SYMBOL INDEX (230 symbols across 25 files) FILE: api/v1alpha1/groupversion_info.go constant Group (line 28) | Group = "secrets-manager.tuenti.io" constant Version (line 29) | Version = "v1alpha1" FILE: api/v1alpha1/secretdefinition_types.go type DataSource (line 23) | type DataSource struct type SecretDefinitionSpec (line 33) | type SecretDefinitionSpec struct type SecretDefinitionStatus (line 42) | type SecretDefinitionStatus struct type SecretDefinition (line 50) | type SecretDefinition struct type SecretDefinitionList (line 61) | type SecretDefinitionList struct function init (line 67) | func init() { FILE: api/v1alpha1/suite_test.go function TestAPIs (line 41) | func TestAPIs(t *testing.T) { FILE: api/v1alpha1/zz_generated.deepcopy.go method DeepCopyInto (line 29) | func (in *DataSource) DeepCopyInto(out *DataSource) { method DeepCopy (line 34) | func (in *DataSource) DeepCopy() *DataSource { method DeepCopyInto (line 44) | func (in *SecretDefinition) DeepCopyInto(out *SecretDefinition) { method DeepCopy (line 53) | func (in *SecretDefinition) DeepCopy() *SecretDefinition { method DeepCopyObject (line 63) | func (in *SecretDefinition) DeepCopyObject() runtime.Object { method DeepCopyInto (line 71) | func (in *SecretDefinitionList) DeepCopyInto(out *SecretDefinitionList) { method DeepCopy (line 85) | func (in *SecretDefinitionList) DeepCopy() *SecretDefinitionList { method DeepCopyObject (line 95) | func (in *SecretDefinitionList) DeepCopyObject() runtime.Object { method DeepCopyInto (line 103) | func (in *SecretDefinitionSpec) DeepCopyInto(out *SecretDefinitionSpec) { method DeepCopy (line 115) | func (in *SecretDefinitionSpec) DeepCopy() *SecretDefinitionSpec { method DeepCopyInto (line 125) | func (in *SecretDefinitionStatus) DeepCopyInto(out *SecretDefinitionStat... method DeepCopy (line 130) | func (in *SecretDefinitionStatus) DeepCopy() *SecretDefinitionStatus { FILE: backend/azure_kv.go constant azureKVEndpoint (line 18) | azureKVEndpoint = "vault.azure.net" type azureKVClient (line 21) | type azureKVClient struct method ReadSecret (line 86) | func (c *azureKVClient) ReadSecret(path string, key string) (string, e... function getAzureCredential (line 29) | func getAzureCredential(ctx context.Context, logger logr.Logger, cfg Con... function azureKeyVaultClient (line 54) | func azureKeyVaultClient(ctx context.Context, l logr.Logger, cfg Config)... FILE: backend/azure_kv_metrics.go type azureKVMetrics (line 24) | type azureKVMetrics struct method updateSecretReadErrorsTotalMetric (line 36) | func (vm *azureKVMetrics) updateSecretReadErrorsTotalMetric(path strin... method updateLoginErrorsTotalMetric (line 46) | func (vm *azureKVMetrics) updateLoginErrorsTotalMetric() { function newAzureKVMetrics (line 28) | func newAzureKVMetrics(keyvaultName string, tenantID string) *azureKVMet... FILE: backend/azure_kv_metrics_test.go function TestAzureKVUpdateLoginErrorsTotal (line 11) | func TestAzureKVUpdateLoginErrorsTotal(t *testing.T) { function TestAzureKVUpdateReadSecretErrorsTotal (line 20) | func TestAzureKVUpdateReadSecretErrorsTotal(t *testing.T) { FILE: backend/azure_kv_test.go constant fakeKeyVaultName (line 21) | fakeKeyVaultName = "azure-keyvault-fake-name" constant fakeKeyVaultTenant (line 22) | fakeKeyVaultTenant = "01234567-0123-0123-0123-0123456789ab" constant fakeKeyVaultSecret (line 23) | fakeKeyVaultSecret = "fake-secret" function akvGetSecret (line 36) | func akvGetSecret(w http.ResponseWriter, r *http.Request) { type FakeCredential (line 88) | type FakeCredential struct method GetToken (line 100) | func (f *FakeCredential) GetToken(ctx context.Context, options policy.... function NewFakeCredential (line 93) | func NewFakeCredential(accountName, accountKey string) *FakeCredential { function TestGetAzureCredential (line 107) | func TestGetAzureCredential(t *testing.T) { function TestAzureKeyVaultClient (line 200) | func TestAzureKeyVaultClient(t *testing.T) { function TestAzureKVClientReadSecret (line 232) | func TestAzureKVClientReadSecret(t *testing.T) { FILE: backend/backend.go constant vaultBackendName (line 12) | vaultBackendName = "vault" constant azureKVBackendName (line 13) | azureKVBackendName = "azure-kv" function init (line 18) | func init() { type Config (line 26) | type Config struct type Client (line 48) | type Client interface function NewBackendClient (line 53) | func NewBackendClient(ctx context.Context, backend string, logger logr.L... FILE: backend/backend_test.go function TestNotImplementedBackend (line 25) | func TestNotImplementedBackend(t *testing.T) { function TestMain (line 34) | func TestMain(m *testing.M) { FILE: backend/decoder.go constant Base64EncodingType (line 11) | Base64EncodingType = "base64" constant TextEncodingType (line 14) | TextEncodingType = "text" constant DefaultEncodingType (line 17) | DefaultEncodingType = "text" type Decoder (line 21) | type Decoder interface type Base64Decoder (line 26) | type Base64Decoder struct method DecodeString (line 36) | func (d Base64Decoder) DecodeString(input string) ([]byte, error) { type TextDecoder (line 31) | type TextDecoder struct method DecodeString (line 45) | func (d TextDecoder) DecodeString(input string) ([]byte, error) { function NewDecoder (line 50) | func NewDecoder(encoding string) (Decoder, error) { FILE: backend/decoder_test.go function TestNotImplementedDecoder (line 11) | func TestNotImplementedDecoder(t *testing.T) { function TestGetB64Decoder (line 17) | func TestGetB64Decoder(t *testing.T) { function TestGetTextDecoder (line 25) | func TestGetTextDecoder(t *testing.T) { function TestGetTextDecoderFromEmptyString (line 33) | func TestGetTextDecoderFromEmptyString(t *testing.T) { function TestDecodeB64String (line 41) | func TestDecodeB64String(t *testing.T) { function TestDecodeInvalidB64String (line 49) | func TestDecodeInvalidB64String(t *testing.T) { function TestDecodeText (line 57) | func TestDecodeText(t *testing.T) { FILE: backend/vault.go constant defaultSecretKey (line 22) | defaultSecretKey = "data" constant kubernetesJwtTokenPath (line 23) | kubernetesJwtTokenPath = "/var/run/secrets/kubernetes.io/serviceaccount/... constant kubernetesAuthMethod (line 24) | kubernetesAuthMethod = "kubernetes" constant appRoleAuthMethod (line 25) | appRoleAuthMethod = "approle" type client (line 28) | type client struct method vaultLogin (line 44) | func (c *client) vaultLogin() error { method vaultAppRoleLogin (line 60) | func (c *client) vaultAppRoleLogin() error { method vaultKubernetesLogin (line 73) | func (c *client) vaultKubernetesLogin(podSATokenReader io.Reader) error { method getToken (line 161) | func (c *client) getToken() (*api.Secret, error) { method getTokenTTL (line 171) | func (c *client) getTokenTTL(token *api.Secret) (int64, error) { method renewToken (line 181) | func (c *client) renewToken(token *api.Secret) error { method