1
0
Fork 0
mirror of https://github.com/external-secrets/external-secrets.git synced 2024-12-14 11:57:59 +00:00
Commit graph

257 commits

Author SHA1 Message Date
Moritz Johner
8fc4484cc6 feat: implement validating webhook
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-03-01 21:25:15 +01:00
Moritz Johner
fb8f496204 Merge branch 'main' into feature/conversion-webhook 2022-02-23 08:15:03 +01:00
rodrmartinez
39038b03c8 enforce that exactly one auth property is used 2022-02-22 15:45:45 -03:00
rodrmartinez
0392777965 Merge branch 'main' into feature/kubernetes-provider 2022-02-22 14:57:50 -03:00
rodrmartinez
7c4a17a9c3 Merge branch 'main' into feature/kubernetes-provider 2022-02-17 15:38:45 -03:00
rodrmartinez
86d7710727 changing kubernetes api struct 2022-02-17 14:45:43 -03:00
Gustavo Carvalho
c0ed7de5f7 Adding status information to kubectl get css
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-17 13:13:59 -03:00
Gustavo Carvalho
40ec693479 Merge branch 'main' into feature/conversion-webhook
Fixed conflicts and implemented necessary changes for v1beta1
2022-02-16 16:00:32 -03:00
Gustavo Carvalho
1d8cfc4a12 Changed logic of Webhook check for certs.
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-14 15:46:10 -03:00
Gustavo Carvalho
31eedfbb26 Fixing up some code smells
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-14 10:36:12 -03:00
Gustavo Carvalho
cb7f936228 Adding tests for externalSecrets, secretStores and ClusterSecretStores conversion methods
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-11 11:31:00 -03:00
Moritz Johner
54e68399ec feat: implement template engine v2
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-02-11 08:26:31 +01:00
Gustavo Carvalho
23784803ff Merge branch 'main' into feature/conversion-webhook
Updated Oracle provider new specs for v1beta1
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-10 16:55:37 -03:00
Gustavo Carvalho
e9cfe551b9 Fixing sonar cloud code smells
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-09 11:51:08 -03:00
Gustavo Carvalho
574953d2d8 Fixing lint and checkdiffs
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-09 11:41:31 -03:00
Gustavo Carvalho
ba8a5b7b64 Adding first structure for webhook service.
Rewrote webhook conversion for ExternalSecrets

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-09 11:28:44 -03:00
Gustavo Carvalho
58c6e35010 Loading ConvertWebhook on main routine
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-08 16:37:01 -03:00
Gustavo Carvalho
0530385992 v1beta1 initial commit
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-08 14:07:34 -03:00
Elad Gabay
fe416890b1 oracle vault: Use instance principal if auth is empty
Currently the oracle vault's secretstore uses a specific user credentials.
This commit introduce a new way to access the vault, using the instance principal.

All user's details moved to "auth" section in the OracleProvider which now is optional.
If "auth" is empty, by default, we use the instance principal, otherwise if specified user's auth details, we use them.

In addition:
- Fixed the fingerprint secret reference which until now used the privatekey secret instead of its reference.
- Bump OCI SDK version.
2022-02-07 18:38:10 +02:00
Lucas Severo Alves
6630ab7494
Initial draft of reporter (#466)
* Initial draft of reporter

* Test out reporter in AWS provider

* trying out different events approach

* feat: implement store reconciler and events

Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>

* feat: add validate() method to provider interface

Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>

* fix: use static requeue interval in store ctrl

Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>

Co-authored-by: Mircea Cosbuc <mircea.cosbuc@container-solutions.com>
Co-authored-by: Moritz Johner <beller.moritz@googlemail.com>
2022-02-07 11:42:18 +01:00
Moritz Johner
fe1cb8bc69 feat(provider): implement fake provider
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-02-01 11:18:43 +01:00
rodrmartinez
d0cbbe2470 Adds default values for Server and RemoteNamespace 2022-01-26 15:27:30 -03:00
rodrmartinez
b6b74350d5 Creates Kubernetes Provider secretstore 2022-01-25 17:11:12 -03:00
Marc Billow
0753da1cbd Support for eventual consistency in Vault Enterprise 2022-01-19 16:25:01 -06:00
Lucas Severo Alves
16948ed572
Merge pull request #596 from EladGabay/elad/oci-secret-by-name
OCI Vault: Get secret by name from a specific Vault
2022-01-16 17:20:46 +00:00
Elad Gabay
f50438353e oracle: Add Vault OCID to provider 2022-01-16 12:05:58 +02:00
Elad Gabay
137ce182c1 oracle: Fix provider fields docs 2022-01-16 12:02:56 +02:00
paul-the-alien[bot]
4c6b6a1e84
Merge pull request #525 from HanseMerkur/vault_optional_path
Optional path for Vault SecretStore
2022-01-14 19:33:29 +00:00
paul-the-alien[bot]
44d4cf061b
Merge pull request #559 from willemm/feat/generic_webhook
Add generic webhook provider
2022-01-11 15:50:05 +00:00
Lennart Weller
f7f521317e add generated files 2022-01-10 10:12:17 +01:00
Lennart Weller
0d06247163 Made SecretStore path for Vault optional
* Backwards compatible change
  * Added tests to check for a range of possible combinations for paths
2022-01-10 10:12:17 +01:00
Brent Spector
5edb7e6af2 format for lint 2022-01-05 17:01:15 -08:00
Brent Spector
26f9be4fb1 add path to jwt vault auth 2022-01-05 15:22:00 -08:00
Brent Spector
561bd3ae56 Add support for mount path in ldap auth 2022-01-05 14:54:50 -08:00
Willem Monsuwe
d04508e974 Added generic webhook provider
This provider allows a secretstore with a generic url (templated)
which will be called with a defined method, headers (templated)
and optional body (also templated)
The response can be parsed out with a jsonPath expression
2021-12-29 10:53:29 +01:00
Moritz Johner
80fac0f697 feat: add gcp workload identity via SA
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2021-12-17 12:20:12 +01:00
paul-the-alien[bot]
78d046b712
Merge pull request #530 from ADustyOldMuffin/add-docs-and-fix-ca-vault
Add documentation for CAProvider namespace and fix issue with SecretStore
2021-12-16 19:44:24 +00:00
Vladimir Fedin
c351efcc15
Add ability provide CA for Yandex' Lockbox provider (#487)
* Add ability provide CA for Yandex' Lockbox provider

* Add tests for getting CA from secrets at Lockbox provider

* fixup! Add tests for getting CA from secrets at Lockbox provider

Co-authored-by: Vladimir Fedin <vladimirfedin@yandex-team.ru>
2021-12-16 20:16:23 +01:00
Daniel Hix
d53b3df7f8 Remove namespace requirement for secret store and require for cluster secret store 2021-12-13 17:07:32 -06:00
Daniel Hix
082cee230f Merge branch 'main' into ibm-enable-retries 2021-12-13 13:27:57 -06:00
Laszlo Varadi
a976e32831 Supporting Managed Identity authentication for Azure Keyvault 2021-12-06 10:26:34 +01:00
renanaAkeyless
b0116e3199
Update zz_generated.deepcopy.go 2021-11-09 21:14:53 +02:00
renanaAkeyless
085fbd5f35
Update zz_generated.deepcopy.go 2021-11-09 20:39:33 +02:00
renanaAkeyless
0348bbb59d lint 2021-11-08 13:27:12 +02:00
renanaAkeyless
4a5877d926 Adde Akeyless 2021-11-07 16:18:40 +02:00
Daniel Hix
99f49feee4 Add retry settings to secret store CRD 2021-10-20 18:50:01 -05:00
paul-the-alien[bot]
d9f30a3350
Merge pull request #414 from ADustyOldMuffin/vault-ca-provider
Add the ability to specify cert for Vault from K8s Secrets
2021-10-20 21:43:37 +00:00
Daniel Hix
8e303e6d77 Add caProvider to types 2021-10-05 23:55:44 -05:00
Arthur
9f2a17f220 Merge branch 'main' into feat/immutable-secrets 2021-09-22 14:20:35 -03:00
Lucas Severo Alves
9d3b05a2c7
Merge pull request #365 from KianTigger/oracle-provider
Oracle provider
2021-09-10 12:17:37 +01:00
Alexander Chernov
280964f84e
fix: dependent kind=secret are not recreated in case of deletion. (#349)
* chore: whitespace, typos, superflous aliases

* fix: deleted child secret is not recreated straight away.

