-
Notifications
You must be signed in to change notification settings - Fork 24
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Error occurs when generating secrets from Vault file with nested credentials #25
Comments
How do you expect to map the nested credentials to k8s secrets? Vault: {
"client": {
"client_id": "my_client_id",
"client_secret": "my_client_secret"
},
"sentry_dsn": "my-dsn"
} k8s plain (how to resolve name clashes?): apiVersion: v1
kind: Secret
metadata:
name: nested
type: Opaque
data:
sentry_dsn: <base64 encoded string>
client_id: <base64 encoded string>
client_secret: <base64 encoded string> k8s scoped: apiVersion: v1
kind: Secret
metadata:
name: nested
type: Opaque
data:
sentry_dsn: <base64 encoded string>
client.client_id: <base64 encoded string>
client.client_secret: <base64 encoded string> k8s embedded: apiVersion: v1
kind: Secret
metadata:
name: nested
type: Opaque
data:
sentry_dsn: <base64 encoded string>
client: <base64 encoded json> |
@marcsauter thanks a lot for your quick response. Very good question you made, I'd think that the most intuitive for me would be to have it exposed as "k8s embedded", so the last option. Like that it is in accordance with what is available in Vault and we don't alter in any way the file content. |
https://github.com/postfinance/vault-kubernetes/tree/decode with an issue I hope to solve soon, but most cases work. |
Bumping this thread for visibility. This would be a very handy feature for us 😄 |
Let's assume that we have the following in Vault
Vault file path:
/my-department/my-app-name/app/
Vault file content:
Env var exposed to the container
VAULT_SECRETS: /my-department/my-app-name/app/
Once the container executes the following error is thrown:
While if I have
Vault file content:
The container executes successfully creating the expected secret resource.
I have tested this with multiple versions of the container, including
v0.2.5
which is the latest version at the moment of creation of this issue.Which leaves me to the conclusion that this container does not support nested credentials.
Are you aware of this issue? Would you consider this an easy fix?
Thanks in advance for you attention.
The text was updated successfully, but these errors were encountered: