mirror of
https://github.com/Infisical/infisical.git
synced 2025-07-02 16:55:02 +00:00
Compare commits
14 Commits
patch-mult
...
fix/resolv
Author | SHA1 | Date | |
---|---|---|---|
ba0de6afcf | |||
c8a3252c1a | |||
0bba1801b9 | |||
a61e92c49c | |||
9945d249d6 | |||
8329cbf299 | |||
9138ab8ed7 | |||
aafddaa856 | |||
776f464bee | |||
104b0d6c60 | |||
7c9c65312b | |||
8a46cbd08f | |||
fa05639592 | |||
2bd9ad0137 |
@ -77,7 +77,7 @@ type TLdapConfigServiceFactoryDep = {
|
|||||||
>;
|
>;
|
||||||
userAliasDAL: Pick<TUserAliasDALFactory, "create" | "findOne">;
|
userAliasDAL: Pick<TUserAliasDALFactory, "create" | "findOne">;
|
||||||
permissionService: Pick<TPermissionServiceFactory, "getOrgPermission">;
|
permissionService: Pick<TPermissionServiceFactory, "getOrgPermission">;
|
||||||
licenseService: Pick<TLicenseServiceFactory, "getPlan">;
|
licenseService: Pick<TLicenseServiceFactory, "getPlan" | "updateSubscriptionOrgMemberCount">;
|
||||||
};
|
};
|
||||||
|
|
||||||
export type TLdapConfigServiceFactory = ReturnType<typeof ldapConfigServiceFactory>;
|
export type TLdapConfigServiceFactory = ReturnType<typeof ldapConfigServiceFactory>;
|
||||||
@ -510,6 +510,7 @@ export const ldapConfigServiceFactory = ({
|
|||||||
return newUserAlias;
|
return newUserAlias;
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
await licenseService.updateSubscriptionOrgMemberCount(organization.id);
|
||||||
|
|
||||||
const user = await userDAL.transaction(async (tx) => {
|
const user = await userDAL.transaction(async (tx) => {
|
||||||
const newUser = await userDAL.findOne({ id: userAlias.userId }, tx);
|
const newUser = await userDAL.findOne({ id: userAlias.userId }, tx);
|
||||||
|
@ -50,7 +50,7 @@ type TSamlConfigServiceFactoryDep = {
|
|||||||
orgMembershipDAL: Pick<TOrgMembershipDALFactory, "create">;
|
orgMembershipDAL: Pick<TOrgMembershipDALFactory, "create">;
|
||||||
orgBotDAL: Pick<TOrgBotDALFactory, "findOne" | "create" | "transaction">;
|
orgBotDAL: Pick<TOrgBotDALFactory, "findOne" | "create" | "transaction">;
|
||||||
permissionService: Pick<TPermissionServiceFactory, "getOrgPermission">;
|
permissionService: Pick<TPermissionServiceFactory, "getOrgPermission">;
|
||||||
licenseService: Pick<TLicenseServiceFactory, "getPlan">;
|
licenseService: Pick<TLicenseServiceFactory, "getPlan" | "updateSubscriptionOrgMemberCount">;
|
||||||
tokenService: Pick<TAuthTokenServiceFactory, "createTokenForUser">;
|
tokenService: Pick<TAuthTokenServiceFactory, "createTokenForUser">;
|
||||||
smtpService: Pick<TSmtpService, "sendMail">;
|
smtpService: Pick<TSmtpService, "sendMail">;
|
||||||
};
|
};
|
||||||
@ -449,6 +449,7 @@ export const samlConfigServiceFactory = ({
|
|||||||
return newUser;
|
return newUser;
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
await licenseService.updateSubscriptionOrgMemberCount(organization.id);
|
||||||
|
|
||||||
const isUserCompleted = Boolean(user.isAccepted);
|
const isUserCompleted = Boolean(user.isAccepted);
|
||||||
const providerAuthToken = jwt.sign(
|
const providerAuthToken = jwt.sign(
|
||||||
|
@ -391,7 +391,7 @@ export const scimServiceFactory = ({
|
|||||||
);
|
);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
await licenseService.updateSubscriptionOrgMemberCount(org.id);
|
||||||
return { user, orgMembership };
|
return { user, orgMembership };
|
||||||
});
|
});
|
||||||
|
|
||||||
|
@ -677,6 +677,8 @@ export const INTEGRATION = {
|
|||||||
secretAWSTag: "The tags for AWS secrets.",
|
secretAWSTag: "The tags for AWS secrets.",
|
||||||
kmsKeyId: "The ID of the encryption key from AWS KMS.",
|
kmsKeyId: "The ID of the encryption key from AWS KMS.",
|
||||||
shouldDisableDelete: "The flag to disable deletion of secrets in AWS Parameter Store.",
|
shouldDisableDelete: "The flag to disable deletion of secrets in AWS Parameter Store.",
|
||||||
|
shouldMaskSecrets: "Specifies if the secrets synced from Infisical to Gitlab should be marked as 'Masked'.",
|
||||||
|
shouldProtectSecrets: "Specifies if the secrets synced from Infisical to Gitlab should be marked as 'Protected'.",
|
||||||
shouldEnableDelete: "The flag to enable deletion of secrets"
|
shouldEnableDelete: "The flag to enable deletion of secrets"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
@ -1921,13 +1921,13 @@ const syncSecretsGitLab = async ({
|
|||||||
return allEnvVariables;
|
return allEnvVariables;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
const metadata = IntegrationMetadataSchema.parse(integration.metadata);
|
||||||
const allEnvVariables = await getAllEnvVariables(integration?.appId as string, accessToken);
|
const allEnvVariables = await getAllEnvVariables(integration?.appId as string, accessToken);
|
||||||
const getSecretsRes: GitLabSecret[] = allEnvVariables
|
const getSecretsRes: GitLabSecret[] = allEnvVariables
|
||||||
.filter((secret: GitLabSecret) => secret.environment_scope === integration.targetEnvironment)
|
.filter((secret: GitLabSecret) => secret.environment_scope === integration.targetEnvironment)
|
||||||
.filter((gitLabSecret) => {
|
.filter((gitLabSecret) => {
|
||||||
let isValid = true;
|
let isValid = true;
|
||||||
|
|
||||||
const metadata = z.record(z.any()).parse(integration.metadata);
|
|
||||||
if (metadata.secretPrefix && !gitLabSecret.key.startsWith(metadata.secretPrefix)) {
|
if (metadata.secretPrefix && !gitLabSecret.key.startsWith(metadata.secretPrefix)) {
|
||||||
isValid = false;
|
isValid = false;
|
||||||
}
|
}
|
||||||
@ -1947,8 +1947,8 @@ const syncSecretsGitLab = async ({
|
|||||||
{
|
{
|
||||||
key,
|
key,
|
||||||
value: secrets[key].value,
|
value: secrets[key].value,
|
||||||
protected: false,
|
protected: Boolean(metadata.shouldProtectSecrets),
|
||||||
masked: false,
|
masked: Boolean(metadata.shouldMaskSecrets),
|
||||||
raw: false,
|
raw: false,
|
||||||
environment_scope: integration.targetEnvironment
|
environment_scope: integration.targetEnvironment
|
||||||
},
|
},
|
||||||
@ -1965,7 +1965,9 @@ const syncSecretsGitLab = async ({
|
|||||||
`${gitLabApiUrl}/v4/projects/${integration?.appId}/variables/${existingSecret.key}?filter[environment_scope]=${integration.targetEnvironment}`,
|
`${gitLabApiUrl}/v4/projects/${integration?.appId}/variables/${existingSecret.key}?filter[environment_scope]=${integration.targetEnvironment}`,
|
||||||
{
|
{
|
||||||
...existingSecret,
|
...existingSecret,
|
||||||
value: secrets[existingSecret.key].value
|
value: secrets[existingSecret.key].value,
|
||||||
|
protected: Boolean(metadata.shouldProtectSecrets),
|
||||||
|
masked: Boolean(metadata.shouldMaskSecrets)
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
headers: {
|
headers: {
|
||||||
|
@ -31,5 +31,7 @@ export const IntegrationMetadataSchema = z.object({
|
|||||||
.describe(INTEGRATION.CREATE.metadata.secretAWSTag),
|
.describe(INTEGRATION.CREATE.metadata.secretAWSTag),
|
||||||
kmsKeyId: z.string().optional().describe(INTEGRATION.CREATE.metadata.kmsKeyId),
|
kmsKeyId: z.string().optional().describe(INTEGRATION.CREATE.metadata.kmsKeyId),
|
||||||
shouldDisableDelete: z.boolean().optional().describe(INTEGRATION.CREATE.metadata.shouldDisableDelete),
|
shouldDisableDelete: z.boolean().optional().describe(INTEGRATION.CREATE.metadata.shouldDisableDelete),
|
||||||
shouldEnableDelete: z.boolean().optional().describe(INTEGRATION.CREATE.metadata.shouldEnableDelete)
|
shouldEnableDelete: z.boolean().optional().describe(INTEGRATION.CREATE.metadata.shouldEnableDelete),
|
||||||
|
shouldMaskSecrets: z.boolean().optional().describe(INTEGRATION.CREATE.metadata.shouldMaskSecrets),
|
||||||
|
shouldProtectSecrets: z.boolean().optional().describe(INTEGRATION.CREATE.metadata.shouldProtectSecrets)
|
||||||
});
|
});
|
||||||
|
@ -29,6 +29,8 @@ export type TCreateIntegrationDTO = {
|
|||||||
}[];
|
}[];
|
||||||
kmsKeyId?: string;
|
kmsKeyId?: string;
|
||||||
shouldDisableDelete?: boolean;
|
shouldDisableDelete?: boolean;
|
||||||
|
shouldMaskSecrets?: boolean;
|
||||||
|
shouldProtectSecrets?: boolean;
|
||||||
shouldEnableDelete?: boolean;
|
shouldEnableDelete?: boolean;
|
||||||
};
|
};
|
||||||
} & Omit<TProjectPermission, "projectId">;
|
} & Omit<TProjectPermission, "projectId">;
|
||||||
|
@ -315,6 +315,7 @@ export const orgServiceFactory = ({
|
|||||||
},
|
},
|
||||||
tx
|
tx
|
||||||
);
|
);
|
||||||
|
await licenseService.updateSubscriptionOrgMemberCount(org.id);
|
||||||
await orgBotDAL.create(
|
await orgBotDAL.create(
|
||||||
{
|
{
|
||||||
name: org.name,
|
name: org.name,
|
||||||
|
@ -309,7 +309,7 @@ export const interpolateSecrets = ({ projectId, secretEncKey, secretDAL, folderD
|
|||||||
};
|
};
|
||||||
|
|
||||||
const expandSecrets = async (
|
const expandSecrets = async (
|
||||||
secrets: Record<string, { value: string; comment?: string; skipMultilineEncoding?: boolean | null }>
|
secrets: Record<string, { value: string; comment?: string; skipMultilineEncoding?: boolean }>
|
||||||
) => {
|
) => {
|
||||||
const expandedSec: Record<string, string> = {};
|
const expandedSec: Record<string, string> = {};
|
||||||
const interpolatedSec: Record<string, string> = {};
|
const interpolatedSec: Record<string, string> = {};
|
||||||
@ -329,8 +329,8 @@ export const interpolateSecrets = ({ projectId, secretEncKey, secretDAL, folderD
|
|||||||
// should not do multi line encoding if user has set it to skip
|
// should not do multi line encoding if user has set it to skip
|
||||||
// eslint-disable-next-line
|
// eslint-disable-next-line
|
||||||
secrets[key].value = secrets[key].skipMultilineEncoding
|
secrets[key].value = secrets[key].skipMultilineEncoding
|
||||||
? formatMultiValueEnv(expandedSec[key])
|
? expandedSec[key]
|
||||||
: expandedSec[key];
|
: formatMultiValueEnv(expandedSec[key]);
|
||||||
// eslint-disable-next-line
|
// eslint-disable-next-line
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
@ -347,7 +347,7 @@ export const interpolateSecrets = ({ projectId, secretEncKey, secretDAL, folderD
|
|||||||
);
|
);
|
||||||
|
|
||||||
// eslint-disable-next-line
|
// eslint-disable-next-line
|
||||||
secrets[key].value = secrets[key].skipMultilineEncoding ? formatMultiValueEnv(expandedVal) : expandedVal;
|
secrets[key].value = secrets[key].skipMultilineEncoding ? expandedVal : formatMultiValueEnv(expandedVal);
|
||||||
}
|
}
|
||||||
|
|
||||||
return secrets;
|
return secrets;
|
||||||
@ -395,8 +395,7 @@ export const decryptSecretRaw = (
|
|||||||
type: secret.type,
|
type: secret.type,
|
||||||
_id: secret.id,
|
_id: secret.id,
|
||||||
id: secret.id,
|
id: secret.id,
|
||||||
user: secret.userId,
