You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
When using transformation API with VSS or SecretTransformation, we are not able to retain the secret's key from KV backend of Vault.
Transformation API forces to use template name as the Secret's Key instead of using the key from Vault.
Describe the solution you'd like
I should be able to range though the KV pairs from Vault and perform any manipulations in the templates. In the example below, the template name can be made optional to retrieve KV pairs from Vault.
Describe alternatives you've considered
A clear and concise description of any alternative solutions or features you've considered.
With the existing transformation API, I am forced to provide a templates.key in VSS yaml and it discards the Key from Vault KV backend. In the example below, I have to explicitly pass the Keys - constants.pwd & somexml.xml
Current Experience
Our TIBCO application has 300+ microservices with 300+ Secrets. Providing and maintaining 300+ VSS with unique transformation template will be tedious.
With the proposed feature, we can use a standard transformation template across all the VSS yamls.
Expectations
With the proposed solution, we should be able to convert Vault KV secrets into K8s Secrets as indicated below:
Secrets in Vault KV-v2 backend (encoded values)
Is your feature request related to a problem? Please describe.
When using transformation API with VSS or SecretTransformation, we are not able to retain the secret's key from KV backend of Vault.
Transformation API forces to use template name as the Secret's Key instead of using the key from Vault.
Describe the solution you'd like
I should be able to range though the KV pairs from Vault and perform any manipulations in the templates. In the example below, the template name can be made optional to retrieve KV pairs from Vault.
Describe alternatives you've considered
A clear and concise description of any alternative solutions or features you've considered.
With the existing transformation API, I am forced to provide a
templates.key
in VSS yaml and it discards the Key from Vault KV backend. In the example below, I have to explicitly pass the Keys - constants.pwd & somexml.xmlCurrent Experience
Our TIBCO application has 300+ microservices with 300+ Secrets. Providing and maintaining 300+ VSS with unique transformation template will be tedious.
With the proposed feature, we can use a standard transformation template across all the VSS yamls.
Expectations
With the proposed solution, we should be able to convert Vault KV secrets into K8s Secrets as indicated below:
Secrets in Vault KV-v2 backend (encoded values)
to
The text was updated successfully, but these errors were encountered: