-
Notifications
You must be signed in to change notification settings - Fork 104
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Refactor Provider Credentials #2195
base: master
Are you sure you want to change the base?
Conversation
Highlight secret row instead of open secret dialog
show secret data in edit mode
dbef902
to
5b82bcd
Compare
d861174
to
2e1afb0
Compare
2e1afb0
to
cee31b0
Compare
@@ -48,28 +48,39 @@ export function getConfiguration () { | |||
return getResource('/api/config') | |||
} | |||
|
|||
/* CloudProviders Secrets */ | |||
/* Credentials */ | |||
function invokeCloudProviderCredentialMethod (method, params) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this method is sufficient
…into enh/refactor-secrets
- Improved SecretDat composable - Added tests for credential store
️✅ There are no secrets present in this pull request anymore.If these secrets were true positive and are still valid, we highly recommend you to revoke them. 🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request. |
Removed secretData composable in favour of credential context composable
- Renamed secretBindingNamespace variables to bindingNamespace (preparation for credentialsbinding) - Removed $reset logic in case of CUD operations - Added missing $reset before setting store credentials
91a8b5a
to
19e9497
Compare
This PR refactors the backend
/cloudprovidersecrets
APISecretBinding
,Secret
(if own) and resolvedQuota
resourcesThis PR is also a preparation to support new CredentialsBinding resource
SecretBinding
as the leading resource, access referenced secret only when we need to access the actual secret dataCredentialsBindings
in the backend and return with the list. The dashboard can then work with CredentialsBindings and SecretBindings in the frontend as they are more or less interchangeable. Only the reference to the Secret / WorkloadIdentity data is different so we need to add some kind of abstraction / transformation there.Which issue(s) this PR fixes:
Fixes #
Special notes for your reviewer:
Tests need to be adapted
Release note: