Neil Johari
d710b5a22b
Allow ommitting AWS account while fetching secrets
2025-02-02 23:43:51 -08:00
Donal McBreen
9f1688da7a
Fix test
2025-01-17 12:52:23 +00:00
Donal McBreen
93133cd7a9
Merge pull request #1236 from andrelaszlo/gcp_secret_manager_adapter
...
Add GCP Secret Manager adapter
2025-01-17 12:07:33 +00:00
Donal McBreen
a7b2ef56c7
Merge pull request #1189 from egze/enpass
...
Add support for Enpass - a password manager for secrets
2025-01-17 12:01:24 +00:00
Donal McBreen
06f2cb223e
Merge branch 'main' into gcp_secret_manager_adapter
2025-01-17 11:57:52 +00:00
Donal McBreen
ea7e72d75f
Merge pull request #1186 from oandalib/bitwarden-secrets-manager
...
feat: add Bitwarden Secrets Manager adapter
2025-01-17 11:43:19 +00:00
Nick Hammond
725da6aa68
Rubocop, Rubocop
2024-12-12 05:29:15 -07:00
Nick Hammond
84a874e63b
Update secrets manager spec to render multiple errors
2024-12-12 05:15:52 -07:00
Nick Hammond
e464177349
Check for errors from AWS secrets manager
2024-12-12 04:58:53 -07:00
Nick Hammond
68e6f82b30
Grab from secret2 for assertion
2024-12-12 04:17:03 -07:00
Nick Hammond
55983c6431
AWS secrets manager value can be a string
2024-12-12 04:10:48 -07:00
André Laszlo
eb82b4a753
Keep the 'default' prefix for secret items
2024-12-06 17:40:08 +01:00
André Laszlo
dc64aaa0de
Add gcloud auth login invocation to test
2024-12-06 17:32:01 +01:00
André Laszlo
18f2aae936
Simplify parsing by changing account separators
2024-12-06 17:15:22 +01:00
Omid Andalib
aa9fe4c525
feat: add Bitwarden Secrets Manager adapter
2024-12-03 00:41:16 -08:00
André Laszlo
b87bcae6a3
Merge remote-tracking branch 'origin/main' into gcp_secret_manager_adapter
2024-11-27 13:42:21 +01:00
Donal McBreen
57e48a33bb
Merge pull request #1141 from justindell/feat-add-aws-secrets-manager-adapter
...
feat: add secrets adapter for aws secrets manager
2024-11-21 15:03:54 +00:00
André Laszlo
3793bdc2c3
Add GCP Secret Manager adapter
2024-11-20 14:10:20 +01:00
Aleksandr Lossenko
79bc7584ca
make --account optional and pass Enpass vault in --from
2024-11-14 09:16:23 +01:00
Aleksandr Lossenko
8d7a6403b5
enpass-cli now has JSON support
2024-11-14 09:16:23 +01:00
Aleksandr Lossenko
d6c4411e97
add support to enpass
2024-11-14 09:16:23 +01:00
Ralf Schmitz Bongiolo
3069552315
feat(secrets): update doppler adapter to use --from option and DOPPLER_TOKEN env
2024-11-04 19:00:38 -04:00
Ralf Schmitz Bongiolo
d0d9dfcba9
Merge branch 'basecamp:main' into main
2024-11-04 16:26:12 -04:00
Justin Dell
e266945413
implement check_dependencies!
2024-11-04 09:18:56 -06:00
Justin Dell
c9fff3cb40
rename secretsmanager to secrets manager
2024-11-04 09:14:47 -06:00
Justin Dell
cef1e53f84
Merge branch 'basecamp:main' into feat-add-aws-secrets-manager-adapter
2024-11-04 09:06:04 -06:00
Jan Sterba
7142534e77
[bitwarden] ability to fetch all fields from an item
...
Sometimes a projects has a lot of secrets (more than 10). And its
cumbersome to write $(kama secrets fetch ...) with a lot of field
names.
I want to be able to just fetch all the fields from a given item
and then just use these with $(kamal extract NAME)
2024-10-23 13:28:37 +01:00
Justin Dell
6856742eca
add secrets adapter for aws secrets manager
2024-10-21 09:19:06 -05:00
Kyle Rippey
8cec17dd05
Made secret adapters raise a meaningful error if the required CLI is not installed
2024-10-15 23:20:18 -07:00
Ralf Schmitz Bongiolo
3c91a83942
feat(secrets): add Doppler adapter
2024-10-10 21:41:09 -04:00
Jan Sterba
29b02f5c30
[bitwarden] default fetch raises NoMethodError
...
When fetched item is not a login, Bitwarden adapter raises NoMethodError
because the returned JSON does not have the login.password value.
Add a nicer error message for that case.
2024-09-28 13:24:14 +02:00
Donal McBreen
aa630f156a
Hide the 1password login error
...
Avoid outputting this login error message, it wasn't an error and you
don't need to follow those instructions.
```
[ERROR] 2024/09/11 11:57:08 You are not currently signed in. Please run `op signin --help` for instructions
```
2024-09-11 12:02:53 +01:00
Donal McBreen
06f4caa866
Make the secrets commands inline aware
...
Rather than redirecting the global $stdout, which is not never clever in
a threaded program, we'll make the secrets commands aware they are
being inlined, so they return the value instead of printing it.
Additionally we no longer need to interrupt the parent process on error
as we've inlined the command - exit 1 is enough.
2024-09-10 10:39:44 +01:00
Donal McBreen
57cbf7cdb5
Inline dotenv kamal secrets calls
2024-09-06 16:56:54 +01:00
Donal McBreen
5226d52f8a
Interrupting parent on error
2024-09-04 12:14:47 +01:00
Donal McBreen
0ae8046905
Add secret tests
2024-09-04 09:32:45 +01:00