|
user: secret.userId
|
||||||
skipMultilineEncoding: secret.skipMultilineEncoding
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -1,4 +1,6 @@
|
|||||||
/* eslint-disable no-await-in-loop */
|
/* eslint-disable no-await-in-loop */
|
||||||
|
import { AxiosError } from "axios";
|
||||||
|
|
||||||
import { getConfig } from "@app/lib/config/env";
|
import { getConfig } from "@app/lib/config/env";
|
||||||
import { decryptSymmetric128BitHexKeyUTF8 } from "@app/lib/crypto";
|
import { decryptSymmetric128BitHexKeyUTF8 } from "@app/lib/crypto";
|
||||||
import { daysToMillisecond, secondsToMillis } from "@app/lib/dates";
|
import { daysToMillisecond, secondsToMillis } from "@app/lib/dates";
|
||||||
@ -67,10 +69,7 @@ const MAX_SYNC_SECRET_DEPTH = 5;
|
|||||||
export const uniqueSecretQueueKey = (environment: string, secretPath: string) =>
|
export const uniqueSecretQueueKey = (environment: string, secretPath: string) =>
|
||||||
`secret-queue-dedupe-${environment}-${secretPath}`;
|
`secret-queue-dedupe-${environment}-${secretPath}`;
|
||||||
|
|
||||||
type TIntegrationSecret = Record<
|
type TIntegrationSecret = Record<string, { value: string; comment?: string; skipMultilineEncoding?: boolean }>;
|
||||||
string,
|
|
||||||
{ value: string; comment?: string; skipMultilineEncoding?: boolean | null | undefined }
|
|
||||||
>;
|
|
||||||
export const secretQueueFactory = ({
|
export const secretQueueFactory = ({
|
||||||
queueService,
|
queueService,
|
||||||
integrationDAL,
|
integrationDAL,
|
||||||
@ -570,11 +569,14 @@ export const secretQueueFactory = ({
|
|||||||
isSynced: true
|
isSynced: true
|
||||||
});
|
});
|
||||||
} catch (err: unknown) {
|
} catch (err: unknown) {
|
||||||
logger.info("Secret integration sync error:", err);
|
logger.info("Secret integration sync error: %o", err);
|
||||||
|
const message =
|
||||||
|
err instanceof AxiosError ? JSON.stringify((err as AxiosError)?.response?.data) : (err as Error)?.message;
|
||||||
|
|
||||||
await integrationDAL.updateById(integration.id, {
|
await integrationDAL.updateById(integration.id, {
|
||||||
lastSyncJobId: job.id,
|
lastSyncJobId: job.id,
|
||||||
lastUsed: new Date(),
|
lastUsed: new Date(),
|
||||||
syncMessage: (err as Error)?.message,
|
syncMessage: message,
|
||||||
isSynced: false
|
isSynced: false
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
@ -971,24 +971,10 @@ export const secretServiceFactory = ({
|
|||||||
});
|
});
|
||||||
|
|
||||||
const batchSecretsExpand = async (
|
const batchSecretsExpand = async (
|
||||||
secretBatch: {
|
secretBatch: { secretKey: string; secretValue: string; secretComment?: string; secretPath: string }[]
|
||||||
secretKey: string;
|
|
||||||
secretValue: string;
|
|
||||||
secretComment?: string;
|
|
||||||
secretPath: string;
|
|
||||||
skipMultilineEncoding: boolean | null | undefined;
|
|
||||||
}[]
|
|
||||||
) => {
|
) => {
|
||||||
// Group secrets by secretPath
|
// Group secrets by secretPath
|
||||||
const secretsByPath: Record<
|
const secretsByPath: Record<string, { secretKey: string; secretValue: string; secretComment?: string }[]> = {};
|
||||||
string,
|
|
||||||
{
|
|
||||||
secretKey: string;
|
|
||||||
secretValue: string;
|
|
||||||
secretComment?: string;
|
|
||||||
skipMultilineEncoding: boolean | null | undefined;
|
|
||||||
}[]
|
|
||||||
> = {};
|
|
||||||
|
|
||||||
secretBatch.forEach((secret) => {
|
secretBatch.forEach((secret) => {
|
||||||
if (!secretsByPath[secret.secretPath]) {
|
if (!secretsByPath[secret.secretPath]) {
|
||||||
@ -1004,15 +990,11 @@ export const secretServiceFactory = ({
|
|||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
|
|
||||||
const secretRecord: Record<
|
const secretRecord: Record<string, { value: string; comment?: string; skipMultilineEncoding?: boolean }> = {};
|
||||||
string,
|
|
||||||
{ value: string; comment?: string; skipMultilineEncoding: boolean | null | undefined }
|
|
||||||
> = {};
|
|
||||||
secretsByPath[secPath].forEach((decryptedSecret) => {
|
secretsByPath[secPath].forEach((decryptedSecret) => {
|
||||||
secretRecord[decryptedSecret.secretKey] = {
|
secretRecord[decryptedSecret.secretKey] = {
|
||||||
value: decryptedSecret.secretValue,
|
value: decryptedSecret.secretValue,
|
||||||
comment: decryptedSecret.secretComment,
|
comment: decryptedSecret.secretComment
|
||||||
skipMultilineEncoding: decryptedSecret.skipMultilineEncoding
|
|
||||||
};
|
};
|
||||||
});
|
});
|
||||||
|
|
||||||
|
@ -384,6 +384,7 @@
|
|||||||
"pages": [
|
"pages": [
|
||||||
"sdks/languages/node",
|
"sdks/languages/node",
|
||||||
"sdks/languages/python",
|
"sdks/languages/python",
|
||||||
|
"sdks/languages/go",
|
||||||
"sdks/languages/java",
|
"sdks/languages/java",
|
||||||
"sdks/languages/csharp"
|
"sdks/languages/csharp"
|
||||||
]
|
]
|
||||||
|
438
docs/sdks/languages/go.mdx
Normal file
438
docs/sdks/languages/go.mdx
Normal file
@ -0,0 +1,438 @@
|
|||||||
|
---
|
||||||
|
title: "Infisical Go SDK"
|
||||||
|
sidebarTitle: "Go"
|
||||||
|
icon: "golang"
|
||||||
|
---
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
If you're working with Go Lang, the official [Infisical Go SDK](https://github.com/infisical/go-sdk) package is the easiest way to fetch and work with secrets for your application.
|
||||||
|
|
||||||
|
- [Package](https://pkg.go.dev/github.com/infisical/go-sdk)
|
||||||
|
- [Github Repository](https://github.com/infiscial/go-sdk)
|
||||||
|
|
||||||
|
## Basic Usage
|
||||||
|
|
||||||
|
```go
|
||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
|
||||||
|
infisical "github.com/infisical/go-sdk"
|
||||||
|
)
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
|
||||||
|
client, err := infisical.NewInfisicalClient(infisical.Config{
|
||||||
|
SiteUrl: "https://app.infisical.com", // Optional, default is https://app.infisical.com
|
||||||
|
})
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
fmt.Printf("Error: %v", err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err = client.Auth().UniversalAuthLogin("YOUR_CLIENT_ID", "YOUR_CLIENT_SECRET")
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
fmt.Printf("Authentication failed: %v", err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
|
||||||
|
apiKeySecret, err := client.Secrets().Retrieve(infisical.RetrieveSecretOptions{
|
||||||
|
SecretKey: "API_KEY",
|
||||||
|
Environment: "dev",
|
||||||
|
ProjectID: "YOUR_PROJECT_ID",
|
||||||
|
SecretPath: "/",
|
||||||
|
})
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
fmt.Printf("Error: %v", err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
|
||||||
|
fmt.Printf("API Key Secret: %v", apiKeySecret)
|
||||||
|
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
This example demonstrates how to use the Infisical Go SDK in a simple Go application. The application retrieves a secret named `API_KEY` from the `dev` environment of the `YOUR_PROJECT_ID` project.
|
||||||
|
|
||||||
|
<Warning>
|
||||||
|
We do not recommend hardcoding your [Machine Identity Tokens](/platform/identities/overview). Setting it as an environment variable would be best.
|
||||||
|
</Warning>
|
||||||
|
|
||||||
|
# Installation
|
||||||
|
|
||||||
|
```console
|
||||||
|
$ go get github.com/infisical/go-sdk
|
||||||
|
```
|
||||||
|
# Configuration
|
||||||
|
|
||||||
|
Import the SDK and create a client instance.
|
||||||
|
|
||||||
|
```go
|
||||||
|
client, err := infisical.NewInfisicalClient(infisical.Config{
|
||||||
|
SiteUrl: "https://app.infisical.com", // Optional, default is https://api.infisical.com
|
||||||
|
})
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
fmt.Printf("Error: %v", err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
### ClientSettings methods
|
||||||
|
|
||||||
|
<ParamField query="options" type="object">
|
||||||
|
<Expandable title="properties">
|
||||||
|
<ParamField query="SiteUrl" type="string" optional>
|
||||||
|
The URL of the Infisical API. Default is `https://api.infisical.com`.
|
||||||
|
</ParamField>
|
||||||
|
|
||||||
|
<ParamField query="UserAgent" type="string" required>
|
||||||
|
Optionally set the user agent that will be used for HTTP requests. _(Not recommended)_
|
||||||
|
</ParamField>
|
||||||
|
</Expandable>
|
||||||
|
|
||||||
|
</ParamField>
|
||||||
|
|
||||||
|
### Authentication
|
||||||
|
|
||||||
|
The SDK supports a variety of authentication methods. The most common authentication method is Universal Auth, which uses a client ID and client secret to authenticate.
|
||||||
|
|
||||||
|
#### Universal Auth
|
||||||
|
|
||||||
|
**Using environment variables**
|
||||||
|
|
||||||
|
Call `.Auth().UniversalAuthLogin()` with empty arguments to use the following environment variables:
|
||||||
|
|
||||||
|
- `INFISICAL_UNIVERSAL_AUTH_CLIENT_ID` - Your machine identity client ID.
|
||||||
|
- `INFISICAL_UNIVERSAL_AUTH_CLIENT_SECRET` - Your machine identity client secret.
|
||||||
|
|
||||||
|
**Using the SDK directly**
|
||||||
|
```go
|
||||||
|
_, err := client.Auth().UniversalAuthLogin("CLIENT_ID", "CLIENT_SECRET")
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
fmt.Println(err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
#### GCP ID Token Auth
|
||||||
|
<Info>
|
||||||
|
Please note that this authentication method will only work if you're running your application on Google Cloud Platform.
|
||||||
|
Please [read more](/documentation/platform/identities/gcp-auth) about this authentication method.
|
||||||
|
</Info>
|
||||||
|
|
||||||
|
**Using environment variables**
|
||||||
|
|
||||||
|
Call `.Auth().GcpIdTokenAuthLogin()` with empty arguments to use the following environment variables:
|
||||||
|
|
||||||
|
- `INFISICAL_GCP_AUTH_IDENTITY_ID` - Your Infisical Machine Identity ID.
|
||||||
|
|
||||||
|
**Using the SDK directly**
|
||||||
|
```go
|
||||||
|
_, err := client.Auth().GcpIdTokenAuthLogin("YOUR_MACHINE_IDENTITY_ID")
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
fmt.Println(err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
#### GCP IAM Auth
|
||||||
|
|
||||||
|
**Using environment variables**
|
||||||
|
|
||||||
|
Call `.Auth().GcpIamAuthLogin()` with empty arguments to use the following environment variables:
|
||||||
|
|
||||||
|
- `INFISICAL_GCP_IAM_AUTH_IDENTITY_ID` - Your Infisical Machine Identity ID.
|
||||||
|
- `INFISICAL_GCP_IAM_SERVICE_ACCOUNT_KEY_FILE_PATH` - The path to your GCP service account key file.
|
||||||
|
|
||||||
|
**Using the SDK directly**
|
||||||
|
```go
|
||||||
|
_, err = client.Auth().GcpIamAuthLogin("MACHINE_IDENTITY_ID", "SERVICE_ACCOUNT_KEY_FILE_PATH")
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
fmt.Println(err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
#### AWS IAM Auth
|
||||||
|
<Info>
|
||||||
|
Please note that this authentication method will only work if you're running your application on AWS.
|
||||||
|
Please [read more](/documentation/platform/identities/aws-auth) about this authentication method.
|
||||||
|
</Info>
|
||||||
|
|
||||||
|
**Using environment variables**
|
||||||
|
|
||||||
|
Call `.Auth().AwsIamAuthLogin()` with empty arguments to use the following environment variables:
|
||||||
|
|
||||||
|
- `INFISICAL_AWS_IAM_AUTH_IDENTITY_ID` - Your Infisical Machine Identity ID.
|
||||||
|
|
||||||
|
**Using the SDK directly**
|
||||||
|
```go
|
||||||
|
_, err = client.Auth().AwsIamAuthLogin("MACHINE_IDENTITY_ID")
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
fmt.Println(err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
#### Azure Auth
|
||||||
|
<Info>
|
||||||
|
Please note that this authentication method will only work if you're running your application on Azure.
|
||||||
|
Please [read more](/documentation/platform/identities/azure-auth) about this authentication method.
|
||||||
|
</Info>
|
||||||
|
|
||||||
|
**Using environment variables**
|
||||||
|
|
||||||
|
Call `.Auth().AzureAuthLogin()` with empty arguments to use the following environment variables:
|
||||||
|
|
||||||
|
- `INFISICAL_AZURE_AUTH_IDENTITY_ID` - Your Infisical Machine Identity ID.
|
||||||
|
|
||||||
|
**Using the SDK directly**
|
||||||
|
```go
|
||||||
|
_, err = client.Auth().AzureAuthLogin("MACHINE_IDENTITY_ID")
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
fmt.Println(err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
#### Kubernetes Auth
|
||||||
|
<Info>
|
||||||
|
Please note that this authentication method will only work if you're running your application on Kubernetes.
|
||||||
|
Please [read more](/documentation/platform/identities/kubernetes-auth) about this authentication method.
|
||||||
|
</Info>
|
||||||
|
|
||||||
|
**Using environment variables**
|
||||||
|
|
||||||
|
Call `.Auth().KubernetesAuthLogin()` with empty arguments to use the following environment variables:
|
||||||
|
|
||||||
|
- `INFISICAL_KUBERNETES_IDENTITY_ID` - Your Infisical Machine Identity ID.
|
||||||
|
- `INFISICAL_KUBERNETES_SERVICE_ACCOUNT_TOKEN_PATH_ENV_NAME` - The environment variable name that contains the path to the service account token. This is optional and will default to `/var/run/secrets/kubernetes.io/serviceaccount/token`.
|
||||||
|
|
||||||
|
**Using the SDK directly**
|
||||||
|
```go
|
||||||
|
// Service account token path will default to /var/run/secrets/kubernetes.io/serviceaccount/token if empty value is passed
|
||||||
|
_, err = client.Auth().KubernetesAuthLogin("MACHINE_IDENTITY_ID", "SERVICE_ACCOUNT_TOKEN_PATH")
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
fmt.Println(err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
## Working with Secrets
|
||||||
|
|
||||||
|
### client.Secrets().List(options)
|
||||||
|
|
||||||
|
```go
|
||||||
|
secrets, err := client.Secrets().List(infisical.ListSecretsOptions{
|
||||||
|
ProjectID: "PROJECT_ID",
|
||||||
|
Environment: "dev",
|
||||||
|
SecretPath: "/foo/bar",
|
||||||
|
AttachToProcessEnv: false,
|
||||||
|
})
|
||||||
|
```
|
||||||
|
|
||||||
|
Retrieve all secrets within the Infisical project and environment that client is connected to
|
||||||
|
|
||||||
|
#### Parameters
|
||||||
|
|
||||||
|
<ParamField query="Parameters" type="object">
|
||||||
|
<Expandable title="properties">
|
||||||
|
<ParamField query="Environment" type="string" required>
|
||||||
|
The slug name (dev, prod, etc) of the environment from where secrets should be fetched from.
|
||||||
|
</ParamField>
|
||||||
|
|
||||||
|
<ParamField query="ProjectID" type="string">
|
||||||
|
The project ID where the secret lives in.
|
||||||
|
</ParamField>
|
||||||
|
|
||||||
|
<ParamField query="SecretPath" type="string" optional>
|
||||||
|
The path from where secrets should be fetched from.
|
||||||
|
</ParamField>
|
||||||
|
|
||||||
|
<ParamField query="AttachToProcessEnv" type="boolean" default="false" optional>
|
||||||
|
Whether or not to set the fetched secrets to the process environment. If true, you can access the secrets like so `System.getenv("SECRET_NAME")`.
|
||||||
|
</ParamField>
|
||||||
|
|
||||||
|
<ParamField query="IncludeImports" type="boolean" default="false" optional>
|
||||||
|
Whether or not to include imported secrets from the current path. Read about [secret import](/documentation/platform/secret-reference)
|
||||||
|
</ParamField>
|
||||||
|
|
||||||
|
<ParamField query="Recursive" type="boolean" default="false" optional>
|
||||||
|
Whether or not to fetch secrets recursively from the specified path. Please note that there's a 20-depth limit for recursive fetching.