* fix: e2e run
2021-09-09 11:14:17 +02:00
Kian
694db476f9 Making changes based on feedback 2021-09-03 11:14:17 +01:00
KianTigger
9d6f7ac46f Merge branch 'main' of https://github.com/external-secrets/external-secrets into external-secrets-main 2021-09-02 15:23:54 +01:00
Kian
baa91c75c8 Completed Oracle provider, e2e tests non functional due to lack of company OCI account 2021-09-02 15:19:47 +01:00
Elsa Chelala
db5b4c5044 eat: add status printcolumn to ES CRD (#318)
Formatting changes
2021-08-31 13:14:09 -04:00
Elsa Chelala
7f6dcb5edb WiP: Alibaba Provider 2021-08-30 15:25:26 -04:00
Ted
6f1fae0637 feat: specify GitLab URL to connect to 2021-08-27 18:19:28 -04:00
Kian
926e37448a Developing unit tests and fixing provider files. In process of starting to write e2e test files 2021-08-27 16:09:39 +01:00
Lucas Severo Alves
a4c2c93255 fix: rebase conflits 2021-08-25 16:54:16 +02:00
jabray5
d45469acc7 operator functional and retrieves secrets from gitlab 2021-08-25 16:47:05 +02:00
jabray5
92f6077079 Added gitlab provider 2021-08-25 16:45:39 +02:00
zamysel
0dc8842b85 Merge branch 'main' into lockbox 2021-08-25 11:23:15 +03:00
Mouhsen Ibrahim
03f3622c2c make auth key for GCPSM provider optional 2021-08-24 14:22:06 +02:00
Mouhsen Ibrahim
403a47c116 Add support for Google Cloud Identity
If the name of the service account secret is kept
empty, this means we want to use Google Cloud Identity
to authenticate against the GCP project
2021-08-23 22:28:24 +02:00
zamysel
c7229199f3 Add support for Yandex Lockbox: custom API endpoint 2021-08-20 16:16:35 +03:00
zamysel
42a3e2c457 Add support for Yandex Lockbox: docs 2021-08-19 17:33:36 +03:00
Arthur
c8315865a1 add immutable field on ExternalSecretTarget and on v1.Secret creation
Co-authored-by: mouhsen-ibrahim <mouhsen.ibrahim@gmail.com>
2021-08-18 19:55:10 -03:00
Kian
b030aed0a2 Merge remote-tracking branch 'origin/main' into oracle-provider 2021-08-18 14:41:30 +01:00
Kian
42d834aedf Adding fixes to necessary files 2021-08-18 13:46:24 +01:00
Kian
3ae7015725 Setting up all necessary files for provider. 2021-08-18 13:42:12 +01:00
zamysel
6b2f852eb6 Add support for Yandex Lockbox: custom API endpoint 2021-08-17 20:13:13 +03:00
zamysel
7017935888 Add support for Yandex Lockbox 2021-08-12 20:05:02 +03:00
HenningE
328cf881b8
feat: add status printcolumn to ES CRD (#318) 2021-08-10 17:10:56 +02:00
Spiros Economakis
f1829f0445
Set the metric when is deleted to condition deleted and false (#306)
* Set the metric when is deleted to condition deleted and false

When a metrics is deleted metrics are still shown ready and condition true.
In practice this gives the wrong monitoring as the external secret in practice
is deleted.

