-
Notifications
You must be signed in to change notification settings - Fork 25
Add support for ESO resources in disco-agent #780
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -117,3 +117,31 @@ data: | |
| version: v1 | ||
| label-selectors: | ||
| - conjur.org/name=conjur-connect-configmap | ||
| - kind: k8s-dynamic | ||
| name: ark/esoexternalsecrets | ||
| config: | ||
| resource-type: | ||
| group: external-secrets.io | ||
| version: v1 | ||
| resource: externalsecrets | ||
| - kind: k8s-dynamic | ||
| name: ark/esosecretstores | ||
| config: | ||
| resource-type: | ||
| group: external-secrets.io | ||
| version: v1 | ||
| resource: secretstores | ||
| - kind: k8s-dynamic | ||
| name: ark/esoclusterexternalsecrets | ||
| config: | ||
| resource-type: | ||
| group: external-secrets.io | ||
| version: v1 | ||
| resource: clusterexternalsecrets | ||
| - kind: k8s-dynamic | ||
| name: ark/esoclustersecretstores | ||
| config: | ||
| resource-type: | ||
| group: external-secrets.io | ||
| version: v1 | ||
| resource: clustersecretstores | ||
|
Comment on lines
+120
to
+147
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,27 @@ | ||
| # Sample ClusterExternalSecret for e2e testing | ||
| # This is a minimal ClusterExternalSecret CR that will be discovered by the agent. | ||
| # This is a cluster-scoped resource that can create ExternalSecrets in multiple namespaces. | ||
| apiVersion: external-secrets.io/v1 | ||
| kind: ClusterExternalSecret | ||
| metadata: | ||
| name: e2e-test-cluster-external-secret | ||
| labels: | ||
| app.kubernetes.io/name: e2e-test | ||
| app.kubernetes.io/component: cluster-external-secret | ||
| spec: | ||
| externalSecretSpec: | ||
| refreshInterval: 1h | ||
| secretStoreRef: | ||
| name: e2e-test-cluster-secret-store | ||
| kind: ClusterSecretStore | ||
| target: | ||
| name: e2e-test-synced-secret | ||
| creationPolicy: Owner | ||
| data: | ||
| - secretKey: example-key | ||
| remoteRef: | ||
| key: dummy/path/to/secret | ||
| property: password | ||
| namespaceSelector: | ||
| matchLabels: | ||
| environment: test |
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,18 @@ | ||
| # Sample ClusterSecretStore for e2e testing | ||
| # This is a minimal ClusterSecretStore CR that will be discovered by the agent. | ||
| # This is a cluster-scoped resource that can be referenced by ExternalSecrets in any namespace. | ||
| apiVersion: external-secrets.io/v1 | ||
| kind: ClusterSecretStore | ||
| metadata: | ||
| name: e2e-test-cluster-secret-store | ||
| labels: | ||
| app.kubernetes.io/name: e2e-test | ||
| app.kubernetes.io/component: cluster-secret-store | ||
| spec: | ||
| provider: | ||
| # Fake provider configuration - this won't actually work but allows the CR to be created | ||
| fake: | ||
| data: | ||
| - key: dummy/path/to/secret | ||
| value: dummy-value | ||
| version: "1" |
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,25 @@ | ||
| # Sample ExternalSecret for e2e testing | ||
| # This is a minimal ExternalSecret CR that will be discovered by the agent. | ||
| # Note: This requires the External Secrets Operator CRDs to be installed, | ||
| # but does not require a working secrets backend. | ||
| apiVersion: external-secrets.io/v1 | ||
| kind: ExternalSecret | ||
| metadata: | ||
| name: e2e-test-external-secret | ||
| namespace: default | ||
| labels: | ||
| app.kubernetes.io/name: e2e-test | ||
| app.kubernetes.io/component: external-secret | ||
| spec: | ||
| refreshInterval: 1h | ||
| secretStoreRef: | ||
| name: e2e-test-secret-store | ||
| kind: SecretStore | ||
| target: | ||
| name: e2e-test-synced-secret | ||
| creationPolicy: Owner | ||
| data: | ||
| - secretKey: example-key | ||
| remoteRef: | ||
| key: dummy/path/to/secret | ||
| property: password |
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,20 @@ | ||
| # Sample SecretStore for e2e testing | ||
| # This is a minimal SecretStore CR that will be discovered by the agent. | ||
| # Note: This requires the External Secrets Operator CRDs to be installed, | ||
| # but does not require a working secrets backend. | ||
| apiVersion: external-secrets.io/v1 | ||
| kind: SecretStore | ||
| metadata: | ||
| name: e2e-test-secret-store | ||
| namespace: default | ||
| labels: | ||
| app.kubernetes.io/name: e2e-test | ||
| app.kubernetes.io/component: secret-store | ||
| spec: | ||
| provider: | ||
| # Fake provider configuration - this won't actually work but allows the CR to be created | ||
| fake: | ||
| data: | ||
| - key: dummy/path/to/secret | ||
| value: dummy-value | ||
| version: "1" |
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
|
|
@@ -80,6 +80,25 @@ kubectl create secret generic e2e-sample-secret-$(date '+%s') \ | |||||
| # in the ark/configmaps data gatherer (conjur.org/name=conjur-connect-configmap). | ||||||
| kubectl apply -f "${root_dir}/hack/ark/conjur-connect-configmap.yaml" | ||||||
|
|
||||||
| # Install External Secrets Operator CRDs and controller | ||||||
| # | ||||||
| # This is required for the agent to discover ExternalSecret and SecretStore resources. | ||||||
| echo "Installing External Secrets Operator..." | ||||||
| helm repo add external-secrets https://charts.external-secrets.io | ||||||
|
||||||
| helm repo add external-secrets https://charts.external-secrets.io | |
| helm repo add external-secrets https://charts.external-secrets.io --force-update |
Copilot
AI
Feb 23, 2026
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This script installs the external-secrets/external-secrets Helm chart from the public https://charts.external-secrets.io repository without pinning to a specific immutable version or verifying integrity, so each test run may execute arbitrary code if the chart repository or DNS is compromised. Because the chart deploys a controller with cluster-level RBAC, a malicious or hijacked chart could access Kubernetes secrets (including the agent-credentials secret created earlier) and other cluster resources. Pin the chart to a specific version or digest and, where possible, add integrity verification to reduce this supply-chain risk.
Uh oh!
There was an error while loading. Please reload this page.