|
||||||
|
</ParamField>
|
||||||
|
|
||||||
|
<ParamField query="ExpandSecretReferences" type="boolean" default="true" optional>
|
||||||
|
Whether or not to expand secret references in the fetched secrets. Read about [secret reference](/documentation/platform/secret-reference)
|
||||||
|
</ParamField>
|
||||||
|
</Expandable>
|
||||||
|
|
||||||
|
</ParamField>
|
||||||
|
|
||||||
|
### client.Secrets().Get(options)
|
||||||
|
|
||||||
|
```go
|
||||||
|
secret, err := client.Secrets().Retrieve(infisical.RetrieveSecretOptions{
|
||||||
|
SecretKey: "API_KEY",
|
||||||
|
ProjectID: "PROJECT_ID",
|
||||||
|
Environment: "dev",
|
||||||
|
})
|
||||||
|
```
|
||||||
|
|
||||||
|
Retrieve a secret from Infisical.
|
||||||
|
|
||||||
|
By default, `Secrets().Get()` fetches and returns a shared secret.
|
||||||
|
|
||||||
|
#### Parameters
|
||||||
|
|
||||||
|
<ParamField query="Parameters" type="object" optional>
|
||||||
|
<Expandable title="properties">
|
||||||
|
<ParamField query="SecretKey" type="string" required>
|
||||||
|
The key of the secret to retrieve.
|
||||||
|
</ParamField>
|
||||||
|
<ParamField query="ProjectID" type="string" required>
|
||||||
|
The project ID where the secret lives in.
|
||||||
|
</ParamField>
|
||||||
|
<ParamField query="Environment" type="string" required>
|
||||||
|
The slug name (dev, prod, etc) of the environment from where secrets should be fetched from.
|
||||||
|
</ParamField>
|
||||||
|
<ParamField query="SecretPath" type="string" optional>
|
||||||
|
The path from where secret should be fetched from.
|
||||||
|
</ParamField>
|
||||||
|
<ParamField query="Type" type="string" optional>
|
||||||
|
The type of the secret. Valid options are "shared" or "personal". If not specified, the default value is "shared".
|
||||||
|
</ParamField>
|
||||||
|
</Expandable>
|
||||||
|
</ParamField>
|
||||||
|
|
||||||
|
### client.Secrets().Create(options)
|
||||||
|
|
||||||
|
```go
|
||||||
|
secret, err := client.Secrets().Create(infisical.CreateSecretOptions{
|
||||||
|
ProjectID: "PROJECT_ID",
|
||||||
|
Environment: "dev",
|
||||||
|
|
||||||
|
SecretKey: "NEW_SECRET_KEY",
|
||||||
|
SecretValue: "NEW_SECRET_VALUE",
|
||||||
|
SecretComment: "This is a new secret",
|
||||||
|
})
|
||||||
|
```
|
||||||
|
|
||||||
|
Create a new secret in Infisical.
|
||||||
|
|
||||||
|
#### Parameters
|
||||||
|
|
||||||
|
<ParamField query="Parameters" type="object" optional>
|
||||||
|
<Expandable title="properties">
|
||||||
|
<ParamField query="SecretKey" type="string" required>
|
||||||
|
The key of the secret to create.
|
||||||
|
</ParamField>
|
||||||
|
<ParamField query="SecretValue" type="string" required>
|
||||||
|
The value of the secret.
|
||||||
|
</ParamField>
|
||||||
|
<ParamField query="SecretComment" type="string" optional>
|
||||||
|
A comment for the secret.
|
||||||
|
</ParamField>
|
||||||
|
<ParamField query="ProjectID" type="string" required>
|
||||||
|
The project ID where the secret lives in.
|
||||||
|
</ParamField>
|
||||||
|
<ParamField query="Environment" type="string" required>
|
||||||
|
The slug name (dev, prod, etc) of the environment from where secrets should be fetched from.
|
||||||
|
</ParamField>
|
||||||
|
<ParamField query="SecretPath" type="string" optional>
|
||||||
|
The path from where secret should be created.
|
||||||
|
</ParamField>
|
||||||
|
<ParamField query="Type" type="string" optional>
|
||||||
|
The type of the secret. Valid options are "shared" or "personal". If not specified, the default value is "shared".
|
||||||
|
</ParamField>
|
||||||
|
</Expandable>
|
||||||
|
</ParamField>
|
||||||
|
|
||||||
|
### client.Secrets().Update(options)
|
||||||
|
|
||||||
|
```go
|
||||||
|
secret, err := client.Secrets().Update(infisical.UpdateSecretOptions{
|
||||||
|
ProjectID: "PROJECT_ID",
|
||||||
|
Environment: "dev",
|
||||||
|
SecretKey: "NEW_SECRET_KEY",
|
||||||
|
NewSecretValue: "NEW_SECRET_VALUE",
|
||||||
|
NewSkipMultilineEncoding: false,
|
||||||
|
})
|
||||||
|
```
|
||||||
|
|
||||||
|
Update an existing secret in Infisical.
|
||||||
|
|
||||||
|
#### Parameters
|
||||||
|
|
||||||
|
<ParamField query="Parameters" type="object" optional>
|
||||||
|
<Expandable title="properties">
|
||||||
|
<ParamField query="SecretKey" type="string" required>
|
||||||
|
The key of the secret to update.
|
||||||
|
</ParamField>
|
||||||
|
<ParamField query="NewSecretValue" type="string" required>
|
||||||
|
The new value of the secret.
|
||||||
|
</ParamField>
|
||||||
|
<ParamField query="NewSkipMultilineEncoding" type="boolean" default="false" optional>
|
||||||
|
Whether or not to skip multiline encoding for the new secret value.
|
||||||
|
</ParamField>
|
||||||
|
<ParamField query="ProjectID" type="string" required>
|
||||||
|
The project ID where the secret lives in.
|
||||||
|
</ParamField>
|
||||||
|
<ParamField query="Environment" type="string" required>
|
||||||
|
The slug name (dev, prod, etc) of the environment from where secrets should be fetched from.
|
||||||
|
</ParamField>
|
||||||
|
<ParamField query="SecretPath" type="string" optional>
|
||||||
|
The path from where secret should be updated.
