Conversation
ba3f960 to
3ded4b8
Compare
vmelikyan
approved these changes
Mar 17, 2026
17611f0 to
43d8c8e
Compare
vigneshrajsb
approved these changes
Mar 17, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
📝 Description
This PR introduces a significant upgrade to the secret management engine. It transitions from the deprecated
v1beta1to the stablev1API version of the External Secrets Operator. Additionally, it expands the ecosystem by adding support for three new providers: OpenStack Barbican, HashiCorp Vault, and 1Password.A database migration is included to automatically patch existing configurations, fix legacy typos, and enable the new Barbican provider for OpenStack environments.
🚀 Key Changes
1. External Secrets API Upgrade
apiVersionfromexternal-secrets.io/v1beta1toexternal-secrets.io/v1.2. New Secret Providers & Regex Expansion
SECRET_REF_REGEXto support a wider range of providers.barbican(OpenStack),vault(HashiCorp), andonepassword.{{barbican:secret-name:key}}{{vault:path/to/secret:key}}{{onepassword:vault-id/item-id:key}}3. Database Migration & Bug Fixes
A new Knex migration has been implemented to handle the global configuration update:
barbicanprovider intoglobal_config.gcp-secretmanagerwas used instead of the correctgcp-secretsmanager.downmigration ensures the typo is reverted and the new provider is removed if a rollback is necessary.🧪 Migration Testing Results
The migration was verified by checking the transformation of the
secretProvidersconfiguration in the database:Before Migration:
{ "aws": { "enabled": true, "clusterSecretStore": "aws-secretsmanager", "refreshInterval": "1h", "allowedPrefixes": [] }, "gcp": { "enabled": true, "clusterSecretStore": "gcp-secretmanager", // 🔴 Note the typo "refreshInterval": "1h", "allowedPrefixes": [] } }After Migration:
{ "aws": { "enabled": true, "clusterSecretStore": "aws-secretsmanager", "refreshInterval": "1h", "allowedPrefixes": [] }, "gcp": { "enabled": true, "clusterSecretStore": "gcp-secretsmanager", // ✅ Typo fixed "refreshInterval": "1h", "allowedPrefixes": [] }, "barbican": { // ✅ New Provider added "enabled": true, "clusterSecretStore": "barbican-secretsmanager", "refreshInterval": "1h", "allowedPrefixes": [] } }✅ Checklist
external-secrets.io/v1in all templates and tests.barbican,vault, andonepassword.upanddownscenarios.