Issue: #231

* Fix name and namespace for the metric of deletion
2021-08-07 23:40:26 +02:00
ric
2ab70cc510 Merge branch 'main' into mtls-auth 2021-07-26 09:43:56 +01:00
ric
44ef7756ef refactoring to implement changes suggested in pull request 265 ,namely, 1) fetch client certificate and key as tls k8s secrets and 2) pass them directly to TLSClientConfig avoiding storing in disk 2021-07-21 22:30:49 +01:00
ric
4221c1b151 remove cacert from client Authentication. It's already in CABundle. 2021-07-20 14:44:58 +01:00
Moritz Johner
466938522c feat(aws): add jwt authentication 2021-07-17 20:39:24 +02:00
ric
0edf4154da merge with main 2021-07-14 14:26:04 +01:00
ric
7d2d83d695 update crds to inclue client and ca certs but not client private key 2021-07-14 12:59:04 +01:00
ric
73be01d492 most work done - missing unit tests and path do certs 2021-07-13 21:44:10 +01:00
Moritz Johner
59a851c941 feat(ctrl): implement creationPolicy=Merge/None 2021-07-12 18:45:44 +02:00
ric
fd53e76247 feat: ibm provider implementation
Co-authored-by: Sebastián Gómez <sebastiangomezcorrea@gmail.com>
Co-authored-by: Lucas Severo <lucassalves65@gmail.com>
Co-authored-by: Joey Brayshaw <joeybrayshaw@gmail.com>
Co-authored-by: Elsa Chelala <elsachelala@gmail.com>
Co-authored-by: choilmto <choilmto@gmail.com>
Co-authored-by: Adrian Mouat <adrian.mouat@gmail.com>
Co-authored-by: ricardoptcosta <ricardoptcosta@gmail.com>
Co-authored-by: Gabi Beyer <Gabrielle.Beyer@container-solutions.com>
Co-authored-by: Tomasz Tarczynski <ttarczynski@users.noreply.github.com>
Co-authored-by: Mircea Cosbuc <mircea.cosbuc@container-solutions.com>
2021-07-02 16:00:05 +02:00
paul-the-alien[bot]
04219ded4e
Merge pull request #222 from external-secrets/feat/template-from
implement templateFrom
2021-06-29 13:43:48 +00:00
Moritz Johner
73ca014cfb feat: implement templateFrom 2021-06-28 21:29:09 +02:00
Moritz Johner
fb726dfb17 chore(docs): document es update behavior 2021-06-25 22:48:54 +02:00
Moritz Johner
5ac02ed2c4 feat: add synced resource version status 2021-06-25 21:23:29 +02:00
Nicolas Courbet
0e49b84f6d Rebase on master, and rework unit tests 2021-06-02 17:14:58 +02:00
Ahmed MUSTAFA
4733427527 refactor vaultUrl and move it from External secrets to secret store 2021-06-02 17:04:50 +02:00
mjiao
fc95068034 Support azure kv as provider 2021-06-02 17:03:15 +02:00
1aziz
c3197051cb add provider for gcp 2021-05-27 11:43:34 +02:00
Moritz Johner
e5d6e30d00 fix: template data should be string, fix update mechanics 2021-05-20 08:46:22 +02:00
xxxbobrxxx
f112d45aef #150 Fix json fields names 2021-05-14 12:39:41 +03:00
xxxbobrxxx
c900c8deb5 #150 Fix JWT bugs 2021-05-14 09:40:13 +03:00
xxxbobrxxx
e4d8fb4046 #150 Implement LDAP and JWT/OIDC auth methods 2021-05-13 19:19:57 +03:00
xxxbobrxxx
704e7a785b #150 Define data model for the Vault LDAP auth method 2021-05-13 18:02:04 +03:00
Moritz Johner
aaa6ad0ca8 fix: make vault version optional w/ defaults
fixes #117
2021-04-28 18:46:16 +02:00
Moritz Johner
8c8064e0e1
Draft: feat: implement template (#69)
* feat: implement template
2021-04-23 08:22:23 +02:00
Cameron McAvoy
f2d77e0324 Add service account selector to vault provider to look up the sa token 2021-04-19 13:26:29 -05:00
Kellin McAvoy
7be249ba63 Add vault provider implementation 2021-03-26 03:36:48 -05:00
Moritz Johner
640978ca9e
feat: awssm refactoring (#57)
* fix: refactor awssm provider
2021-03-10 11:43:25 +01:00
Moritz Johner
a017255464
fix: validate refresh interval, refresh externalsecret (#48)
* fix: refresh es
2021-03-05 23:58:08 +01:00
Moritz Johner
53cc579ee8
fix: ssm may respond with nil SecretString (#41)
also: support nested json keys like foo.bar
details here: https://github.com/tidwall/gjson
2021-02-26 09:11:16 +01:00
Moritz Johner
92be45df6a
add awssm support (#34)
* feat: add awssm

fixes #26
2021-02-24 20:01:28 +01:00
Moritz Johner
89c56c269f
feat: status conditions (#25)
* feat: implement es ready condition

Co-authored-by: Kellin <kellinmcavoy@gmail.com>
2021-02-15 21:51:38 +01:00
Moritz Johner
b460153452 chore: update crd-spec
see https://github.com/external-secrets/crd-spec/pull/3

Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2021-02-06 13:10:00 +01:00
Lucas Severo Alves
3227e730f1 Change dir structure and adapt 2021-01-27 12:08:28 +01:00