This repository was archived by the owner on Jul 26, 2022. It is now read-only.
Allow Hashicorp Vault secret data to be preprocessed before upserting k8s secret. #605
eshepelyuk
started this conversation in
Ideas
Replies: 2 comments
-
Some slack discussion here for reference https://kubernetes.slack.com/archives/C017BF84G2Y/p1612255297017600 |
Beta Was this translation helpful? Give feedback.
0 replies
-
Issue #625 is created. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hello,
I'd like to propose an idea about making this operator more flexible.
Currently encrypted values are injected into
Secret
as is and only could be injected as a single field to a particular secret.It could be good to allow somehow to preprocess data after retrieving from Hashicorp Vault but before upserting the data to secret.
Very similar how consul-template works.
I could see it by extending ExternalSecret to receive a template file and a list of secret that should be retrieved from Vault.
Then
external-secrets
could retrieve secrets completely and pass all them to the template for evaluation. And then resulting string will be upserted into k8sSecret
as a named property configured inExternalSecret
too.Use cases:
Secret
Service
may need file in YAML, TOML etcWhat do you think ?
Beta Was this translation helpful? Give feedback.
All reactions