{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":273378222,"defaultBranch":"main","name":"vault-plugin-secrets-azure","ownerLogin":"DataDog","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2020-06-19T01:39:20.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/365230?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1725050121.0","currentOid":""},"activityList":{"items":[{"before":null,"after":"8ad537c2c27a00ad7e3ee03877aeb80421730c26","ref":"refs/heads/bhowe34/handle-removing-missing-groups","pushedAt":"2024-08-30T20:35:21.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"bhowe34","name":"Brian Howe","path":"/bhowe34","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30811239?s=80&v=4"},"commit":{"message":"remove nonexistent groups from role config and don't throw an error if group membership exists","shortMessageHtmlLink":"remove nonexistent groups from role config and don't throw an error i…"}},{"before":"a291999ff296d547d5d5f93e3a0425be92f7dbd0","after":"9c8569ba0b7bd6cb674a1b98fb7cb326d8118a96","ref":"refs/heads/bhowe34/0.14.2-access_tokens","pushedAt":"2024-05-30T18:37:11.000Z","pushType":"pr_merge","commitsCount":7,"pusher":{"login":"bhowe34","name":"Brian Howe","path":"/bhowe34","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30811239?s=80&v=4"},"commit":{"message":"Merge pull request #16 from DataDog/bhowe34/auto-renew-passwords\n\nPPLAT-1532: auto renew passwords","shortMessageHtmlLink":"Merge pull request #16 from DataDog/bhowe34/auto-renew-passwords"}},{"before":"6cc99aeda95ba41feedba49caf83ff25d7dacedb","after":"9019a8413bc6124a4b1e4d2c30188eda60420810","ref":"refs/heads/bhowe34/auto-renew-passwords","pushedAt":"2024-05-29T19:56:17.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"bhowe34","name":"Brian Howe","path":"/bhowe34","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30811239?s=80&v=4"},"commit":{"message":"remove potentially large log","shortMessageHtmlLink":"remove potentially large log"}},{"before":"6d6409171947346478fceed0e943d2b1a78d3121","after":"6cc99aeda95ba41feedba49caf83ff25d7dacedb","ref":"refs/heads/bhowe34/auto-renew-passwords","pushedAt":"2024-05-28T20:36:58.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"bhowe34","name":"Brian Howe","path":"/bhowe34","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30811239?s=80&v=4"},"commit":{"message":"update vault API and SDK packages","shortMessageHtmlLink":"update vault API and SDK packages"}},{"before":null,"after":"6d6409171947346478fceed0e943d2b1a78d3121","ref":"refs/heads/bhowe34/auto-renew-passwords","pushedAt":"2024-05-28T20:04:35.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"bhowe34","name":"Brian Howe","path":"/bhowe34","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30811239?s=80&v=4"},"commit":{"message":"update vault API and SDK packages","shortMessageHtmlLink":"update vault API and SDK packages"}},{"before":null,"after":"a291999ff296d547d5d5f93e3a0425be92f7dbd0","ref":"refs/heads/bhowe34/0.14.2-access_tokens","pushedAt":"2024-05-08T20:54:13.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"bhowe34","name":"Brian Howe","path":"/bhowe34","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30811239?s=80&v=4"},"commit":{"message":"PROD-347: Add access token endpoint\n\nAdds the /token/ endpoint to return an Oauth access\ntoken. This access token is not leased because these tokens have a TTL\nof 60m and are not revokable upstream.\n\nCaveats:\n- The /roles/ backend will create a separate App/SP\n with the same logic as the /roles/ creds. So, a\n unified App/Service Principal is not used between the various\n endpoints for a given role.\n- No changes were made to how deleting a role revokes the cloud\n resources used by the /creds/ endpoint.\n- An \"existing Service Principal\" still creates an App password as\n opposed to a service principal password.","shortMessageHtmlLink":"PROD-347: Add access token endpoint"}},{"before":"7e336083553161f78e23b1af8b03a2b47075f6c1","after":null,"ref":"refs/heads/mdgreenfield/pull","pushedAt":"2023-07-17T20:14:34.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"mdgreenfield","name":"Matt Greenfield","path":"/mdgreenfield","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/540634?s=80&v=4"}},{"before":"2ab6ddcac1757eb756d2776da3911a64d6206b70","after":"fca7e820c4e651b51746c763375b109a54516bbd","ref":"refs/heads/main","pushedAt":"2023-07-17T20:14:31.000Z","pushType":"pr_merge","commitsCount":38,"pusher":{"login":"mdgreenfield","name":"Matt Greenfield","path":"/mdgreenfield","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/540634?s=80&v=4"},"commit":{"message":"Merge pull request #14 from DataDog/mdgreenfield/pull\n\nPull upstream changes into `main`","shortMessageHtmlLink":"Merge pull request #14 from DataDog/mdgreenfield/pull"}},{"before":"b479907f1aed0943148a54db09ceeafdc93e5330","after":"bd4ffe858ea0ab344ff4de0baddf496adcc950f2","ref":"refs/heads/access_tokens","pushedAt":"2023-05-26T20:23:46.753Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mdgreenfield","name":"Matt Greenfield","path":"/mdgreenfield","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/540634?s=80&v=4"},"commit":{"message":"PROD-347: Add access token endpoint\n\nAdds the /token/ endpoint to return an Oauth access\ntoken. This access token is not leased because these tokens have a TTL\nof 60m and are not revokable upstream.\n\nCaveats:\n- The /roles/ backend will create a separate App/SP\n with the same logic as the /roles/ creds. So, a\n unified App/Service Principal is not used between the various\n endpoints for a given role.\n- No changes were made to how deleting a role revokes the cloud\n resources used by the /creds/ endpoint.\n- An \"existing Service Principal\" still creates an App password as\n opposed to a service principal password.","shortMessageHtmlLink":"PROD-347: Add access token endpoint"}},{"before":null,"after":"bd4ffe858ea0ab344ff4de0baddf496adcc950f2","ref":"refs/heads/access_tokens_update","pushedAt":"2023-05-26T17:57:16.292Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"mdgreenfield","name":"Matt Greenfield","path":"/mdgreenfield","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/540634?s=80&v=4"},"commit":{"message":"PROD-347: Add access token endpoint\n\nAdds the /token/ endpoint to return an Oauth access\ntoken. This access token is not leased because these tokens have a TTL\nof 60m and are not revokable upstream.\n\nCaveats:\n- The /roles/ backend will create a separate App/SP\n with the same logic as the /roles/ creds. So, a\n unified App/Service Principal is not used between the various\n endpoints for a given role.\n- No changes were made to how deleting a role revokes the cloud\n resources used by the /creds/ endpoint.\n- An \"existing Service Principal\" still creates an App password as\n opposed to a service principal password.","shortMessageHtmlLink":"PROD-347: Add access token endpoint"}},{"before":null,"after":"7e336083553161f78e23b1af8b03a2b47075f6c1","ref":"refs/heads/mdgreenfield/pull","pushedAt":"2023-05-24T17:52:21.354Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"mdgreenfield","name":"Matt Greenfield","path":"/mdgreenfield","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/540634?s=80&v=4"},"commit":{"message":"Bump github.com/hashicorp/go-hclog from 1.4.0 to 1.5.0 (#140)\n\nBumps [github.com/hashicorp/go-hclog](https://github.com/hashicorp/go-hclog) from 1.4.0 to 1.5.0.\r\n- [Release notes](https://github.com/hashicorp/go-hclog/releases)\r\n- [Commits](https://github.com/hashicorp/go-hclog/compare/v1.4.0...v1.5.0)\r\n\r\n---\r\nupdated-dependencies:\r\n- dependency-name: github.com/hashicorp/go-hclog\r\n dependency-type: direct:production\r\n update-type: version-update:semver-minor\r\n...\r\n\r\nSigned-off-by: dependabot[bot] \r\nCo-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>\r\nCo-authored-by: maxcoulombe ","shortMessageHtmlLink":"Bump github.com/hashicorp/go-hclog from 1.4.0 to 1.5.0 (hashicorp#140)"}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOC0zMFQyMDozNToyMS4wMDAwMDBazwAAAASpBl6H","startCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOC0zMFQyMDozNToyMS4wMDAwMDBazwAAAASpBl6H","endCursor":"Y3Vyc29yOnYyOpK7MjAyMy0wNS0yNFQxNzo1MjoyMS4zNTQxMTdazwAAAAMzhE4_"}},"title":"Activity · DataDog/vault-plugin-secrets-azure"}