-
Notifications
You must be signed in to change notification settings - Fork 25
Feature/eso patch #775
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Feature/eso patch #775
Changes from all commits
6149a02
811b7c4
698b861
280cbd5
ad67d6e
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,27 @@ | ||
| # Sample ClusterExternalSecret for e2e testing | ||
| # This is a minimal ClusterExternalSecret CR that will be discovered by the agent. | ||
| # This is a cluster-scoped resource that can create ExternalSecrets in multiple namespaces. | ||
| apiVersion: external-secrets.io/v1beta1 | ||
| kind: ClusterExternalSecret | ||
| metadata: | ||
| name: e2e-test-cluster-external-secret | ||
| labels: | ||
| app.kubernetes.io/name: e2e-test | ||
| app.kubernetes.io/component: cluster-external-secret | ||
| spec: | ||
| refreshInterval: 1h | ||
| externalSecretSpec: | ||
| secretStoreRef: | ||
| name: e2e-test-cluster-secret-store | ||
| kind: ClusterSecretStore | ||
| target: | ||
| name: e2e-test-synced-secret | ||
| creationPolicy: Owner | ||
| data: | ||
| - secretKey: example-key | ||
| remoteRef: | ||
| key: dummy/path/to/secret | ||
| property: password | ||
| namespaceSelector: | ||
| matchLabels: | ||
| environment: test |
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,18 @@ | ||
| # Sample ClusterSecretStore for e2e testing | ||
| # This is a minimal ClusterSecretStore CR that will be discovered by the agent. | ||
| # This is a cluster-scoped resource that can be referenced by ExternalSecrets in any namespace. | ||
| apiVersion: external-secrets.io/v1beta1 | ||
| kind: ClusterSecretStore | ||
| metadata: | ||
| name: e2e-test-cluster-secret-store | ||
| labels: | ||
| app.kubernetes.io/name: e2e-test | ||
| app.kubernetes.io/component: cluster-secret-store | ||
| spec: | ||
| provider: | ||
| # Fake provider configuration - this won't actually work but allows the CR to be created | ||
| fake: | ||
| data: | ||
| - key: dummy/path/to/secret | ||
| value: dummy-value | ||
| version: "1" |
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,25 @@ | ||
| # Sample ExternalSecret for e2e testing | ||
| # This is a minimal ExternalSecret CR that will be discovered by the agent. | ||
| # Note: This requires the External Secrets Operator CRDs to be installed, | ||
| # but does not require a working secrets backend. | ||
| apiVersion: external-secrets.io/v1 | ||
| kind: ExternalSecret | ||
| metadata: | ||
| name: e2e-test-external-secret | ||
| namespace: default | ||
| labels: | ||
| app.kubernetes.io/name: e2e-test | ||
| app.kubernetes.io/component: external-secret | ||
| spec: | ||
| refreshInterval: 1h | ||
| secretStoreRef: | ||
| name: e2e-test-secret-store | ||
| kind: SecretStore | ||
| target: | ||
| name: e2e-test-synced-secret | ||
| creationPolicy: Owner | ||
| data: | ||
| - secretKey: example-key | ||
| remoteRef: | ||
| key: dummy/path/to/secret | ||
| property: password |
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,20 @@ | ||
| # Sample SecretStore for e2e testing | ||
| # This is a minimal SecretStore CR that will be discovered by the agent. | ||
| # Note: This requires the External Secrets Operator CRDs to be installed, | ||
| # but does not require a working secrets backend. | ||
| apiVersion: external-secrets.io/v1 | ||
| kind: SecretStore | ||
| metadata: | ||
| name: e2e-test-secret-store | ||
| namespace: default | ||
| labels: | ||
| app.kubernetes.io/name: e2e-test | ||
| app.kubernetes.io/component: secret-store | ||
| spec: | ||
| provider: | ||
| # Fake provider configuration - this won't actually work but allows the CR to be created | ||
| fake: | ||
| data: | ||
| - key: dummy/path/to/secret | ||
| value: dummy-value | ||
| version: "1" |
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
|
|
@@ -221,6 +221,18 @@ var defaultExtractorFunctions = map[string]func(*api.DataReading, *dataupload.Sn | |||||
| "ark/configmaps": func(r *api.DataReading, s *dataupload.Snapshot) error { | ||||||
| return extractResourceListFromReading(r, &s.ConfigMaps) | ||||||
| }, | ||||||
| "ark/externalsecrets": func(r *api.DataReading, s *dataupload.Snapshot) error { | ||||||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
It may be helpful to add a prefix to the names to clarify which project they originate from.
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. sure, but I guess you dont mean only here right? |
||||||
| return extractResourceListFromReading(r, &s.ExternalSecrets) | ||||||
| }, | ||||||
| "ark/secretstores": func(r *api.DataReading, s *dataupload.Snapshot) error { | ||||||
| return extractResourceListFromReading(r, &s.SecretStores) | ||||||
| }, | ||||||
| "ark/clusterexternalsecrets": func(r *api.DataReading, s *dataupload.Snapshot) error { | ||||||
| return extractResourceListFromReading(r, &s.ClusterExternalSecrets) | ||||||
| }, | ||||||
| "ark/clustersecretstores": func(r *api.DataReading, s *dataupload.Snapshot) error { | ||||||
| return extractResourceListFromReading(r, &s.ClusterSecretStores) | ||||||
| }, | ||||||
| } | ||||||
|
|
||||||
| // convertDataReadings processes a list of DataReadings using the provided | ||||||
|
|
||||||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please include the cluster-scoped resources: clusterexternalsecrets and clustersecretstores.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
or not, I need to add everything i did (for all files) the same for clusterexternalsecrets and clustersecretstores?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
now done @achuchev