You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Nov 20, 2024. It is now read-only.
Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request
If you are interested in working on this issue or have submitted a pull request, please leave a comment
Description
At this time, the only possibility to manage secrets as via K8s secrets and referenced in CRD.
We're looking to expand the secrets management capabilities to include reading secrets from Azure KeyVaults.
Potential Terraform Configuration
The proposed change could take a form as part of CRD manifest as the following:
---
apiVersion: app.terraform.io/v1alpha1kind: Workspacemetadata:
name: salutationsazurekeyvault: my-key-vault.vault.azure.net <--- here, specify the name of KVspec:
organization: hashicorp-team-demomodule:
source: "git::https://github.com/mygit/queues.git"variables:
- key: applicationvalue: azurekeyvault@my-secret <-- here, reference KV and secret namesensitive: trueenvironmentVariable: false
Variable behaviour goes as:
if value not specified as part of the block - usual route: read secret's value from k8s secret
if value specified as part of the block (i.e. value: azurekeyvault@my-secret ) parse it and pull the secret from specified secrets back-end, in this case azurekeyvault.
This could be expanded further to support multiple back-ends such as AWS KMS, HC Vault, etc.