* Revert "update got dependency and convert to esm module (#533)"
This reverts commit 77efb36ae3.
* keep new local test file changes
* keep changes to PR template
* update changelog
* update require got to import got
* convert remaining to esm
* wip: replace jest with vitest
* fix test imports and vitest config
* remove dist package.json
* fix import in ent test
* add dist
* move actions/core to prod dependency
* remove unused import that was breaking esm compilation
* simplify imports
* use module.createRequire to import jsonata
* add doc link comment
* add comments on import insanity
* add more comments
* update PR tempalte
* bump got and remove jest deps
* revert debug npm run command
* fix fs import
* simplify vitest config for each test suite
* fix secrets stored in JSON format
* add more tests
* fix lint and pass token to build
* add test cases
* add debug
* fix ordering of build steps
* fix test string format
* update test check
* fix test string format
* final cleanup
* remove comment
* remove unused var assignment
* simplify more
* simplify code and add more comments
* fix secrets in json format
* fix actionlint
* add more comments and docs
* revert build.yml test
* add test for json
* fix selector
* fix e2e test
* fix e2e test 2
* remove test
* remove isNaN check
* update changelog
* feat: Always allow scoped access to vault token through outputs
* Make optional instead of always, in case of untrusted steps
---------
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: Thomas <thomas.north@dazn.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
* chore: make vault action consumable
* fix prefixless queries to default to data
* fix the right build entrypoint
* make output more forgiving and shore up selectors
* clarify doc language
* add npmtoken
* feat: add generic auth
Adds the ability to authenticate against any normal Vault endpoint by added the `authPayload` input.
When an unrecognized method is provided, the action will attempt to hit `v1/auth/<method>/login` with the provided `authPayload and parse out the token in the response