16 12:02:56 +02:00
paul-the-alien[bot]
4c6b6a1e84
Merge pull request #525 from HanseMerkur/vault_optional_path
Optional path for Vault SecretStore
2022-01-14 19:33:29 +00:00
paul-the-alien[bot]
44d4cf061b
Merge pull request #559 from willemm/feat/generic_webhook
Add generic webhook provider
2022-01-11 15:50:05 +00:00
Lennart Weller
f7f521317e add generated files 2022-01-10 10:12:17 +01:00
Lennart Weller
0d06247163 Made SecretStore path for Vault optional
* Backwards compatible change
  * Added tests to check for a range of possible combinations for paths
2022-01-10 10:12:17 +01:00
Brent Spector
5edb7e6af2 format for lint 2022-01-05 17:01:15 -08:00
Brent Spector
26f9be4fb1 add path to jwt vault auth 2022-01-05 15:22:00 -08:00
Brent Spector
561bd3ae56 Add support for mount path in ldap auth 2022-01-05 14:54:50 -08:00
Willem Monsuwe
d04508e974 Added generic webhook provider
This provider allows a secretstore with a generic url (templated)
which will be called with a defined method, headers (templated)
and optional body (also templated)
The response can be parsed out with a jsonPath expression
2021-12-29 10:53:29 +01:00
Moritz Johner
80fac0f697 feat: add gcp workload identity via SA
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2021-12-17 12:20:12 +01:00
paul-the-alien[bot]
78d046b712
Merge pull request #530 from ADustyOldMuffin/add-docs-and-fix-ca-vault
Add documentation for CAProvider namespace and fix issue with SecretStore
2021-12-16 19:44:24 +00:00
Vladimir Fedin
c351efcc15
Add ability provide CA for Yandex' Lockbox provider (#487)
* Add ability provide CA for Yandex' Lockbox provider

* Add tests for getting CA from secrets at Lockbox provider

* fixup! Add tests for getting CA from secrets at Lockbox provider

Co-authored-by: Vladimir Fedin <vladimirfedin@yandex-team.ru>
2021-12-16 20:16:23 +01:00
Daniel Hix
d53b3df7f8 Remove namespace requirement for secret store and require for cluster secret store 2021-12-13 17:07:32 -06:00
Daniel Hix
082cee230f Merge branch 'main' into ibm-enable-retries 2021-12-13 13:27:57 -06:00
Laszlo Varadi
a976e32831 Supporting Managed Identity authentication for Azure Keyvault 2021-12-06 10:26:34 +01:00
renanaAkeyless
b0116e3199
Update zz_generated.deepcopy.go 2021-11-09 21:14:53 +02:00
renanaAkeyless
085fbd5f35
Update zz_generated.deepcopy.go 2021-11-09 20:39:33 +02:00