Skip to content

Commit 832b5f0

Browse files
authored
Merge pull request #4582 from Infisical/fix/small-patch
feat: fixed broken access-list and update on k8s doc
2 parents 51a09e4 + 7b7d18f commit 832b5f0

File tree

11 files changed

+33
-12
lines changed

11 files changed

+33
-12
lines changed

backend/src/ee/routes/v1/secret-router.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ export const registerSecretRouter = async (server: FastifyZodProvider) => {
3434
secretName: z.string().trim().describe(RAW_SECRETS.GET_ACCESS_LIST.secretName)
3535
}),
3636
querystring: z.object({
37-
workspaceId: z.string().trim().describe(RAW_SECRETS.GET_ACCESS_LIST.workspaceId),
37+
projectId: z.string().trim().describe(RAW_SECRETS.GET_ACCESS_LIST.projectId),
3838
environment: z.string().trim().describe(RAW_SECRETS.GET_ACCESS_LIST.environment),
3939
secretPath: z
4040
.string()
@@ -54,7 +54,7 @@ export const registerSecretRouter = async (server: FastifyZodProvider) => {
5454
onRequest: verifyAuth([AuthMode.JWT]),
5555
handler: async (req) => {
5656
const { secretName } = req.params;
57-
const { secretPath, environment, workspaceId: projectId } = req.query;
57+
const { secretPath, environment, projectId } = req.query;
5858

5959
return server.services.secret.getSecretAccessList({
6060
actorId: req.permission.id,

backend/src/ee/services/secret-rotation-v2/redis-credentials/redis-credentials-rotation-fns.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,12 +10,12 @@ import {
1010
} from "@app/ee/services/secret-rotation-v2/secret-rotation-v2-types";
1111
import { BadRequestError } from "@app/lib/errors";
1212

13+
import { verifyHostInputValidity } from "../../dynamic-secret/dynamic-secret-fns";
1314
import { DEFAULT_PASSWORD_REQUIREMENTS, generatePassword } from "../shared/utils";
1415
import {
1516
TRedisCredentialsRotationGeneratedCredentials,
1617
TRedisCredentialsRotationWithConnection
1718
} from "./redis-credentials-rotation-types";
18-
import { verifyHostInputValidity } from "../../dynamic-secret/dynamic-secret-fns";
1919

2020
const redactPasswords = (e: unknown, credentials: TRedisCredentialsRotationGeneratedCredentials) => {
2121
const error = e as Error;

backend/src/lib/api-docs/constants.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1049,7 +1049,7 @@ export const RAW_SECRETS = {
10491049
},
10501050
GET_ACCESS_LIST: {
10511051
secretName: "The name of the secret to get the access list for.",
1052-
workspaceId: "The ID of the project where the secret is located.",
1052+
projectId: "The ID of the project where the secret is located.",
10531053
environment: "The slug of the environment where the the secret is located.",
10541054
secretPath: "The folder path where the secret is located."
10551055
}

backend/src/services/certificate-authority/acme/acme-certificate-authority-fns.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,8 @@ import {
2424
import { TKmsServiceFactory } from "@app/services/kms/kms-service";
2525
import { TPkiSubscriberDALFactory } from "@app/services/pki-subscriber/pki-subscriber-dal";
2626
import { TPkiSyncDALFactory } from "@app/services/pki-sync/pki-sync-dal";
27-
import { triggerAutoSyncForSubscriber } from "@app/services/pki-sync/pki-sync-utils";
2827
import { TPkiSyncQueueFactory } from "@app/services/pki-sync/pki-sync-queue";
28+
import { triggerAutoSyncForSubscriber } from "@app/services/pki-sync/pki-sync-utils";
2929
import { TProjectDALFactory } from "@app/services/project/project-dal";
3030
import { getProjectKmsCertificateKeyId } from "@app/services/project/project-fns";
3131

backend/src/services/certificate-authority/azure-ad-cs/azure-ad-cs-certificate-authority-fns.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,8 @@ import { TKmsServiceFactory } from "@app/services/kms/kms-service";
2727
import { TPkiSubscriberDALFactory } from "@app/services/pki-subscriber/pki-subscriber-dal";
2828
import { TPkiSubscriberProperties } from "@app/services/pki-subscriber/pki-subscriber-types";
2929
import { TPkiSyncDALFactory } from "@app/services/pki-sync/pki-sync-dal";
30-
import { triggerAutoSyncForSubscriber } from "@app/services/pki-sync/pki-sync-utils";
3130
import { TPkiSyncQueueFactory } from "@app/services/pki-sync/pki-sync-queue";
31+
import { triggerAutoSyncForSubscriber } from "@app/services/pki-sync/pki-sync-utils";
3232
import { TProjectDALFactory } from "@app/services/project/project-dal";
3333
import { getProjectKmsCertificateKeyId } from "@app/services/project/project-fns";
3434