renewalLoop (line 200) | func (c *client) renewalLoop() { method startTokenRenewer (line 229) | func (c *client) startTokenRenewer(ctx context.Context) { method ReadSecret (line 244) | func (c *client) ReadSecret(path string, key string) (string, error) { function vaultClient (line 90) | func vaultClient(l logr.Logger, cfg Config) (*client, error) { FILE: backend/vault_engine.go constant kvEngineV1Name (line 9) | kvEngineV1Name = "kv1" constant kvEngineV2Name (line 10) | kvEngineV2Name = "kv2" type engine (line 13) | type engine interface type kvEngineV1 (line 17) | type kvEngineV1 struct method getData (line 25) | func (e kvEngineV1) getData(s *api.Secret) map[string]interface{} { type kvEngineV2 (line 21) | type kvEngineV2 struct method getData (line 29) | func (e kvEngineV2) getData(s *api.Secret) map[string]interface{} { function newEngine (line 36) | func newEngine(eng string) (engine, error) { FILE: backend/vault_engine_test.go function TestNewEngineKV1 (line 12) | func TestNewEngineKV1(t *testing.T) { function TestNewEngineKV2 (line 19) | func TestNewEngineKV2(t *testing.T) { function TestNotImplementedEngine (line 26) | func TestNotImplementedEngine(t *testing.T) { function TestGetDataKv1 (line 33) | func TestGetDataKv1(t *testing.T) { function TestGetDataKv2 (line 43) | func TestGetDataKv2(t *testing.T) { function TestGetDataKv2WithKv1Engine (line 55) | func TestGetDataKv2WithKv1Engine(t *testing.T) { FILE: backend/vault_metrics.go constant vaultLookupSelfOperationName (line 10) | vaultLookupSelfOperationName = "lookup-self" constant vaultRenewSelfOperationName (line 11) | vaultRenewSelfOperationName = "renew-self" constant vaultIsRenewableOperationName (line 12) | vaultIsRenewableOperationName = "is-renewable" type vaultMetrics (line 53) | type vaultMetrics struct method updateVaultMaxTokenTTLMetric (line 77) | func (vm *vaultMetrics) updateVaultMaxTokenTTLMetric(value int64) { method updateVaultTokenTTLMetric (line 86) | func (vm *vaultMetrics) updateVaultTokenTTLMetric(value int64) { method updateVaultSecretReadErrorsTotalMetric (line 95) | func (vm *vaultMetrics) updateVaultSecretReadErrorsTotalMetric(path st... method updateVaultTokenRenewalErrorsTotalMetric (line 107) | func (vm *vaultMetrics) updateVaultTokenRenewalErrorsTotalMetric(vault... method updateVaultLoginErrorsTotalMetric (line 118) | func (vm *vaultMetrics) updateVaultLoginErrorsTotalMetric() { function init (line 57) | func init() { function newVaultMetrics (line 66) | func newVaultMetrics(vaultAddr string, vaultVersion string, vaultEngine ... FILE: backend/vault_metrics_test.go constant fakeVaultAddress (line 12) | fakeVaultAddress = "https://vault.example.com:8200" constant fakeVaultVersion (line 13) | fakeVaultVersion = "0.11.1" constant fakeVaultEngine (line 14) | fakeVaultEngine = "kv2" constant fakeVaultClusterID (line 15) | fakeVaultClusterID = "vault-fake-1" constant fakeVaultClusterName (line 16) | fakeVaultClusterName = "vault-fake" function TestUpdateMaxTokenTTL (line 19) | func TestUpdateMaxTokenTTL(t *testing.T) { function TestUpdateTokenTTL (line 28) | func TestUpdateTokenTTL(t *testing.T) { function TestUpdateTokenLookupErrorsTotal (line 37) | func TestUpdateTokenLookupErrorsTotal(t *testing.T) { function TestUpdateTokenRenewErrorsTotal (line 46) | func TestUpdateTokenRenewErrorsTotal(t *testing.T) { function TestUpdateReadSecretErrorsTotal (line 61) | func TestUpdateReadSecretErrorsTotal(t *testing.T) { FILE: backend/vault_test.go constant vaultAPIVersion (line 19) | vaultAPIVersion = "v1" constant vaultFakeClusterName (line 20) | vaultFakeClusterName = "vault-mock-cluster" constant vaultFakeClusterID (line 21) | vaultFakeClusterID = "vault-mock-cluster-1" constant vaultFakeVersion (line 22) | vaultFakeVersion = "0.11.1" constant selectedBackend (line 23) | selectedBackend = "vault" constant fakeToken (line 24) | fakeToken = "fake-token" constant vaultFakeRoleID (line 25) | vaultFakeRoleID = "12345678-9aaa-bbbb-cccc-dddddddddddd" constant vaultFakeSecretID (line 26) | vaultFakeSecretID = "eeeeeeee-ffff-0000-1111-123456789aaa" constant vaultAppRolePath (line 27) | vaultAppRolePath = "approle" constant defaultTokenTTL (line 28) | defaultTokenTTL = 40 constant defaultTokenRenewable (line 29) | defaultTokenRenewable = true constant defaultRevokedToken (line 30) | defaultRevokedToken = false constant defaultInvalidAppRole (line 31) | defaultInvalidAppRole = false constant defaultKubernetesRole (line 32) | defaultKubernetesRole = false constant fakeKubernetesSAToken (line 33) | fakeKubernetesSAToken = `eyJhbGciOiJIUzM4NCIsInR5cCI6IkpXVCJ9.eyJzdWIiOi... type testConfig (line 36) | type testConfig struct function v1SysHealth (line 49) | func v1SysHealth(w http.ResponseWriter, r *http.Request) { function v1AuthTokenLookupSelf (line 73) | func v1AuthTokenLookupSelf(w http.ResponseWriter, r *http.Request) { function v1AuthTokenRenewSelf (line 120) | func v1AuthTokenRenewSelf(w http.ResponseWriter, r *http.Request) { function v1AuthKubernetesLogin (line 160) | func v1AuthKubernetesLogin(w http.ResponseWriter, r *http.Request) { function v1AuthAppRoleLogin (line 193) | func v1AuthAppRoleLogin(w http.ResponseWriter, r *http.Request) { function v1SecretTestKv2 (line 243) | func v1SecretTestKv2(w http.ResponseWriter, r *http.Request) { function v1SecretTestKv1 (line 274) | func v1SecretTestKv1(w http.ResponseWriter, r *http.Request) { function TestVaultLoginKubernetes (line 297) | func TestVaultLoginKubernetes(t *testing.T) { function TestVaultBackendInvalidCfg (line 316) | func TestVaultBackendInvalidCfg(t *testing.T) { function TestVaultBackend (line 326) | func TestVaultBackend(t *testing.T) { function TestVaultLoginInvalidRoleId (line 334) | func TestVaultLoginInvalidRoleId(t *testing.T) { function TestVaultLoginInvalidSecretId (line 344) | func TestVaultLoginInvalidSecretId(t *testing.T) { function TestVaultClient (line 354) | func TestVaultClient(t *testing.T) { function TestVaultClientInvalidCfg (line 363) | func TestVaultClientInvalidCfg(t *testing.T) { function TestGetToken (line 370) | func TestGetToken(t *testing.T) { function TestGetTokenTTL (line 377) | func TestGetTokenTTL(t *testing.T) { function TestRenewToken (line 390) | func TestRenewToken(t *testing.T) { function TestRenewTokenRevokedToken (line 404) | func TestRenewTokenRevokedToken(t *testing.T) { function TestTokenNotRenewableError (line 421) | func TestTokenNotRenewableError(t *testing.T) { function TestRenewalLoopRevokedToken (line 440) | func TestRenewalLoopRevokedToken(t *testing.T) { function TestRenewalLoopNotRenewableToken (line 452) | func TestRenewalLoopNotRenewableToken(t *testing.T) { function TestRenewalLoopInvalidRoleId (line 468) | func TestRenewalLoopInvalidRoleId(t *testing.T) { function TestRenewalLoopInvalidSecretId (line 485) | func TestRenewalLoopInvalidSecretId(t *testing.T) { function TestReadSecretKv2 (line 502) | func TestReadSecretKv2(t *testing.T) { function TestReadSecretKv1 (line 509) | func TestReadSecretKv1(t *testing.T) { function TestSecretNotFound (line 519) | func TestSecretNotFound(t *testing.T) { FILE: controllers/metrics.go function init (line 34) | func init() { FILE: controllers/secretdefinition_controller.go constant timestampFormat (line 38) | timestampFormat = "2006-01-02T15.04.05Z" constant finalizerName (line 39) | finalizerName = "secret.finalizer." + smv1alpha1.Group constant managedByLabel (line 40) | managedByLabel = "app.kubernetes.io/managed-by" constant lastUpdateLabel (line 41) | lastUpdateLabel = smv1alpha1.Group + "/lastUpdateTime" type SecretDefinitionReconciler (line 45) | type SecretDefinitionReconciler struct method getDesiredState (line 121) | func (r *SecretDefinitionReconciler) getDesiredState(keysMap map[strin... method getCurrentState (line 146) | func (r *SecretDefinitionReconciler) getCurrentState(ctx context.Conte... method upsertSecret (line 164) | func (r *SecretDefinitionReconciler) upsertSecret(ctx context.Context,... method deleteSecret (line 174) | func (r *SecretDefinitionReconciler) deleteSecret(ctx context.Context,... method shouldExclude (line 185) | func (r *SecretDefinitionReconciler) shouldExclude(sDefNamespace strin... method AddFinalizerIfNotPresent (line 193) | func (r *SecretDefinitionReconciler) AddFinalizerIfNotPresent(ctx cont... method Reconcile (line 235) | func (r *SecretDefinitionReconciler) Reconcile(ctx context.Context, re... method SetupWithManager (line 318) | func (r *SecretDefinitionReconciler) SetupWithManager(mgr ctrl.Manager... type skipfn (line 59) | type skipfn function noSkip (line 61) | func noSkip(_ string) bool { function skipAnnotation (line 65) | func skipAnnotation(key string) bool { function mergeMap (line 69) | func mergeMap(dst map[string]string, srcMap map[string]string, skipKey s... function getSecretFromSecretDefinition (line 78) | func getSecretFromSecretDefinition(sDef *smv1alpha1.SecretDefinition, da... function containsString (line 88) | func containsString(slice []string, s string) bool { function removeString (line 97) | func removeString(slice []string, s string) (result []string) { function ignoreNotFoundError (line 108) | func ignoreNotFoundError(err error) error { function isNotMarkedForRemoval (line 116) | func isNotMarkedForRemoval(sDef smv1alpha1.SecretDefinition) bool { function getObjectMetaFromSecretDefinition (line 202) | func getObjectMetaFromSecretDefinition(sDef *smv1alpha1.SecretDefinition... function init (line 325) | func init() { FILE: controllers/secretdefinition_controller_test.go constant encodedValue (line 25) | encodedValue = "bG9yZW0gaXBzdW0gZG9ybWEK" constant decodedValue (line 26) | decodedValue = "lorem ipsum dorma" FILE: controllers/suite_test.go type fakeBackendSecret (line 53) | type fakeBackendSecret struct type fakeBackend (line 59) | type fakeBackend struct method ReadSecret (line 69) | func (f fakeBackend) ReadSecret(path string, key string) (string, erro... function newFakeBackend (line 63) | func newFakeBackend(fakeSecrets []fakeBackendSecret) fakeBackend { function getReconciler (line 79) | func getReconciler() *SecretDefinitionReconciler { function getConfig (line 83) | func getConfig() *rest.Config { function getScheme (line 87) | func getScheme() *runtime.Scheme { function TestSecretDefinitionController (line 91) | func TestSecretDefinitionController(t *testing.T) { FILE: errors/errors.go constant UnknownErrorType (line 7) | UnknownErrorType = "UnknownError" constant BackendNotImplementedErrorType (line 8) | BackendNotImplementedErrorType = "BackendNotImplementedError" constant BackendSecretNotFoundErrorType (line 9) | BackendSecretNotFoundErrorType = "BackendSecretNotFoundError" constant BackendSecretForbiddenErrorType (line 10) | BackendSecretForbiddenErrorType = "BackendSecretForbiddenError" constant K8sSecretNotFoundErrorType (line 11) | K8sSecretNotFoundErrorType = "K8sSecretNotFoundError" constant EncodingNotImplementedErrorType (line 12) | EncodingNotImplementedErrorType = "EncodingNotImplementedError" constant VaultEngineNotImplementedErrorType (line 13) | VaultEngineNotImplementedErrorType = "VaultEngineNotImplementedError" constant VaultTokenNotRenewableErrorType (line 14) | VaultTokenNotRenewableErrorType = "VaultTokenNotRenewableError" type BackendNotImplementedError (line 18) | type BackendNotImplementedError struct method Error (line 73) | func (e BackendNotImplementedError) Error() string { type BackendSecretNotFoundError (line 24) | type BackendSecretNotFoundError struct method Error (line 77) | func (e BackendSecretNotFoundError) Error() string { type K8sSecretNotFoundError (line 31) | type K8sSecretNotFoundError struct method Error (line 81) | func (e K8sSecretNotFoundError) Error() string { type EncodingNotImplementedError (line 38) | type EncodingNotImplementedError struct method Error (line 85) | func (e EncodingNotImplementedError) Error() string { type VaultEngineNotImplementedError (line 44) | type VaultEngineNotImplementedError struct method Error (line 89) | func (e VaultEngineNotImplementedError) Error() string { type VaultTokenNotRenewableError (line 50) | type VaultTokenNotRenewableError struct method Error (line 93) | func (e VaultTokenNotRenewableError) Error() string { function getErrorType (line 54) | func getErrorType(err error) string { function IsBackendNotImplemented (line 98) | func IsBackendNotImplemented(err error) bool { function IsBackendSecretNotFound (line 103) | func IsBackendSecretNotFound(err error) bool { function IsK8sSecretNotFound (line 108) | func IsK8sSecretNotFound(err error) bool { function IsEncodingNotImplemented (line 113) | func IsEncodingNotImplemented(err error) bool { function IsVaultEngineNotImplemented (line 118) | func IsVaultEngineNotImplemented(err error) bool { function IsVaultTokenNotRenewable (line 123) | func IsVaultTokenNotRenewable(err error) bool { FILE: errors/errors_test.go function TestErrorString (line 11) | func TestErrorString(t *testing.T) { function TestGetErrorType (line 26) | func TestGetErrorType(t *testing.T) { function TestIsBackendNotImplemented (line 43) | func TestIsBackendNotImplemented(t *testing.T) { function TestIsBackendSecretNotFound (line 50) | func TestIsBackendSecretNotFound(t *testing.T) { function TestIsK8sSecretNotFound (line 57) | func TestIsK8sSecretNotFound(t *testing.T) { function TestIsEncodingNotImplemented (line 64) | func TestIsEncodingNotImplemented(t *testing.T) { function TestIsVaultEngineNotImplemented (line 71) | func TestIsVaultEngineNotImplemented(t *testing.T) { function TestIsVaultTokenNotRenewable (line 76) | func TestIsVaultTokenNotRenewable(t *testing.T) { FILE: main.go function init (line 52) | func init() { function main (line 62) | func main() {