1
0
Fork 0
mirror of https://github.com/external-secrets/external-secrets.git synced 2024-12-14 11:57:59 +00:00
External Secrets Operator reads information from a third-party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.
Find a file
azert9 f181500e98
Feature/scaleway provider (#2086)
* wip: basic structure of scaleway provider

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* test: add some tests for GetAllSecrets

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* feat: implement PushSecret

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* test: improved test fixtures

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* feat: allow finding secrets by project using the path property

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* feat: add delete secret method

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* Delete dupplicate of push remote ref test implem

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* feat: add capability to use a secret for configuring access token

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* feat: implement GetSecretMap

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* feat: filtering by name and projetc id

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* test: add test for finding secret by name regexp

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* feat: config validation

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* fix: handle situation where no namespace is specified and we cannot provide a default

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* feat: reference secrets by id or name

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* fix: invalid request caused by pagination handling

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* feat: log the error when failing to access secret version

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* fix: pass context to sdk where missing

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* feat: add a cache for reducing AccessSecretVersion() calls

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* refacto: use GetSecret with name instead of ListSecrets

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* feat: allow using secret name in ExternalSecrets

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* feat: use latest_enabled instead of latest

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* refacto: optimized PushSecret and improved its test coverage

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* fix: doesConfigDependOnNamespace was always true

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* feat: use new api with refactored name-based endpoints

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* remove useless todo

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* fix: use secret names as key for GetAllSecrets

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* feat: support gjson propery lookup

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* feat: e2e tests

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* test: e2e test using secret to store api key

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* test: cleanup left over resources on the secret manager before each e2e run

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* doc: add doc for scaleway provider

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* refacto: fix lint issues

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* test: cleanup code in e2e was commented

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* feat: the previous version is disabled when we push to a secret

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* doc: add comments to ScalewayProvider struct to point to console and doc

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>

* feat: add missing e2e env vars for scaleway

Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>

* docs: add scaleway to support/stability table

Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>

---------

Signed-off-by: Julien Loctaux <no.mail@jloc.fr>
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
Co-authored-by: Moritz Johner <beller.moritz@googlemail.com>
2023-03-16 01:03:52 +01:00
.github Feature/scaleway provider (#2086) 2023-03-16 01:03:52 +01:00
apis Feature/scaleway provider (#2086) 2023-03-16 01:03:52 +01:00
assets chore: add pento to sponsors 2022-04-29 20:58:09 +02:00
cmd feat: make cache generic, refactor feature flags (#1640) 2023-01-19 17:25:47 +01:00
config/crds/bases Feature/scaleway provider (#2086) 2023-03-16 01:03:52 +01:00
deploy Feature/scaleway provider (#2086) 2023-03-16 01:03:52 +01:00
design Feature/push secret (#1315) 2022-11-29 16:04:46 -03:00
docs Feature/scaleway provider (#2086) 2023-03-16 01:03:52 +01:00
e2e Feature/scaleway provider (#2086) 2023-03-16 01:03:52 +01:00
hack Feature/scaleway provider (#2086) 2023-03-16 01:03:52 +01:00
overrides Using new syntax for overrides 2022-02-01 15:41:50 -03:00
pkg Feature/scaleway provider (#2086) 2023-03-16 01:03:52 +01:00
terraform chore: bump dependencies (#2012) 2023-02-14 17:42:44 +00:00
.clomonitor.yml feat: attach sbom/provenance files to GH release, fix clomonitor (#1656) 2022-10-27 08:59:19 +02:00
.dockerignore Add standalone Dockerfile (#1328) 2022-07-12 05:55:22 -03:00
.editorconfig cleanup: add lint and editorconfig 2020-12-21 14:38:48 -05:00
.gitignore Feature: initial generator implementation + Github Actions OIDC/AWS (#1539) 2022-10-29 20:15:50 +02:00
.golangci.yaml Added namespace condition to ClusterSecretStore (#1635) 2022-10-17 16:40:18 +02:00
ADOPTERS.md Add DaangnPay to ADOPTERS.md (#1668) 2022-10-26 20:16:14 +02:00
changelog.json feat: helm release workflow 2021-05-03 22:12:39 +02:00
CNAME Create CNAME 2021-03-05 18:26:07 +01:00
Dockerfile chore: replace alpine by distroless 2021-12-06 14:17:24 +01:00
Dockerfile.standalone chore(deps): bump golang from 1.20.1-alpine to 1.20.2-alpine (#2116) 2023-03-13 21:22:36 +01:00
Dockerfile.ubi chore: bump dependencies (#1667) 2022-10-25 22:42:34 +02:00
go.mod Feature/scaleway provider (#2086) 2023-03-16 01:03:52 +01:00
go.sum Feature/scaleway provider (#2086) 2023-03-16 01:03:52 +01:00
GOVERNANCE.md Propolsal for MAINTAINERS.md and GOVERNANCE.md (#1607) 2022-10-25 22:51:52 +02:00
LICENSE initial commit 2020-11-19 16:34:16 +01:00
main.go fix: aws parameter store json decode, bump go 1.19 (#1525) 2022-09-06 19:46:36 +02:00
MAINTAINERS.md Propolsal for MAINTAINERS.md and GOVERNANCE.md (#1607) 2022-10-25 22:51:52 +02:00
Makefile 🧹 bump deps (#2032) 2023-02-20 11:03:07 +01:00
PROJECT feat: implement ClusterExternalSecret (#542) 2022-03-20 09:32:27 +01:00
README.md Update README.md (#1930) 2023-01-17 18:27:09 +01:00
SECURITY.md feat: security policy & dependabot (#60) 2021-03-17 08:32:32 +01:00
tools.go Feature/push secret (#1315) 2022-11-29 16:04:46 -03:00

external-secrets

External Secrets

ci CII Best Practices Go Report Card FOSSA Status Artifact Hub operatorhub.io

External Secrets Operator is a Kubernetes operator that integrates external secret management systems like AWS Secrets Manager, HashiCorp Vault, Google Secrets Manager, Azure Key Vault, IBM Cloud Secrets Manager, Akeyless and many more. The operator reads information from external APIs and automatically injects the values into a Kubernetes Secret.

Multiple people and organizations are joining efforts to create a single External Secrets solution based on existing projects. If you are curious about the origins of this project, check out this issue and this PR.

Documentation

External Secrets Operator guides and reference documentation is available at external-secrets.io. Also see our stability and support policy.

Contributing

We welcome and encourage contributions to this project! Please read the Developer and Contribution process guides. Also make sure to check the Code of Conduct and adhere to its guidelines.

Sponsoring

Please consider sponsoring this project, there are many ways you can help us with: engineering time, providing infrastructure, donating money, etc. We are open to cooperations, feel free to approach as and we discuss how this could look like. We can keep your contribution anonymized if that's required (depending on the type of contribution), and anonymous donations are possible inside Opencollective.

Bi-weekly Development Meeting

We host our development meeting every odd wednesday at 3:30 PM Berlin Time on Jitsi. Meeting notes are recorded on hackmd.

Anyone is welcome to join. Feel free to ask questions, request feedback, raise awareness for an issue, or just say hi. ;)

Security

Please report vulnerabilities by email to contact@external-secrets.io (or cncf-ExternalSecretsOp-maintainers@lists.cncf.io). Also see our SECURITY.md file for details.

software bill of materials

We attach SBOM and provenance file to our GitHub release. Also, they are attached to container images.

Adopters

Please create a PR and add your company or project to our ADOPTERS.md file if you are using our project!

Roadmap

You can find the roadmap in our documentation: https://external-secrets.io/main/contributing/roadmap/

Kicked off by

Sponsored by

License

FOSSA Status