4 Commits

Author SHA1 Message Date
Vivek Singh
b79a2e077d Use Secret struct from faas-provider
This commit updates the secret commands to use `Secret` struct from the
faas-provider rather than using it's own struct.

Signed-off-by: Vivek Singh <vivekkmr45@yahoo.in>
2019-10-09 11:45:37 +01:00
Vivek Singh
fd16b17a93 Add create command for secrets
This commit adds command to create new secrets from the CLI

Signed-off-by: Vivek Singh <vivekkmr45@yahoo.in>
2019-01-11 10:57:54 +00:00
Vivek Singh
35312884d6 Add secret list command to faas-cli
This commit adds `faas-cli secret list` command to the faas-cli which
will be used to get secret list from the cluster.

Signed-off-by: Vivek Singh <vivekkmr45@yahoo.in>
2019-01-10 09:03:33 +00:00
Alex Ellis (VMware)
a0ee900685 Add cloud command for sealing secrets
Adds new command to seal a secret for use in OpenFaaS Cloud with
new subcommand "cloud". A sealed secret can be pushed into a
public Git repo without others being able to decrypt it.

The `kubeseal` CLI provides the implementation of the sealing
via exec - this is much less code and bloat than vendoring since
the kubeseal client API includes the Kubernetes Go client.

Command tested with SealedSecrets running on Kubernetes with
kubeadm and the faas-cli running on MacOS.

See README.md for usage and more instructions.

Signed-off-by: Alex Ellis (VMware) <alexellis2@gmail.com>
2018-06-05 12:17:18 -07:00