Skip to content

Commit

Permalink
Merge branch 'main' into trevor/relayer-validator-metrics
Browse files Browse the repository at this point in the history
  • Loading branch information
tkporter authored Dec 20, 2023
2 parents ff8692f + 5c8d483 commit aaa98e5
Show file tree
Hide file tree
Showing 3 changed files with 3 additions and 4 deletions.
4 changes: 2 additions & 2 deletions .github/workflows/rust.yml
Original file line number Diff line number Diff line change
Expand Up @@ -75,12 +75,12 @@ jobs:
sudo rm -rf "/usr/local/share/boost"
sudo rm -rf "$AGENT_TOOLSDIRECTORY"
- name: Check
run: cargo check --all-features --all-targets
run: cargo check --release --all-features --all-targets
- name: Rustfmt
run: cargo fmt --all -- --check
- name: Clippy
run: cargo clippy -- -D warnings
- name: Setup WASM
run: rustup target add wasm32-unknown-unknown
- name: Check WASM
run: cargo check -p hyperlane-core --features=strum,test-utils --target wasm32-unknown-unknown
run: cargo check --release -p hyperlane-core --features=strum,test-utils --target wasm32-unknown-unknown
2 changes: 1 addition & 1 deletion .github/workflows/test.yml
Original file line number Diff line number Diff line change
Expand Up @@ -219,7 +219,7 @@ jobs:
working-directory: ./rust

- name: agent tests with CosmWasm
run: RUST_BACKTRACE=1 cargo test --package run-locally --bin run-locally --features cosmos -- cosmos::test --nocapture
run: RUST_BACKTRACE=1 cargo test --release --package run-locally --bin run-locally --features cosmos -- cosmos::test --nocapture
working-directory: ./rust

- name: agent tests excluding CosmWasm
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,4 +29,3 @@ Regardless, workload identities are a more attractive long-term option, and movi
The [documentation](https://external-secrets.io/v0.4.4/) is the best source. In short, it allows Kuberenetes Secrets to get their secrets from an external secret provided (like GCP's Secret Manager), all without a developer/deployer needing to touch the secrets themselves.

The general idea is there are `SecretStore`s (or `ClusterSecretStore`s, which are the cluster-wide version), that specify how the cluster can authenticate with the external secret provider. `ExternalSecret`s can then be specified in "application" infrastructure, which allow developers to specify a template for a Secret that will be created using the secret values from the external provider (& using the credentials from the SecretStore).

0 comments on commit aaa98e5

Please sign in to comment.