-
Notifications
You must be signed in to change notification settings - Fork 33
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support mount multiple secrets #58
Comments
Hi @ardimaul, please have a look at this: https://vault.koudingspawn.de/supported-secret-types/secret-type-properties |
Hi @DaspawnW |
Maybe it will looks like this, spec:
type: "KEYVALUE"
path:
- "secret/one-secret"
- "secret/two-secret" If key exist in both secret, the last key in secret will apply to them |
Hi @ardimaul, I would really welcome a merge request for it :-) |
Hi DaspawnW , i can work with this issue cause i need it for a project, can you give some hints on how to proceed to make ir more faster. Where in the source code do you think this issue can be solved. I'm reading the code but it can be faster if you sendme a hint to how to start. |
Hi @matiri132, I would recommend you create a new Secret Type:
The other option is you add an additional property next to the path property called paths (to prevent collision) https://github.com/DaspawnW/vault-crd/blob/master/crd.yml#L25 and update the corresponding VaultSpec in Java: Then you can "simply" change the KeyValueGenerator / KeyValueRefresh classes to take this up. |
Hi @DaspawnW , i was working around the propossals that you give me to start the resolution of the issue but i'm blocked. |
Hi..
When vault come into different path for applying some policy for different departement like database credentials, apps configuration and others, We need to merge into one environment configuration in kubernetes apps.
Rather than create more than one vault kind for each path, I think this can be done by mount multiple path of vault in one kind vault-crd then combine it into one secrets, then mount it into kubernetes apps environment for only single secrets
The text was updated successfully, but these errors were encountered: