-
Notifications
You must be signed in to change notification settings - Fork 298
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Get all k/v pairs from endpoint #529
Comments
Everything within
If there are commonalities between the solutions then we can investigate feasibility of a shared feature of the driver itself. |
@tam7t I completely understand that perspective. the |
Ah yes, |
/assign |
+1 Looking forward to the detailed design doc so we can discuss some of the nuances this feature may bring. Specifically, today with the With this feature request/proposal, the list of objects is maintained outside of the SPC CR via |
Perhaps not directly related, but I wonder if inspiration could be drawn from the Vault Injector Sidecar's options, such as in the use of template files to extract and format a vault secret into a format that most applications can use natively (such as a .env file or a bash script with exported env vars). https://www.vaultproject.io/docs/platform/k8s/injector#secret-templates |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
/remove-lifecycle stale |
Has it been decided if this is entirely up to the providers to implement, or if changes are needed in this repo first? Provider feature requests:
|
Hi, is there any update regarding this suggested feature? |
Is there any update on this issue? It would really help for deployments made using reutilizable code to create common K8s entities (namespaces, secrets stores, etc). The workaround is currently a bit hacky (at least using AWS driver) |
Would like to bump this issue as it would be a really great feature to have |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
Bump. This would be epic. |
+1 |
+10 |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
@manedurphy Is there any update to report? |
This sounds trivial to implement. Currently using this to create ENV vars I get one var with a JSON value with all the k/v. Couldn't there be a flag on secretObjects that just takes the JSON and parses that when generating the secret? Or make data.key optional and provide the same behavior if no key is specified? |
I think this RFE is different than parsing JSON-valued secrets. In fact it probably shouldn't be parsing JSON-valued secrets IIUC... This is about recursing a path and populating one secret with the data there under:
From path:
The "join" character "." that joins the keys should be configurable because "." is probably a legal character in a path segment. |
@dirtycajunrice let us know if this is what you had in mind. Jonnymcc@a67e78e Using the AWS provider, this takes a SSM secret with a value made up of k/v and creates a k8s secret where the k/v under How it works: specify a secretObjects.data item without a key and it will parse the value stored in objectName as JSON. |
@Jonnymcc holy moly man its been 3 years, and i don't know what i had in mind for dinner last week 🤣. If i think really hard about it with the context i gave above... I would not expect nesting/recursion. That adds adds complexity that although may have been inferred throughout the comments over the years, would not constitute an MVP. The MVP would simply call the /list endpoint of An enhancement post-MVP of recursion may be beneficial, but we are 3 years of zero movement, so I would suggest making the target as scoped as possible to alleviate further "analysis paralysis" |
@dirtycajunrice This issue is referenced by a similar issue(s) in each provider implementation: Provider feature requests:
In each case, the provider's native ability to fetch multiple secrets at once is not exposed through the SCSP API. Progress is stalled and it appears to me that the change needs to happen here in the SCSP API. External Secrets Operator (ESO) does provide this ability cross-platform. What I described above is essentially how ESO solves the problem: https://external-secrets.io/latest/guides/getallsecrets/ Given the ESO implementation, I don't think there's a problem with analysis paralysis. I think the problem has been one of deciding whether its an issue for this component or for each provider. Should I create a new issue to capture my interpretation or are you willing to let this issue stand as the meta issue that all the provider's issues point to? |
Motivation
Some applications require a significant amount of configuration that is sensitive. This becomes extremely tedious and adds redundancy and toil where it could be reduced using the same functionality that
envFrom
uses in kubernetes core as well as established solutions like external-secretsDescribe the solution you'd like
2 Separate requests.
A practical example with only 5 k/v pairs currently looks like:
When all you should really need is
The text was updated successfully, but these errors were encountered: