-
Notifications
You must be signed in to change notification settings - Fork 135
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sync all key/value pairs from AWS secret to K8S secret #46
Comments
Hi Folks! Anyone get any idea on this? We have the same use case and struggling since very long time. Any clue or reference would be appreciated please ! |
If you're not "forced" to use this solution, have a look at https://external-secrets.io which does exactly that, in a far more elegant way. This seems way too complicated to maintain. |
@cbalan23 two problem with external-secrets.io . |
@sharmavijay86 it does support IRSA (IAM Roles for Service Accounts). See the bottom of this page. |
What happens if you provide I don't have it installed, I was just looking at issues for potential show stoppers, so I can't test. According to the docs and my tests on https://jmespath.org/, |
I am also looking for the solution. Thanks, @bgdnlp. But your solution is probably not working since also need add all the key to spec. secretObjects. data |
Well, no, that's the point, if you want all the keys, |
I saw a PR opened from driver side to add this feature, but to use this feature provider side may change as well. |
HI @bgdnlp, I just try your suggested workaround and I'm getting the following error: |
Same here, it's really painful to sync by hand and extract every key from Secrets Manager JSON. |
There seems to be a feature request for this in the Secret Store repo, we're waiting on them to implement it. |
@cryptk I'm doing something similar to create a secret needed for ArgoCD
Inside the container, I can only see the file container the secret in JSON format. I expected to have a file for each key cat /var/run/secrets/argocd/repo-creds | jq
{
"type": "git",
"url": "https://github.com/my-org",
"githubAppID": 123,
"githubAppInstallationID": 456,
"githubAppPrivateKey": "-----BEGIN RSA PRIVATE KEY----- -----END RSA PRIVATE KEY-----"
} |
I am currently experimenting with using secretObjects to sync AWS Secrets into K8S secrets, and while I can use the jmesPath functionality to get a kubernetes secret that mirrors the AWS Secret, I have to list out every key in the secret manually. For a secret named MySecret with the below data:
I would need to create the following SecretProviderClass in order to fully mirror that into a Kubernetes secret:
If I added a new value to the AWS Secret, I would then need to also update the secretObjects and parameters adding it there as well. It would be nice if the provider could take a key/value formatted secret and automatically sync all key/value pairs into the kubernetes secret.
Perhaps something like this:
under secretObjects, for any given objectName, rather than specifying a
key
value, you could instead setsyncAllKeys
to true. Assuming that the object could be decoded as key/value pairs, each of those key/value pairs would be entered into the kubernetes secret leaving you with a secret such as this:The text was updated successfully, but these errors were encountered: