Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add ssh secrets #19

Merged
merged 4 commits into from
Apr 8, 2020
Merged

add ssh secrets #19

merged 4 commits into from
Apr 8, 2020

Conversation

hensur
Copy link
Member

@hensur hensur commented Apr 3, 2020

rebased on #18 / master

This change adds the capability of generating ssh secrets to the secret
operator.

While implementing this, I also moved the password generation to a
different file, which allows for further extension of the operator with
additional secret generators.

I also moved the test cases to generator specific files.

Furthermore, I noticed, that golangs string formatter on the time type
is quite verbose. The generated-at annotation now contains a
RFC3339 compliant time string.

Since the string generator now also respects the length annotation:
fixes #16

@hensur hensur changed the title Add ssh secrets WIP: Add ssh secrets Apr 6, 2020
This change adds the capability of generating ssh secrets to the secret
operator.

While implementing this, I also moved the password generation to a
different file, which allows for further extension of the operator with
additional secret generators.

I also moved the test cases to generator specific files.

Furthermore, I noticed, that golangs string formatter on the time type
is quite verbose. The generated-at annotation now contains a
RFC3339 compliant time string.
@hensur hensur changed the title WIP: Add ssh secrets add ssh secrets Apr 6, 2020
@hensur
Copy link
Member Author

hensur commented Apr 6, 2020

@martin-helmich I've rebased this on the current master. This change is finally ready for review :)
The CI still fails because Actions triggered by PRs from a fork of the repository don't have access to secret values. I'll disable the code-climate reporting for PRs in another PR.

README.md Outdated Show resolved Hide resolved
README.md Outdated Show resolved Hide resolved
README.md Outdated Show resolved Hide resolved
pkg/controller/secret/types.go Outdated Show resolved Hide resolved
pkg/controller/secret/secret_password.go Outdated Show resolved Hide resolved
pkg/controller/secret/secret_ssh.go Outdated Show resolved Hide resolved
pkg/controller/secret/secret_ssh.go Show resolved Hide resolved
README.md Outdated Show resolved Hide resolved
pkg/controller/secret/secret_string.go Outdated Show resolved Hide resolved
Copy link
Contributor

@elenz97 elenz97 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just a nitpick and a typo, the rest looks good!

pkg/controller/secret/secret_string.go Outdated Show resolved Hide resolved
pkg/controller/secret/types.go Outdated Show resolved Hide resolved
@elenz97 elenz97 dismissed martin-helmich’s stale review April 8, 2020 11:32

Dismissing, as all requested changes are outdated.

@elenz97 elenz97 merged commit 5e136e3 into mittwald:master Apr 8, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Feature request: Secret length configurable via annotation
3 participants