backend/src/services/certificate-authority/internal/internal-certificate-authority-fns.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,8 @@ import {
2020
} from "@app/services/certificate/certificate-types";
2121
import { TKmsServiceFactory } from "@app/services/kms/kms-service";
2222
import { TPkiSyncDALFactory } from "@app/services/pki-sync/pki-sync-dal";
23-
import { triggerAutoSyncForSubscriber } from "@app/services/pki-sync/pki-sync-utils";
2423
import { TPkiSyncQueueFactory } from "@app/services/pki-sync/pki-sync-queue";
24+
import { triggerAutoSyncForSubscriber } from "@app/services/pki-sync/pki-sync-utils";
2525
import { TProjectDALFactory } from "@app/services/project/project-dal";
2626
import { getProjectKmsCertificateKeyId } from "@app/services/project/project-fns";
2727

backend/src/services/pki-subscriber/pki-subscriber-service.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,8 +38,8 @@ import { TCertificateAuthoritySecretDALFactory } from "@app/services/certificate
3838
import { TKmsServiceFactory } from "@app/services/kms/kms-service";
3939
import { TPkiSubscriberDALFactory } from "@app/services/pki-subscriber/pki-subscriber-dal";
4040
import { TPkiSyncDALFactory } from "@app/services/pki-sync/pki-sync-dal";
41-
import { triggerAutoSyncForSubscriber } from "@app/services/pki-sync/pki-sync-utils";
4241
import { TPkiSyncQueueFactory } from "@app/services/pki-sync/pki-sync-queue";
42+
import { triggerAutoSyncForSubscriber } from "@app/services/pki-sync/pki-sync-utils";
4343
import { TProjectDALFactory } from "@app/services/project/project-dal";
4444
import { getProjectKmsCertificateKeyId } from "@app/services/project/project-fns";
4545

backend/src/services/secret-v2-bridge/secret-v2-bridge-fns.ts

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -782,7 +782,7 @@ export const expandSecretReferencesFactory = ({
782782
};
783783

784784
export const reshapeBridgeSecret = (
785-
workspaceId: string,
785+
projectId: string,
786786
environment: string,
787787
secretPath: string,
788788
secret: Omit<TSecretsV2, "encryptedValue" | "encryptedComment"> & {
@@ -809,7 +809,8 @@ export const reshapeBridgeSecret = (
809809
) => ({
810810
secretKey: secret.key,
811811
secretPath,
812-
workspace: workspaceId,
812+
workspace: projectId,
813+
projectId,
813814
environment,
814815
secretComment: secret.comment || "",
815816
version: secret.version,

backend/src/services/webhook/webhook-fns.ts

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -94,6 +94,7 @@ export const getWebhookPayload = (event: TWebhookPayloads) => {
9494
event: event.type,
9595
project: {
9696
workspaceId: projectId,
97+
projectId,
9798
projectName,
9899
environment,
99100
secretPath
@@ -147,6 +148,7 @@ export const getWebhookPayload = (event: TWebhookPayloads) => {
147148
event: event.type,
148149
project: {
149150
workspaceId: projectId,
151+
projectId,
150152
projectName,
151153
environment,
152154
secretPath,

docs/integrations/platforms/kubernetes/infisical-secret-crd.mdx

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,22 @@ When `hostAPI` is not defined the operator fetches secrets from Infisical Cloud.
6868
available on paid plans. Default re-sync interval is every 1 minute.
6969
</Accordion>
7070

71+
<Accordion title="instantUpdates">
72+
This property enables instant updates from Infisical. When set to true,
73+
changes made to secrets in Infisical will be immediately pushed to the
74+
operator, triggering a configuration update. This reduces the need for
75+
periodic re-syncs.
76+
77+
<Info>
78+
Note that `Instant Updates` is a paid feature.
79+
80+
If you're using Infisical Cloud, then it is available under the **Pro**,
81+
and **Enterprise Tier** with varying retention periods. If you're self-hosting Infisical,
82+
then you should contact [email protected] to purchase an enterprise license to use it.
83+
84+
</Info>
85+
</Accordion>
86+
7187
<Accordion title="tls">
7288
This block defines the TLS settings to use for connecting to the Infisical
7389
instance.

0 commit comments

Comments
 (0)