1
0
Fork 0
mirror of https://github.com/external-secrets/external-secrets.git synced 2024-12-14 11:57:59 +00:00
Commit graph

27 commits

Author SHA1 Message Date
Gergely Brautigam
e726087851
feat: add push secret to e2e tests (#3017)
* feat: add push secret to e2e tests

Signed-off-by: Gergely Brautigam <182850+Skarlso@users.noreply.github.com>

* finally, a fully working example for an e2e flow with push secret

Signed-off-by: Gergely Brautigam <182850+Skarlso@users.noreply.github.com>

* fix value field duplication issue

Signed-off-by: Gergely Brautigam <182850+Skarlso@users.noreply.github.com>

---------

Signed-off-by: Gergely Brautigam <182850+Skarlso@users.noreply.github.com>
2024-02-12 16:44:45 +01:00
Moritz Johner
ed0ceb8d84
fix: aws parameter store json decode, bump go 1.19 (#1525)
* fix: parameter store should decode complex json values

Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-09-06 19:46:36 +02:00
Gustavo Carvalho
2e6017dd4b Using cobra commands instead of several binaries
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-15 08:52:52 -03:00
Gustavo Carvalho
1587fa02b1 Improved deployments and crd logic. Added cert-controller reconcile tests
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-14 10:08:27 -03:00
Gustavo Carvalho
bbedad6053 WIP: improve deployment manifests to be on a functional state
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-13 15:53:40 -03:00
Gustavo Carvalho
e776f6d843 WIP: implementing separate deployments
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-13 09:14:41 -03:00
Gustavo Carvalho
024b64fe39 Added Readiness Probe for helm charts.
Fixed make generate command to not use kubectl
Fixed lint

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-11 08:10:11 -03:00
Gustavo Carvalho
f1d3802604 Attempting to separate webhook in a new container
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-10 15:38:54 -03:00
Gustavo Carvalho
fd9e09a1ee WIP: Structured reconciliation loops for CRDs
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-10 14:12:13 -03:00
Gustavo Carvalho
e9cfe551b9 Fixing sonar cloud code smells
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-09 11:51:08 -03:00
Gustavo Carvalho
58c6e35010 Loading ConvertWebhook on main routine
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-08 16:37:01 -03:00
Gustavo Carvalho
0530385992 v1beta1 initial commit
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-08 14:07:34 -03:00
Lucas Severo Alves
6630ab7494
Initial draft of reporter (#466)
* Initial draft of reporter

* Test out reporter in AWS provider

* trying out different events approach

* feat: implement store reconciler and events

Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>

* feat: add validate() method to provider interface

Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>

* fix: use static requeue interval in store ctrl

Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>

Co-authored-by: Mircea Cosbuc <mircea.cosbuc@container-solutions.com>
Co-authored-by: Moritz Johner <beller.moritz@googlemail.com>
2022-02-07 11:42:18 +01:00
Moritz Johner
008268ee00 feat(e2e): implement aws tests, enhance gcp tests
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-01-21 23:37:50 +01:00
Jack Evans
d77f543c98
add concurrent flag to allow more reconciles at the same time 2021-12-17 15:36:51 +00:00
Alexander Chernov
280964f84e
fix: dependent kind=secret are not recreated in case of deletion. (#349)
* chore: whitespace, typos, superflous aliases

* fix: deleted child secret is not recreated straight away.

* fix: e2e run
2021-09-09 11:14:17 +02:00
Spiros Economakis
5e3b2a0ad0
Add the ability of ESO to reconcile only in scoped namespace
By default ESO reconciles `Kind=ExternalSecret` across every namespace
in a k8s cluster. With the new flag `--nameespace` we can scope the
reconciling only to the provided namespace.

Ticket: #289
2021-08-20 14:29:44 +03:00
Moritz Johner
49fbf72bf6 fix: zero refreshInterval shouldn't sync 2021-08-02 22:48:13 +02:00
Moritz Johner
6e8503d7a0 feat: allow setting loglevel
also disables stacktraces from debug mode
2021-07-07 21:23:03 +02:00
Kellin McAvoy
6318811108 Cleanup and remove kustomize manifests in favor of Helm chart 2021-04-08 13:56:11 -05:00
Moritz Johner
92be45df6a
add awssm support (#34)
* feat: add awssm

fixes #26
2021-02-24 20:01:28 +01:00
Kellin McAvoy
3fd7586033 move controller into pkg 2021-01-07 12:50:59 -05:00
Kellin McAvoy
2e0a6effbe convert to multi-api 2020-12-29 12:25:08 -05:00
Kellin McAvoy
987d499241 cleanup: add lint and editorconfig 2020-12-21 14:38:48 -05:00
Moritz Johner
ffd4a220d1 chore: remove newlines from license boilerplate 2020-12-01 15:57:14 +01:00
Jonatas Baldin
fe86491c76 Change CRD subdomain from external-secerets.x-k8s.io to external-secrets.io 2020-11-30 13:24:07 +01:00
Jonatas Baldin
52fc65aeef Bootstrap project 2020-11-23 15:21:01 +01:00