Browse Source

fix: rebase conflits

Lucas Severo Alves 4 years ago
parent
commit
a4c2c93255

+ 2 - 0
apis/externalsecrets/v1alpha1/zz_generated.deepcopy.go

@@ -695,6 +695,8 @@ func (in *SecretStoreProvider) DeepCopyInto(out *SecretStoreProvider) {
 	if in.YandexLockbox != nil {
 		in, out := &in.YandexLockbox, &out.YandexLockbox
 		*out = new(YandexLockboxProvider)
+		(*in).DeepCopyInto(*out)
+	}
 	if in.Gitlab != nil {
 		in, out := &in.Gitlab, &out.Gitlab
 		*out = new(GitlabProvider)

+ 2 - 2
deploy/crds/external-secrets.io_clustersecretstores.yaml

@@ -251,8 +251,8 @@ spec:
                         type: string
                     type: object
                   gitlab:
-                    description: Gitlab configures this store to sync variables using
-                      Gitlab CI
+                    description: GItlab configures this store to sync secrets using
+                      Gitlab Variables provider
                     properties:
                       auth:
                         description: Auth configures how secret-manager authenticates

+ 2 - 2
deploy/crds/external-secrets.io_secretstores.yaml

@@ -251,8 +251,8 @@ spec:
                         type: string
                     type: object
                   gitlab:
-                    description: Gitlab configures this store to sync variables using
-                      Gitlab CI
+                    description: GItlab configures this store to sync secrets using
+                      Gitlab Variables provider
                     properties:
                       auth:
                         description: Auth configures how secret-manager authenticates

+ 117 - 0
docs/spec.md

@@ -1176,6 +1176,109 @@ string
 <p>GenericStore is a common interface for interacting with ClusterSecretStore
 or a namespaced SecretStore.</p>
 </p>
+<h3 id="external-secrets.io/v1alpha1.GitlabAuth">GitlabAuth
+</h3>
+<p>
+(<em>Appears on:</em>
+<a href="#external-secrets.io/v1alpha1.GitlabProvider">GitlabProvider</a>)
+</p>
+<p>
+</p>
+<table>
+<thead>
+<tr>
+<th>Field</th>
+<th>Description</th>
+</tr>
+</thead>
+<tbody>
+<tr>
+<td>
+<code>SecretRef</code></br>
+<em>
+<a href="#external-secrets.io/v1alpha1.GitlabSecretRef">
+GitlabSecretRef
+</a>
+</em>
+</td>
+<td>
+</td>
+</tr>
+</tbody>
+</table>
+<h3 id="external-secrets.io/v1alpha1.GitlabProvider">GitlabProvider
+</h3>
+<p>
+(<em>Appears on:</em>
+<a href="#external-secrets.io/v1alpha1.SecretStoreProvider">SecretStoreProvider</a>)
+</p>
+<p>
+<p>Configures an store to sync secrets using a IBM Cloud Secrets Manager
+backend.</p>
+</p>
+<table>
+<thead>
+<tr>
+<th>Field</th>
+<th>Description</th>
+</tr>
+</thead>
+<tbody>
+<tr>
+<td>
+<code>auth</code></br>
+<em>
+<a href="#external-secrets.io/v1alpha1.GitlabAuth">
+GitlabAuth
+</a>
+</em>
+</td>
+<td>
+<p>Auth configures how secret-manager authenticates with the IBM secrets manager.</p>
+</td>
+</tr>
+<tr>
+<td>
+<code>projectID</code></br>
+<em>
+string
+</em>
+</td>
+<td>
+<p>ProjectID project where secret is located</p>
+</td>
+</tr>
+</tbody>
+</table>
+<h3 id="external-secrets.io/v1alpha1.GitlabSecretRef">GitlabSecretRef
+</h3>
+<p>
+(<em>Appears on:</em>
+<a href="#external-secrets.io/v1alpha1.GitlabAuth">GitlabAuth</a>)
+</p>
+<p>
+</p>
+<table>
+<thead>
+<tr>
+<th>Field</th>
+<th>Description</th>
+</tr>
+</thead>
+<tbody>
+<tr>
+<td>
+<code>accessToken</code></br>
+<em>
+github.com/external-secrets/external-secrets/apis/meta/v1.SecretKeySelector
+</em>
+</td>
+<td>
+<p>The Access Token is used for authentication</p>
+</td>
+</tr>
+</tbody>
+</table>
 <h3 id="external-secrets.io/v1alpha1.IBMAuth">IBMAuth
 </h3>
 <p>
@@ -1483,6 +1586,20 @@ YandexLockboxProvider
 <p>YandexLockbox configures this store to sync secrets using Yandex Lockbox provider</p>
 </td>
 </tr>
+<tr>
+<td>
+<code>gitlab</code></br>
+<em>
+<a href="#external-secrets.io/v1alpha1.GitlabProvider">
+GitlabProvider
+</a>
+</em>
+</td>
+<td>
+<em>(Optional)</em>
+<p>GItlab configures this store to sync secrets using Gitlab Variables provider</p>
+</td>
+</tr>
 </tbody>
 </table>
 <h3 id="external-secrets.io/v1alpha1.SecretStoreRef">SecretStoreRef

+ 1 - 1
go.mod

@@ -65,9 +65,9 @@ require (
 	github.com/spf13/cobra v1.1.3 // indirect
 	github.com/stretchr/testify v1.7.0
 	github.com/tidwall/gjson v1.7.5
+	github.com/xanzy/go-gitlab v0.50.1
 	github.com/yandex-cloud/go-genproto v0.0.0-20210809082946-a97da516c588
 	github.com/yandex-cloud/go-sdk v0.0.0-20210809100642-c13c40a429fa
-	github.com/xanzy/go-gitlab v0.50.1
 	github.com/youmark/pkcs8 v0.0.0-20201027041543-1326539a0a0a
 	go.uber.org/zap v1.17.0
 	golang.org/x/crypto v0.0.0-20210220033148-5ea612d1eb83

+ 1 - 1
pkg/provider/gitlab/gitlab.go

@@ -198,6 +198,6 @@ func (g *Gitlab) GetSecretMap(ctx context.Context, ref esv1alpha1.ExternalSecret
 	return secretData, nil
 }
 
-func (g *Gitlab) Close() error {
+func (g *Gitlab) Close(ctx context.Context) error {
 	return nil
 }