1
0
Fork 0
mirror of https://github.com/external-secrets/external-secrets.git synced 2024-12-14 11:57:59 +00:00
Commit graph

89 commits

Author SHA1 Message Date
paul-the-alien[bot]
fb056cc9b5
Merge pull request #784 from external-secrets/feature/hashivault-getallsecrets
Implements Hashicorp Vault GetAllSecrets
2022-03-12 11:19:04 +00:00
Gustavo Carvalho
caf00a43aa Chore: bumping gitlab-go to 0.58.0
Signed-off-by: Gustavo Carvalho <gusfcarvalho@gmail.com>
2022-03-10 08:46:17 -03:00
Gustavo Carvalho
94d68f6a18 Adding EngineVersion=v1 to GCP e2e tests
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-03-09 14:42:41 -03:00
Gustavo Carvalho
10c3ba355d Changes e2e test default api to v1beta1. Adds GetAllSecrets test
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-03-09 13:43:37 -03:00
Moritz Johner
a627e82639 chore: fix smells
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-02-11 08:26:32 +01:00
Moritz Johner
54e68399ec feat: implement template engine v2
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-02-11 08:26:31 +01:00
paul-the-alien[bot]
027f28ec97
Merge pull request #700 from EladGabay/elad/oci-secret-by-name
oracle vault: Use instance principal if auth is empty
2022-02-10 10:34:40 +00:00
Moritz Johner
5b8ab034ec feat(vault): marshal nested value as json, add docs
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
Co-authored-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
2022-02-08 08:05:10 +01:00
Elad Gabay
fe416890b1 oracle vault: Use instance principal if auth is empty
Currently the oracle vault's secretstore uses a specific user credentials.
This commit introduce a new way to access the vault, using the instance principal.

All user's details moved to "auth" section in the OracleProvider which now is optional.
If "auth" is empty, by default, we use the instance principal, otherwise if specified user's auth details, we use them.

In addition:
- Fixed the fingerprint secret reference which until now used the privatekey secret instead of its reference.
- Bump OCI SDK version.
2022-02-07 18:38:10 +02:00
Lucas Severo Alves
5a464df585
Revert "GetAllSecrets CRD and Azure implementation" 2022-02-01 16:52:18 +01:00
paul-the-alien[bot]
ca0cda7c16
Merge pull request #613 from external-secrets/getall-Secrets
GetAllSecrets CRD and Azure implementation
2022-02-01 13:18:20 +00:00
Moritz Johner
d651f689e7 feat(e2e): add tests for type=cert and type=key
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-01-28 20:24:37 +01:00
Sebastian Gomez
43e4eb320a Merge branch 'main' into getall-Secrets 2022-01-27 16:44:29 -05:00
Moritz Johner
64589cddda chore: implement aws parameterstore e2e tests
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-01-27 08:36:45 +01:00
Sebastian Gomez
48ac7b991f Created new struct for dataFrom 2022-01-25 16:01:33 -05:00
Sebastian Gomez
d607eb60df main conflict resolution 2022-01-24 16:52:20 -05:00
Sebastian Gomez
0cc03caae4 Fixed lint issues 2022-01-24 16:17:18 -05:00
Moritz Johner
008268ee00 feat(e2e): implement aws tests, enhance gcp tests
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2022-01-21 23:37:50 +01:00
Moritz Johner
e392839e43 fix(e2e): use correct auth compsition 2022-01-14 20:37:02 +01:00
paul-the-alien[bot]
4c6b6a1e84
Merge pull request #525 from HanseMerkur/vault_optional_path
Optional path for Vault SecretStore
2022-01-14 19:33:29 +00:00
paul-the-alien[bot]
6acb8852b5
Merge pull request #469 from external-secrets/chore/specific_e2e_setup
Initial setup for wi gcp testing
2022-01-14 19:27:54 +00:00
Moritz Johner
73472be795
fix: try to fix cluster location 2022-01-12 23:43:45 +01:00
Lennart Weller
23c859eaf9 Pull changes from linter 2022-01-10 10:12:17 +01:00
Lennart Weller
0d06247163 Made SecretStore path for Vault optional
* Backwards compatible change
  * Added tests to check for a range of possible combinations for paths
2022-01-10 10:12:17 +01:00
Brent Spector
f76188026d proposed fix for JWT tests 2022-01-07 13:09:22 -08:00
Lucas Severo Alves
ae6cadf70c Use ClusterSecretStore so we set namespace of SA 2021-12-31 11:26:14 +01:00
Lucas Severo Alves
25763fde81 e2e testing for gcp Workload Identity 2021-12-30 22:08:00 +01:00
Moritz Johner
80fac0f697 feat: add gcp workload identity via SA
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
2021-12-17 12:20:12 +01:00
renanaAkeyless
ecef240319
Merge branch 'external-secrets:main' into main 2021-11-09 20:43:31 +02:00
renanaAkeyless
0348bbb59d lint 2021-11-08 13:27:12 +02:00
renanaAkeyless
67541a843d e2e 2021-11-07 17:37:22 +02:00
Lucas Severo Alves
8dd81df1f3 Remove cred dependency if you wanna run less tests 2021-11-01 18:58:33 +01:00
andreabenf
a0385ef7f2 Changing variables names 2021-10-28 14:11:14 -03:00
andreabenf
565e509282 adjusting lint 2021-10-28 14:09:19 -03:00
andreabenf
460de06636 adjusting code smells 2021-10-28 14:09:19 -03:00
Opeyemi Alao
511154f0f9 refactor vault e2e test 2021-10-25 17:05:15 +01:00
Mateus Oliveira Patrício
adb8a0bc4b create const for "provider-secret" 2021-10-07 09:24:31 -03:00
Mateus Oliveira Patrício
4b1f974d90 fix: edit proper func 2021-09-23 14:22:27 -03:00
Mateus Oliveira Patrício
f4fa26e375 fix: change tests message. 2021-09-23 14:07:21 -03:00
Mateus Oliveira Patrício
e38481b748 e2e: add json test case to providers and vault 2021-09-23 14:01:06 -03:00
Mateus Oliveira Patrício
4c12ce0333 e2e: created JSONDataWithoutTargetName() test case 2021-09-23 14:00:24 -03:00
Mateus Oliveira Patrício
bf43f7604d test: add entry to oracle provider 2021-09-22 23:57:36 +02:00
Mateus Oliveira Patrício
3b1fc13079 test: add compose for each vault case 2021-09-22 23:57:36 +02:00
Mateus Oliveira Patrício
5b468c4b4f test: add test entries to provider 2021-09-22 23:57:36 +02:00
Mateus Oliveira Patrício
5284aca883 test: create e2e test to SyncWithoutTargetName 2021-09-22 23:57:36 +02:00
Lucas Severo Alves
9d3b05a2c7
Merge pull request #365 from KianTigger/oracle-provider
Oracle provider
2021-09-10 12:17:37 +01:00
Alexander Chernov
280964f84e
fix: dependent kind=secret are not recreated in case of deletion. (#349)
* chore: whitespace, typos, superflous aliases

* fix: deleted child secret is not recreated straight away.

* fix: e2e run
2021-09-09 11:14:17 +02:00
Kian
af4c10bd0c Adding environment variables for e2e tests and fixed incorrectly used arguments in 2 functions 2021-09-07 11:20:09 +01:00
Kian
e448c77833 Fixing incorrect naming of services 2021-09-03 17:28:20 +01:00
Kian
e2480d81b0 Fixing unecessary type conversion for secret creation and deletion 2021-09-03 11:23:59 +01:00