|
||||||
|
</ParamField>
|
||||||
|
<ParamField query="Type" type="string" optional>
|
||||||
|
The type of the secret. Valid options are "shared" or "personal". If not specified, the default value is "shared".
|
||||||
|
</ParamField>
|
||||||
|
</Expandable>
|
||||||
|
</ParamField>
|
||||||
|
|
||||||
|
### client.Secrets().Delete(options)
|
||||||
|
|
||||||
|
```go
|
||||||
|
secret, err := client.Secrets().Delete(infisical.DeleteSecretOptions{
|
||||||
|
ProjectID: "PROJECT_ID",
|
||||||
|
Environment: "dev",
|
||||||
|
SecretKey: "SECRET_KEY",
|
||||||
|
})
|
||||||
|
```
|
||||||
|
|
||||||
|
Delete a secret in Infisical.
|
||||||
|
|
||||||
|
#### Parameters
|
||||||
|
|
||||||
|
<ParamField query="Parameters" type="object" optional>
|
||||||
|
<Expandable title="properties">
|
||||||
|
<ParamField query="SecretKey" type="string">
|
||||||
|
The key of the secret to update.
|
||||||
|
</ParamField>
|
||||||
|
<ParamField query="ProjectID" type="string" required>
|
||||||
|
The project ID where the secret lives in.
|
||||||
|
</ParamField>
|
||||||
|
<ParamField query="Environment" type="string" required>
|
||||||
|
The slug name (dev, prod, etc) of the environment from where secrets should be fetched from.
|
||||||
|
</ParamField>
|
||||||
|
<ParamField query="SecretPath" type="string" optional>
|
||||||
|
The path from where secret should be deleted.
|
||||||
|
</ParamField>
|
||||||
|
<ParamField query="Type" type="string" optional>
|
||||||
|
The type of the secret. Valid options are "shared" or "personal". If not specified, the default value is "shared".
|
||||||
|
</ParamField>
|
||||||
|
</Expandable>
|
||||||
|
</ParamField>
|
@ -73,6 +73,8 @@ export const useCreateIntegration = () => {
|
|||||||
}[];
|
}[];
|
||||||
kmsKeyId?: string;
|
kmsKeyId?: string;
|
||||||
shouldDisableDelete?: boolean;
|
shouldDisableDelete?: boolean;
|
||||||
|
shouldMaskSecrets?: boolean;
|
||||||
|
shouldProtectSecrets?: boolean;
|
||||||
shouldEnableDelete?: boolean;
|
shouldEnableDelete?: boolean;
|
||||||
};
|
};
|
||||||
}) => {
|
}) => {
|
||||||
|
@ -25,6 +25,7 @@ import {
|
|||||||
ModalContent,
|
ModalContent,
|
||||||
Select,
|
Select,
|
||||||
SelectItem,
|
SelectItem,
|
||||||
|
Switch,
|
||||||
Tab,
|
Tab,
|
||||||
TabList,
|
TabList,
|
||||||
TabPanel,
|
TabPanel,
|
||||||
@ -58,7 +59,9 @@ const schema = yup.object({
|
|||||||
targetAppId: yup.string().required("GitLab project is required"),
|
targetAppId: yup.string().required("GitLab project is required"),
|
||||||
targetEnvironment: yup.string(),
|
targetEnvironment: yup.string(),
|
||||||
secretPrefix: yup.string(),
|
secretPrefix: yup.string(),
|
||||||
secretSuffix: yup.string()
|
secretSuffix: yup.string(),
|
||||||
|
shouldMaskSecrets: yup.boolean(),
|
||||||
|
shouldProtectSecrets: yup.boolean()
|
||||||
});
|
});
|
||||||
|
|
||||||
type FormData = yup.InferType<typeof schema>;
|
type FormData = yup.InferType<typeof schema>;
|
||||||
@ -138,7 +141,9 @@ export default function GitLabCreateIntegrationPage() {
|
|||||||
targetAppId,
|
targetAppId,
|
||||||
targetEnvironment,
|
targetEnvironment,
|
||||||
secretPrefix,
|
secretPrefix,
|
||||||
secretSuffix
|
secretSuffix,
|
||||||
|
shouldMaskSecrets,
|
||||||
|
shouldProtectSecrets
|
||||||
}: FormData) => {
|
}: FormData) => {
|
||||||
try {
|
try {
|
||||||
setIsLoading(true);
|
setIsLoading(true);
|
||||||
@ -156,7 +161,9 @@ export default function GitLabCreateIntegrationPage() {
|
|||||||
secretPath,
|
secretPath,
|
||||||
metadata: {
|
metadata: {
|
||||||
secretPrefix,
|
secretPrefix,
|
||||||
secretSuffix
|
secretSuffix,
|
||||||
|
shouldMaskSecrets,
|
||||||
|
shouldProtectSecrets
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
|
||||||
@ -390,6 +397,36 @@ export default function GitLabCreateIntegrationPage() {
|
|||||||
exit={{ opacity: 0, translateX: 30 }}
|
exit={{ opacity: 0, translateX: 30 }}
|
||||||
className="pb-[14.25rem]"
|
className="pb-[14.25rem]"
|
||||||
>
|
>
|
||||||
|
<div className="ml-1">
|
||||||
|
<Controller
|
||||||
|
control={control}
|
||||||
|
name="shouldMaskSecrets"
|
||||||
|
render={({ field: { onChange, value } }) => (
|
||||||
|
<Switch
|
||||||
|
id="should-mask-secrets"
|
||||||
|
onCheckedChange={(isChecked) => onChange(isChecked)}
|
||||||
|
isChecked={value}
|
||||||
|
>
|
||||||
|
<div className="max-w-md">Mark Infisical secrets in Gitlab as 'Masked' secrets</div>
|
||||||
|
</Switch>
|
||||||
|
)}
|
||||||
|
/>
|
||||||
|
</div>
|
||||||
|
<div className="ml-1 mt-4 mb-5">
|
||||||
|
<Controller
|
||||||
|
control={control}
|
||||||
|
name="shouldProtectSecrets"
|
||||||
|
render={({ field: { onChange, value } }) => (
|
||||||
|
<Switch
|
||||||
|
id="should-protect-secrets"
|
||||||
|
onCheckedChange={(isChecked) => onChange(isChecked)}
|
||||||
|
isChecked={value}
|
||||||
|
>
|
||||||
|
Mark Infisical secrets in Gitlab as 'Protected' secrets
|
||||||
|
</Switch>
|
||||||
|
)}
|
||||||
|
/>
|
||||||
|
</div>
|
||||||
<Controller
|
<Controller
|
||||||
control={control}
|
control={control}
|
||||||
name="secretPrefix"
|
name="secretPrefix"
|
||||||
|
@ -45,7 +45,6 @@ export const computeImportedSecretRows = (
|
|||||||
if (importedSecIndex === -1) return [];
|
if (importedSecIndex === -1) return [];
|
||||||
|
|
||||||
const importedSec = importSecrets[importedSecIndex];
|
const importedSec = importSecrets[importedSecIndex];
|
||||||
|
|
||||||
const overridenSec: Record<string, { env: string; secretPath: string }> = {};
|
const overridenSec: Record<string, { env: string; secretPath: string }> = {};
|
||||||
|
|
||||||
for (let i = importedSecIndex + 1; i < importSecrets.length; i += 1) {
|
for (let i = importedSecIndex + 1; i < importSecrets.length; i += 1) {
|
||||||
@ -61,11 +60,28 @@ export const computeImportedSecretRows = (
|
|||||||
overridenSec[el.key] = { env: SECRET_IN_DASHBOARD, secretPath: "" };
|
overridenSec[el.key] = { env: SECRET_IN_DASHBOARD, secretPath: "" };
|
||||||
});
|
});
|
||||||
|
|
||||||
return importedSec.secrets.map(({ key, value }) => ({
|
const importedEntry: Record<string, boolean> = {};
|
||||||
|
const importedSecretEntries: {
|
||||||
|
key: string;
|
||||||
|
value: string;
|
||||||
|
overriden: {
|
||||||
|
env: string;
|
||||||
|
secretPath: string;
|
||||||
|
};
|
||||||
|
}[] = [];
|
||||||
|
|
||||||
|
importedSec.secrets.forEach(({ key, value }) => {
|
||||||
|
if (!importedEntry[key]) {
|
||||||
|
importedSecretEntries.push({
|
||||||
key,
|
key,
|
||||||
value,
|
value,
|
||||||
overriden: overridenSec?.[key]
|
overriden: overridenSec?.[key]
|
||||||
}));
|
});
|
||||||
|
importedEntry[key] = true;
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
return importedSecretEntries;
|
||||||
};
|
};
|
||||||
|
|
||||||
type Props = {
|
type Props = {
|
||||||
@ -159,7 +175,8 @@ export const SecretImportListView = ({
|
|||||||
importEnv.slug === environment &&
|
importEnv.slug === environment &&
|
||||||
isReserved &&
|
isReserved &&
|
||||||
importPath ===
|
importPath ===
|
||||||
`${secretPath === "/" ? "" : secretPath}/${ReservedFolders.SecretReplication
|
`${secretPath === "/" ? "" : secretPath}/${
|
||||||
|
ReservedFolders.SecretReplication
|
||||||
}${replicationImportId}`
|
}${replicationImportId}`
|
||||||
);
|
);
|
||||||
if (reservedImport) {
|
if (reservedImport) {
|
||||||
@ -206,7 +223,8 @@ export const SecretImportListView = ({
|
|||||||
isOpen={popUp.deleteSecretImport.isOpen}
|
isOpen={popUp.deleteSecretImport.isOpen}
|
||||||
deleteKey="unlink"
|
deleteKey="unlink"
|
||||||
title="Do you want to remove this secret import?"
|
title="Do you want to remove this secret import?"
|
||||||
subTitle={`This will unlink secrets from environment ${(popUp.deleteSecretImport?.data as TSecretImport)?.importEnv
|
subTitle={`This will unlink secrets from environment ${
|
||||||
|
(popUp.deleteSecretImport?.data as TSecretImport)?.importEnv
|
||||||
} of path ${(popUp.deleteSecretImport?.data as TSecretImport)?.importPath}?`}
|
} of path ${(popUp.deleteSecretImport?.data as TSecretImport)?.importPath}?`}
|
||||||
onChange={(isOpen) => handlePopUpToggle("deleteSecretImport", isOpen)}
|
onChange={(isOpen) => handlePopUpToggle("deleteSecretImport", isOpen)}
|
||||||
onDeleteApproved={handleSecretImportDelete}
|
onDeleteApproved={handleSecretImportDelete}
|
||||||
|
@ -393,15 +393,15 @@ export const SecretDetailSidebar = ({
|
|||||||
{(isAllowed) => (
|
{(isAllowed) => (
|
||||||
<Switch
|
<Switch
|
||||||
id="skipmultiencoding-option"
|
id="skipmultiencoding-option"
|
||||||
onCheckedChange={(isChecked) => onChange(isChecked)}
|
onCheckedChange={(isChecked) => onChange(!isChecked)}
|
||||||
isChecked={value}
|
isChecked={!value}
|
||||||
onBlur={onBlur}
|
onBlur={onBlur}
|
||||||
isDisabled={!isAllowed}
|
isDisabled={!isAllowed}
|
||||||
className="items-center"
|
className="items-center"
|
||||||
>
|
>
|
||||||
Multi line encoding
|
Enable multi line encoding
|
||||||
<Tooltip
|
<Tooltip
|
||||||
content="When enabled, multiline secrets will be handled by escaping newlines and enclosing the entire value in double quotes."
|
content="Infisical encodes multiline secrets by escaping newlines and wrapping in quotes. To disable, enable this option"
|
||||||
className="z-[100]"
|
className="z-[100]"
|
||||||
>
|
>
|
||||||
<FontAwesomeIcon icon={faCircleQuestion} className="ml-1" size="sm" />
|
<FontAwesomeIcon icon={faCircleQuestion} className="ml-1" size="sm" />
|
||||||
|
Reference in New Issue
Block a user