deckhand/deckhand
Felipe Monteiro 116fafcec3 Fix condition for checking whether substitution is secret
This is to fix the condition in secrets_manager used to determine
whether the substitution is secret. It currently checks whether the
potential secret reference contains the substring
of 'key-manager/v1/secrets' but the environment-agnostic way
of doing this is to check whether the secret reference contains
the barbican endpoint registered under CONF.barbican.api_endpoint.

Change-Id: I633021571255c8393e19ec60a614ede981a86d9f
2018-03-14 21:51:28 +00:00
..
barbican Fix: Inject secret payload rather than reference into document 2018-02-26 10:17:50 -05:00
client Fix Revision Resource print out in Deckhand client 2018-03-13 22:31:38 -04:00
conf Fix condition for checking whether substitution is secret 2018-03-14 21:51:28 +00:00
control [TrivialFix] Fix AttributeError thrown in revision_documents 2018-02-28 09:48:51 +00:00
db ValidationPolicy integration with Validations API 2018-03-12 12:41:06 -04:00
engine Fix condition for checking whether substitution is secret 2018-03-14 21:51:28 +00:00
policies Rename Deckhand bucket endpoint to buckets for consistency 2017-10-27 19:21:03 +01:00
tests Fix condition for checking whether substitution is secret 2018-03-14 21:51:28 +00:00
__init__.py Oslo config integration (#1) 2017-06-26 16:57:50 -07:00
cmd.py Integrate Deckhand with keystone auth 2017-10-16 19:54:46 +01:00
context.py Integrate Deckhand with keystone auth 2017-10-16 19:54:46 +01:00
errors.py Security fix: Remove document data printout from exception message 2018-03-12 20:42:31 +00:00
factories.py Remove microversions from document versions 2018-02-27 12:37:43 -05:00
policy.py DECKHAND-66: Document substitution implementation 2017-10-13 15:16:27 -04:00
service.py [Trivial Fix] Make profile directory if it doesn't exist 2018-02-15 23:35:09 -05:00
types.py Add functional tests for "owned" documents 2017-12-23 02:25:29 +00:00
utils.py [TrivialFix] Correct regex used in jsonpath_replace 2018-02-28 22:20:48 +00:00