Commit Graph

103 Commits

Author SHA1 Message Date
Yordan Pavlov b8063f2bdb
Fix #1250 by upgrading cloud.google.com/go/pubsub to v1.12.2 (#1285)
* upgrade cloud.google.com/go/pubsub to v1.12.2

Signed-off-by: Yordan Pavlov <yordan.pavlov@dunnhumby.com>

* update GCP secret manager test

Signed-off-by: Yordan Pavlov <yordan.pavlov@dunnhumby.com>

* make modtidy-all

Signed-off-by: Yordan Pavlov <yordan.pavlov@dunnhumby.com>

Co-authored-by: Yordan Pavlov <yordan.pavlov@dunnhumby.com>
Co-authored-by: Dapr Bot <56698301+dapr-bot@users.noreply.github.com>
Co-authored-by: Yaron Schneider <schneider.yaron@live.com>
2022-01-13 09:26:42 -08:00
Dmitry Shmulevich c7adb917f3
update license to Apache v2.0 (#1406) 2022-01-04 19:53:31 -08:00
Alessandro (Ale) Segala 3eafb8bcd4
Azure SDK "track 2": authentication and secretstore/azure/keyvault (#1290)
* Authentication for new Azure SDK

* Updated keyvault to use new Azure SDK

* 🙈

* Update authentication/azure/auth.go

* Update authentication/azure/auth.go

* Update authentication/azure/auth.go

* Reintroduce changes from PR 1132 without updating ASB

* Lint 💄

* Marking contexts as TODO as they'll need a timeout
As per conversation with @berndverst

* Update certification tests with no auth libraries

Co-authored-by: Bernd Verst <4535280+berndverst@users.noreply.github.com>
2021-11-16 10:59:51 -08:00
Bernd Verst ac85ba2a8e
Add dapr user agent for Azure Components (#1152)
* Add dapr useragent for Service Bus and EventHubs

* Add useragent for tablestorage

* send dapr useragent

* more user agents

* formatting
2021-09-27 17:04:27 -07:00
Long Dai 988fed05ab
ci: standard linter config (#1102)
* ci: standard linter config

Signed-off-by: Long <long.dai@intel.com>

* Update utils.go

* fix pulsar issue

Signed-off-by: Long <long.dai@intel.com>

Co-authored-by: Artur Souza <artursouza.ms@outlook.com>
2021-09-21 15:21:59 -07:00
Alessandro (Ale) Segala 99c2ace742
Restored backwards compatibility with 1.3 (#1131)
* Restored backwards compatibility with 1.3
#972 accidentally introduced a backwards-incompatible change with a feature added in 1.3. Before, it was possible to specify an Azure environment for the AKV secret store by passing a FQDN as "vaultName" property that included the suffix for the Azure environment.
#972 introduced a better way to handle this (using the "azureEnvironment" metadata property), but accidentally broke the behavior added in 1.3
This patch restores full compatibility with 1.3. Although that behavior should be considered deprecated and thus discouraged (and it will be removed from docs), it will still be supported.

* Lint
2021-09-10 10:42:29 -07:00
Phil Kedy 35ff084d3d
Adding multi-valued secret support to the local file store component (#1089)
* Adding multi-valued secret support to the local file store component

* Fix linter issue
2021-08-19 15:46:42 -07:00
Alessandro (Ale) Segala d0816e32a8
Updated to use common Azure auth logic (#972)
* Common Azure auth logic
- Currently implemented on secretstores/azure/keyvault and state/azure/blobstorage
- Supports Azure AD via service principal (client credentials, client certificate, MSI) - based on the previous authorizer for AKV
- Allows using other Azure clouds (China, Germany, etc)
- For Blob Storage state, supports using custom endpoints (like emulators like Azurite)

* Add environment variable aliases

* Address linter warnings

* another lint thing

* Fixed typo in method description

* Updated metadata key names so they're more consistent

* Fix test

* Some more linter things

Co-authored-by: Bernd Verst <me@bernd.dev>
Co-authored-by: Yaron Schneider <yaronsc@microsoft.com>
Co-authored-by: Bernd Verst <berndverst@users.noreply.github.com>
2021-08-10 15:06:24 -07:00
Long Dai 7076d6742c
secretstores: support more format of azure key vault (#944)
Signed-off-by: Long Dai <long0dai@foxmail.com>

Co-authored-by: Yaron Schneider <yaronsc@microsoft.com>
2021-07-08 10:43:17 -07:00
Taction 61e07bca0e
Optimize vault secret component error output (#909)
* Optimize vault secret component error output

* add debug log

* fix lint

Co-authored-by: Phil Kedy <phil.kedy@gmail.com>
2021-07-08 10:39:20 -07:00
Simone Banchieri 79109c5fe3
added vaultKVUsePrefix on hashicorp vault secret (#929)
* added vaultKVUsePrefix on hashicorp vault secret

* consolidate if, use ParseBool

* added handling of empty string + test

Co-authored-by: Phil Kedy <phil.kedy@gmail.com>
Co-authored-by: Artur Souza <artursouza.ms@outlook.com>
Co-authored-by: Dapr Bot <56698301+dapr-bot@users.noreply.github.com>
2021-06-22 10:16:22 -07:00
Phil Kedy a28587ed98
Resolving gofumpt issues (#932) 2021-06-09 15:18:50 -07:00
Donovan Brown 448bf2b261
Added vaultToken support (#796) 2021-05-13 10:33:03 -07:00
Donovan Brown 4a1cfea325
Fixed bug where default vaultaddr is never used. (#791)
* Fixed bug where default vaultaddr is never used.

