Skip to content

Commit

Permalink
Merge pull request #559 from ytsarev/key-vault-non-k8s-name
Browse files Browse the repository at this point in the history
[KeyVault]: Allow non RFC1123 name for Key,Secret,Certificate
  • Loading branch information
ulucinar committed Sep 28, 2023
2 parents 9ffc153 + 13268db commit 2f0bdda
Show file tree
Hide file tree
Showing 28 changed files with 147 additions and 9 deletions.
15 changes: 13 additions & 2 deletions apis/keyvault/v1beta1/zz_certificate_types.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

45 changes: 45 additions & 0 deletions apis/keyvault/v1beta1/zz_generated.deepcopy.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

11 changes: 11 additions & 0 deletions apis/keyvault/v1beta1/zz_key_types.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

11 changes: 11 additions & 0 deletions apis/keyvault/v1beta1/zz_secret_types.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

5 changes: 1 addition & 4 deletions config/externalname.go
Original file line number Diff line number Diff line change
Expand Up @@ -1860,10 +1860,7 @@ var ExternalNameConfigs = map[string]config.ExternalName{
}

func keyVaultURLIDConf(resourceType string) config.ExternalName {
e := config.NameAsIdentifier
e.SetIdentifierArgumentFn = func(base map[string]any, externalName string) {
base["name"] = strings.Split(externalName, "/")[0]
}
e := config.IdentifierFromProvider
e.GetExternalNameFn = func(tfstate map[string]any) (string, error) {
id, ok := tfstate["id"]
if !ok {
Expand Down
1 change: 1 addition & 0 deletions examples-generated/appplatform/springcloudcertificate.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -77,6 +77,7 @@ spec:
keyVaultIdSelector:
matchLabels:
testing.upbound.io/example-name: example
name: cert-example

---

Expand Down
1 change: 1 addition & 0 deletions examples-generated/compute/diskencryptionset.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -120,6 +120,7 @@ spec:
keyVaultIdSelector:
matchLabels:
testing.upbound.io/example-name: example
name: des-example-key

---

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -137,6 +137,7 @@ spec:
keyVaultIdSelector:
matchLabels:
testing.upbound.io/example-name: example
name: example-certificate

---

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -100,6 +100,7 @@ spec:
keyVaultIdSelector:
matchLabels:
testing.upbound.io/example-name: example
name: example
valueSecretRef:
key: example
name: example-postgresql-server
Expand Down
1 change: 1 addition & 0 deletions examples-generated/dbforpostgresql/serverkey.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -118,6 +118,7 @@ spec:
keyVaultIdSelector:
matchLabels:
testing.upbound.io/example-name: example
name: tfex-key

---

Expand Down
1 change: 1 addition & 0 deletions examples-generated/keyvault/certificate.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@ spec:
keyVaultIdSelector:
matchLabels:
testing.upbound.io/example-name: example
name: imported-cert

---

Expand Down
1 change: 1 addition & 0 deletions examples-generated/keyvault/key.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@ spec:
keyVaultIdSelector:
matchLabels:
testing.upbound.io/example-name: example
name: generated-certificate
rotationPolicy:
- automatic:
- timeBeforeExpiry: P30D
Expand Down
1 change: 1 addition & 0 deletions examples-generated/keyvault/secret.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@ spec:
keyVaultIdSelector:
matchLabels:
testing.upbound.io/example-name: example
name: secret-sauce
valueSecretRef:
key: example-key
name: example-secret
Expand Down
1 change: 1 addition & 0 deletions examples-generated/synapse/workspaceaadadmin.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -79,6 +79,7 @@ spec:
keyVaultIdSelector:
matchLabels:
testing.upbound.io/example-name: example
name: workspace-encryption-key

---

Expand Down
1 change: 1 addition & 0 deletions examples-generated/synapse/workspacesqlaadadmin.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -79,6 +79,7 @@ spec:
keyVaultIdSelector:
matchLabels:
testing.upbound.io/example-name: example
name: workspace-encryption-key

---

Expand Down
1 change: 1 addition & 0 deletions examples/databricks/workspacecustomermanagedkey.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -130,6 +130,7 @@ metadata:
name: examplekey
spec:
forProvider:
name: exampleKey
keyOpts:
- decrypt
- encrypt
Expand Down
1 change: 1 addition & 0 deletions examples/dataprotection/backupinstancepostgresql.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -102,6 +102,7 @@ metadata:
name: example-backupinstancepostgresql
spec:
forProvider:
name: exampleBackupInstancePostgresql
keyVaultIdSelector:
matchLabels:
testing.upbound.io/example-name: example
Expand Down
1 change: 1 addition & 0 deletions examples/dbforpostgresql/server-key.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -105,6 +105,7 @@ metadata:
name: example
spec:
forProvider:
name: exampleKey
keyOpts:
- decrypt
- encrypt
Expand Down
1 change: 1 addition & 0 deletions examples/keyvault/certificate.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@ metadata:
name: uptest-${Rand.RFC1123Subdomain}
spec:
forProvider:
name: custom-Non-RFC1123Name
keyVaultIdSelector:
matchLabels:
testing.upbound.io/example-name: example-cert
Expand Down
1 change: 1 addition & 0 deletions examples/keyvault/key.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@ metadata:
name: uptest-${Rand.RFC1123Subdomain}
spec:
forProvider:
name: custom-Non-RFC1123Name
keyOpts:
- decrypt
- encrypt
Expand Down
1 change: 1 addition & 0 deletions examples/keyvault/secret.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@ metadata:
name: uptest-${Rand.RFC1123Subdomain}
spec:
forProvider:
name: custom-Non-RFC1123Name
keyVaultIdSelector:
matchLabels:
testing.upbound.io/example-name: example
Expand Down
1 change: 1 addition & 0 deletions examples/synapse/workspacesqlaadadmin.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -74,6 +74,7 @@ metadata:
testing.upbound.io/example-name: wssqlaadadmin-key
name: wssqlaadadmin-key
spec:
name: workspace-encryption-key
forProvider:
keyOpts:
- unwrapKey
Expand Down
1 change: 0 additions & 1 deletion internal/controller/keyvault/certificate/zz_controller.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

1 change: 0 additions & 1 deletion internal/controller/keyvault/key/zz_controller.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

0 comments on commit 2f0bdda

Please sign in to comment.