improve: hashicorp token management#6996
Conversation
|
Thank you for your contribution! 🙏 Please understand that we will do our best to review your PR and give you feedback as soon as possible, but please bear with us if it takes a little longer as expected. While you are waiting, make sure to:
Once the initial tests are successful, a KEDA member will ensure that the e2e tests are run. Once the e2e tests have been successfully completed, the PR may be merged at a later date. Please be patient. Learn more about our contribution guide. |
Signed-off-by: Ramiro Andres Videla <raviand86@gmail.com>
Signed-off-by: Ramiro Andres Videla <raviand86@gmail.com>
Signed-off-by: Ramiro Andres Videla <raviand86@gmail.com>
JorTurFer
left a comment
There was a problem hiding this comment.
nice fix! Could we cover the new token source in the e2e test?
Signed-off-by: Ramiro Videla <raviand86@gmail.com>
Signed-off-by: Ramiro Andres Videla <raviand86@gmail.com>
Signed-off-by: Ramiro Andres Videla <raviand86@gmail.com>
Im trying to add the e2e test case, but maybe I'm pointing to the wrong direction. I'm having this error after creating a test case where I thought was the right place if Im not in the right place, pls gide me a bit here, |
|
/run-e2e |
|
/run-e2e hashicorp_vault |
Signed-off-by: Ramiro Andres Videla <raviand86@gmail.com>
Signed-off-by: Ramiro Andres Videla <raviand86@gmail.com>
Signed-off-by: Ramiro Andres Videla <raviand86@gmail.com>
Signed-off-by: Ramiro Andres Videla <raviand86@gmail.com>
Signed-off-by: Ramiro Andres Videla <raviand86@gmail.com>
|
/run-e2e hashicorp_vault |
|
/run-e2e hashicorp_vault |
Only KEDA colleagues can trigger e2e tests :P |
|
/run-e2e hashicorp_vault |
zroubalik
left a comment
There was a problem hiding this comment.
There's a conflict and also the e2e test fails
|
This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 7 days if no further activity occurs. Thank you for your contributions. |
|
This issue has been automatically closed due to inactivity. |
feat(hashicorp-vault): Support token from a secret
What's Changed
Added a new field,
tokenSecretRef, to the HashiCorp Vault credentials configuration.This new field allows users to specify a Kubernetes secret containing the Vault token.
The existing
tokenstring field will be used as a fallback iftokenSecretRefis not provided.Why This Is Important
Previously, the HashiCorp Vault token had to be provided directly as a string in the KEDA configuration. This is not a recommended security practice for production environments, as it can expose sensitive information.
This change introduces a more secure way to manage the token by leveraging Kubernetes secrets. This aligns with best practices for handling credentials within a Kubernetes cluster.
How to Use It
Users can now configure their trigger with either the existing token field or the new tokenSecret field. For example:
In the example above, secret-name and secret-key point to the secret containing the token.
Checklist
Issue 6026: Hashicorp vault auth allow tokens directly set in TriggerAuthentication
Fixes #
Helm chart PR change: kedacore/charts#774
Relates to #