Moritz Johner
|
8edc033fba
fix: vault logging structure (#2180)
|
3 years ago |
Gustavo Fernandes de Carvalho
|
ad67363751
:sparkles: Implements template MergePolicy. Fixes a few template merging bugs (#2115)
|
3 years ago |
Kristián Leško
|
1eca34c94d
feat: Vault dynamic secrets Generator (#2074)
|
3 years ago |
Sebastián Gómez
|
5b0ff977de
:sparkles: Included metadataPolicy: Fetch in Hashicorp Vault (#2040)
|
3 years ago |
Moritz Johner
|
6b576fadf1
feat: add provider metrics (#2024)
|
3 years ago |
Gustavo Fernandes de Carvalho
|
a1f8a8adc7
:bug: Fixing PushSecret CRD generation (#1967)
|
3 years ago |
Moritz Johner
|
5ef3b23a68
feat: make cache generic, refactor feature flags (#1640)
|
3 years ago |
Gustavo Fernandes de Carvalho
|
0d08e0497e
:sparkles: Implements Deletion policy for Hashicorp vault. (#1879)
|
3 years ago |
Gustavo Fernandes de Carvalho
|
a051da82cf
:bug: Fixes vault PushSecret logic (#1866)
|
3 years ago |
Gustavo Fernandes de Carvalho
|
0cb799b5cf
✨Feature/push secret (#1315)
|
3 years ago |
Moritz Johner
|
dabfa5a589
Feature: initial generator implementation + Github Actions OIDC/AWS (#1539)
|
3 years ago |
Gustavo Fernandes de Carvalho
|
d5cc8b3de5
:bug: Implements new buildPath logic (#1636)
|
3 years ago |
Nic Eggert
|
773956f5d3
Add optional caching for Vault clients, including token re-use. (#1537)
|
3 years ago |
Sebastián Gómez
|
cef547e473
fix: unmarshal JSON error when empty secrets in Vault (#1512)
|
3 years ago |
Moritz Johner
|
ed0ceb8d84
fix: aws parameter store json decode, bump go 1.19 (#1525)
|
3 years ago |
Marcel Hoyer
|
17ece4df8f
flip order of `err` and nil `secret` variable check in `listSecrets()` function of vault provider (#1504)
|
3 years ago |
dependabot[bot]
|
67fedc840e
:sparkles: Kubernetes v1.24 upgrade (#1345)
|
3 years ago |
Gustavo Fernandes de Carvalho
|
b4e7acfaa9
✨Implements dataFrom key rewrite (#1381)
|
3 years ago |
Gustavo Carvalho
|
e6f050e873
make sure we check if it is referent during NewClient
|
3 years ago |
Gustavo Carvalho
|
a01a23bfc1
fixing panic if using JWT with KubernetesServiceAccountToken
|
3 years ago |
Moritz Johner
|
8c14f8aff0
fix: loosen validation to enable referent auth.
|
4 years ago |
Jason Hancock
|
3f9d6b07fc
vault provider: avoid panics if secret not found in vault
|
4 years ago |
Merlin
|
4820cc9165
Ignore ExternalSecret processing if the store is not usuable (e.g.
|
4 years ago |
Gustavo Carvalho
|
4fcf272ce0
Refactoring vault provider. Removing RawRequest in favor of Logical
|
4 years ago |
Docs
|
f73c8be5af
chore: force interface validation
|
4 years ago |
paul-the-alien[bot]
|
ef933a03fd
Merge pull request #949 from merlindorin/feat/improve-retry
|
4 years ago |
Merlin
|
abec2a64cc
Delegate Vault retries to the controller
|
4 years ago |
Alfred Krohmer
|
8c09853343
fix: error message for Vault store validation of `Auth.Jwt.KubernetesServiceAccountToken`
|
4 years ago |
Gustavo Carvalho
|
77ace228b5
Removing Path trimming from hashicorp Vault
|
4 years ago |
Alfred Krohmer
|
d7022b1bef
feat(vault): add option for JWT backend to authenticate with Kubernetes service account token (#768)
|
4 years ago |