* Fixing vault tests on Windows.

Co-authored-by: Phil Kedy <phil.kedy@gmail.com>
2021-04-28 12:23:17 -07:00
Phil Kedy 688df9bda4
Removed dependency on dapr/dapr in favor of dapr/kit. Fixed go mod dependencies afterwards. Go 1.16 in go.mod. Removed accidental log dependency. (#807) 2021-04-19 12:06:10 -07:00
Sivamuthu Kumar 8ba6a46c4c
AWS SSM Parameter Store (#747)
* (feat) AWS SSM Parameter Store implementation

* AWS SSM Parameter store unit tests

* AWS SSM Parameter store integration tests and style fix

* Lint fix
2021-03-12 11:41:47 -08:00
Yaron Schneider 3ef025c604
change headers (#679) 2021-02-09 18:57:55 -08:00
Carlos Mendible d9eec0fa8a
Checking that returned secrets are enabled #656 (#675)
Co-authored-by: Yaron Schneider <yaronsc@microsoft.com>
2021-02-09 11:28:03 -08:00
Nghia Tran e5ed9e0095
Fix Azure KeyVault secretstore BulkGet URI parsing of the GetSecretsComplete response (#657)
* Fix Azure Keyvault secretstore BulkGet

To make it works with URI of form "{vaultURI}/secrets/{itemID}" in the
GetSecretsComplete response.

* Fix lint comment

* Address PR feedback

Co-authored-by: Artur Souza <artursouza.ms@outlook.com>
2021-02-04 15:08:51 -08:00
Artur Souza 11454d7ccf
Fix get bulk secret for hashicorp vault. (#632) 2021-01-25 11:41:03 -08:00
Carlos Mendible 5018196c58
Updated GCP SecretManager BulkGetSecret #590 (#613) 2021-01-20 08:28:31 -08:00
Carlos Mendible f3524ff39e
Fixed #590 (#591) 2021-01-18 11:38:19 -08:00
Mark Chmarny 8a5b1625e8
Adds BulkGetSecrets method to the SecretStore interface (#561)
Addresses #559

Co-authored-by: Yaron Schneider <yaronsc@microsoft.com>
2021-01-06 15:19:30 -08:00
Artur Souza e82cf0c630
Fallback to NAMESPACE env for get secret on K8s. (#564) 2020-12-30 11:36:25 -08:00
Yaron Schneider a03a96c282
update kubernetes packages to 1.20 (#557) 2020-12-16 10:43:27 -08:00
Artur Souza 9391dc7864
Fixing file secretstore to support custom separator. (#551) 2020-12-07 09:26:42 -08:00
Trond Hindenes 8d6978372f
Various AWS improvements (#525)
* Support sessiontoken

* Fixed tests and other components

* Fixed tests and things

* fmt

* Fix lint errors

* gofmt

* Fixed lint bugs

* Remove unneeded parameter

* gofmt

Co-authored-by: Yaron Schneider <yaronsc@microsoft.com>
2020-11-23 13:21:29 -08:00
Carlos Mendible 686b42fd18
Fixing #522 (#523) 2020-11-13 09:52:26 -08:00
Carlos Mendible 20278e7f3a
Implementing BulkGetSecret (#310) 2020-11-09 16:09:08 -08:00
Carlos Mendible 2ae711d3e0
removing cloudkms secret store #495 (#496) 2020-10-13 16:16:45 -07:00
halspang f647d9eedb
Upgrade golang lint to 1.31 (#490)
Upgrade golang lint to 1.31.0

https://github.com/dapr/components-contrib/issues/439
2020-10-12 12:54:15 -07:00
Mark Chmarny 5fdcbe9fe5
refactors local secret, adds env var imp dapr issue #1961 (#444)
* refactors local secret, adds env var imp

* env store test

* removed unused test const
2020-08-25 12:26:25 -07:00
Mukundan Sundararajan c6623da87e
Change Kubernetes client to official go-client in the events binding. (#436)
* Change Kubernetes client to official go-client in the events binding.

