Support secret refs for Hashicorp Vault token auth in TriggerAuthentication#7571
Support secret refs for Hashicorp Vault token auth in TriggerAuthentication#7571Kunalbehbud wants to merge 2 commits intokedacore:mainfrom
Conversation
Signed-off-by: kunal.behbudzade <kunal.behbudzade@btsgrp.com>
|
Thank you for your contribution! 🙏 Please understand that we will do our best to review your PR and give you feedback as soon as possible, but please bear with us if it takes a little longer as expected. While you are waiting, make sure to:
Once the initial tests are successful, a KEDA member will ensure that the e2e tests are run. Once the e2e tests have been successfully completed, the PR may be merged at a later date. Please be patient. Learn more about our contribution guide. |
✅ Snyk checks have passed. No issues have been found so far.
💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse. |
|
Could someone take a look at this when convenient? Main CI is green on my side, and the companion docs update is in kedacore/keda-docs#1724. Happy to make follow-up changes if needed. |
Signed-off-by: Rick Brouwer <rickbrouwer@gmail.com>
|
Nice work. Questions: In Further, in the Nit: should |
This PR adds secret-based token resolution for Hashicorp Vault authentication in TriggerAuthentication while preserving backward compatibility for existing plain-text configurations.
Checklist
make generate-scalers-schemahas been run to update any outdated generated filesFixes #6026
Relates to kedacore/keda-docs#1724
What changed
spec.hashiCorpVault.credential.tokenFrom.secretKeyRefso Vault token auth can read the token from a Kubernetes Secretspec.hashiCorpVault.credential.tokensupport for backward compatibility, but mark it deprecated via admission warnings and documentationtokenFrom.secretKeyRefbefore constructing the Vault handler for bothTriggerAuthenticationandClusterTriggerAuthenticationBackward compatibility
credential.tokenconfigurations continue to worktokenFrom.secretKeyRefandtokenare set,tokenFrom.secretKeyReftakes precedenceHow it was tested
make generatemake manifestsmake generate-scalers-schemaPATH="$(go env GOPATH)/bin:$PATH" make golangcimake testgo test -tags e2e ./tests/secret-providers/hashicorp_vault -run TestDoesNotExist