This repository has been archived by the owner on Jul 26, 2022. It is now read-only.
Allow Hashicorp Vault secret data to be preprocessed before upserting k8s secret. #605
eshepelyuk
started this conversation in
Ideas
Replies: 2 comments
-
Some slack discussion here for reference https://kubernetes.slack.com/archives/C017BF84G2Y/p1612255297017600 |
Beta Was this translation helpful? Give feedback.
0 replies
-
Issue #625 is created. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hello,
I'd like to propose an idea about making this operator more flexible.
Currently encrypted values are injected into
Secret
as is and only could be injected as a single field to a particular secret.It could be good to allow somehow to preprocess data after retrieving from Hashicorp Vault but before upserting the data to secret.
Very similar how consul-template works.
I could see it by extending ExternalSecret to receive a template file and a list of secret that should be retrieved from Vault.
Then
external-secrets
could retrieve secrets completely and pass all them to the template for evaluation. And then resulting string will be upserted into k8sSecret
as a named property configured inExternalSecret
too.Use cases:
Secret
Service
may need file in YAML, TOML etcWhat do you think ?
Beta Was this translation helpful? Give feedback.
All reactions