* Change adding flags to init

* go mod tidy

* Proper call for handler

* Remove commented out code

* Refactor indentation
2020-08-18 11:49:06 -07:00
Carlos Mendible 3221db9709
Fixing #360 (#361)
Co-authored-by: Young Bu Park <youngp@microsoft.com>
2020-06-16 15:32:26 -07:00
Mukundan Sundararajan 5c62707aba
Upgrade go version to 1.14.3 and linter version to 1.26.0 (#352)
* Upgrade to go 1.14.3 and linter version to 1.26.0
2020-05-29 15:26:33 -07:00
Carlos Mendible 0d58c00bcf
Added jsonsecretstore (#328)
Co-authored-by: Aman Bhardwaj <amanbha@users.noreply.github.com>
2020-05-29 05:55:45 -07:00
Trond Hindenes d3e9a7b3a7
Use shared aws auth package (#347)
* Use shared sqs auth package

* Goimports-ed files

* Added support for endpoint param in aws credentials abstraction, since the sqs-sns pubsub module required it

* Added endpoint support for all aws things

* Updated tests
2020-05-26 16:27:16 -07:00
Yaron Schneider 21853a1182
fix key for azure keyvault (#267) 2020-03-09 21:56:11 -07:00
Ricardo Niepel c2ca36ea86
Adding Hashicorp Vault (#258) 2020-03-09 09:37:43 -07:00
Yaron Schneider b210ea0e7f
change version params for aws secrets manager (#240) 2020-03-01 19:59:30 -08:00
Young Bu Park ee97c3c56a
Use dapr logger (#238)
* Use dapr logger

* skip linter false alarm
2020-02-28 15:49:49 -08:00
Carlos Mendible 226bff98ff
Fixed issue preventing authentication fallback to MSI (#206)
* Fixed issue preventing auth fallback to MSI

* Changed variable name

* checking if keys are present
2020-02-04 14:02:17 -08:00
REDDY PRASAD 5f3f850852
Add GCP Secret Manager (#199)
*  Add GCP Secret Manager

* Update tests

* Fix lint errors

* Update as per review

* Run go mod tidy

Co-authored-by: Yaron Schneider <yaronsc@microsoft.com>
2020-01-30 21:51:52 -08:00
Carlos Mendible e5fbb7e825 [WIP] Adding support for Manage Identities in the Azure Key Vault Secret Store (#185)
* Adding support for Manage Identities

* Refactored & changed validation in GetClientCert()

* Updated Client Cert tests

* Fixed linting issue

* Using pointer for k and setting the kv name

* Added MSI Tests

* Decoupling auth utils from keyValueSecretStore

* auth utils decoupled from keyvaultSecretStore

Co-authored-by: Yaron Schneider <yaronsc@microsoft.com>
2020-01-15 13:27:07 -08:00
Abhishek Gupta 9323c44ecf check etag for etcd update and delete ops (#175) 2020-01-09 12:33:23 -08:00
Prafulla Anurag 9ffc7dc2ce Cloudkms secretstore (#121)
* Initial Commit creating cloudkmsclient

* Changes to go.mod go.sum

* Minor changes

* Add basic metadata structure, decrypt function

* Add GetSecret Module

* Add module to fetch secret file from cloud storage

* Finish coding the secret store

* Delete changes to go.mod

* Remove changes from go.mod and go.sum

* Add init test for cloudkms

* fix golint failures

* Edited the documentation
2019-11-29 12:23:23 -08:00
sayboras eabe18a79f Support AWS secret manager as secret store (#142)
* Initial commit

* Initial commit

* Update Readme.md

* Update godoc comment

* Added session token

* Incorporate review comment

* Added the header

* Corrected godoc
2019-11-26 07:36:11 -08:00
Shalabh Mohan Shrivastava bcd23db009
Changes to include Package names pubsub/secret stores/state to be consistent with company name (#137)
* [Commit - PubSub changes ]

Changing the names of the packages directory so to be consistent with name of the company .

It is to be noted that package name can not have hyphen "-" in the name.
So changing the directory names and putting under company names.

For example - servicebus package would be

dapr/components-contrib/pubsub/azure/servicebus

* Commit 2 - Changes for Secret Stores

* Commit 3 - for the state store changes
2019-11-22 12:46:42 -08:00
Anubhav Mishra db7bf1f08b secretstores: adding X-Vault-Request header (#106) 2019-11-05 14:41:49 -08:00
Anubhav Mishra 4bbfb82e98 initial secretstore implementation of HashiCorp Vault (#84)
* initial secretstore implementation of HashiCorp vault

* updates after review

* fixing golangci-lint errors

* fixing temporary directory creation issues
2019-11-01 20:29:06 -07:00
Aman Bhardwaj 04bef3ac3f Adding license header and updating to MIT license. (#26) 2019-10-09 10:58:08 -07:00
Yaron Schneider 2b8dbd2b44
dapr name change (#21) 2019-10-02 13:21:22 -07:00
yaron2 22fea6f43d initial commit 2019-09-26 15:47:41 -07:00