Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release hcp vault-secrets integrations and rotating/dynamic secrets #176

Merged
merged 75 commits into from
Oct 4, 2024

Conversation

mercedesbh
Copy link
Contributor

@mercedesbh mercedesbh commented Oct 4, 2024

Changes proposed in this PR:

This PR encompasses the work for epic https://hashicorp.atlassian.net/browse/VAULT-28135 to gain HCP CLI Parity for Vault Secrets. It includes:

  • General bug fixes/cleanup
  • Managing HVS integrations
  • Managing HVS dynamic and rotating secrets

All changes in this PR have already gone through code review to make into this branch. Those PRs are here:
Screenshot 2024-10-04 at 12 56 01 PM

How I've tested this PR:

This PR includes unit tests, and has also been manually tested during a project bug bash

How I expect reviewers to test this PR:

  1. Checkout this branch
  2. Run make go/build
  3. Execute commands related to HVS integrations or rotating/dynamic secrets (commands can be found here).
Screenshot 2024-10-04 at 12 56 50 PM

Checklist:

  • Tests added if applicable
  • CHANGELOG entry added or label 'pr/no-changelog' added to PR

    Run CHANGELOG_PR=<PR number> make changelog/new-entry for guidance
    in authoring a changelog entry, and commit the resulting file, which should
    have a name matching your PR number. Entries should use imperative present
    tense (e.g. Add support for...)

@mercedesbh mercedesbh marked this pull request as ready for review October 4, 2024 17:57
@mercedesbh mercedesbh requested a review from a team as a code owner October 4, 2024 17:58
Copy link
Contributor

@averche averche left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚢

@mercedesbh mercedesbh merged commit f12aed4 into main Oct 4, 2024
6 checks passed
@mercedesbh mercedesbh deleted the release-hcp-vault-secrets-integrations branch October 4, 2024 21:11
Comment on lines +64 to +73
Flags: cmd.Flags{
Local: []*cmd.Flag{
{
Name: "type",
DisplayValue: "TYPE",
Description: "The type of the integration to read.",
Value: flagvalue.Simple("", &opts.Type),
},
},
},

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sorry for getting to this review late, but I was curious why we needed the --type flag to read an integration!
Could all of the providers use the generic read endpoint instead?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants