-
Notifications
You must be signed in to change notification settings - Fork 1.2k
improve: hashicorp token management #6996
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Thank you for your contribution! 🙏 Please understand that we will do our best to review your PR and give you feedback as soon as possible, but please bear with us if it takes a little longer as expected. While you are waiting, make sure to:
Once the initial tests are successful, a KEDA member will ensure that the e2e tests are run. Once the e2e tests have been successfully completed, the PR may be merged at a later date. Please be patient. Learn more about our contribution guide. |
Signed-off-by: Ramiro Andres Videla <[email protected]>
Signed-off-by: Ramiro Andres Videla <[email protected]>
Signed-off-by: Ramiro Andres Videla <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nice fix! Could we cover the new token source in the e2e test?
Signed-off-by: Ramiro Videla <[email protected]>
Signed-off-by: Ramiro Andres Videla <[email protected]>
Signed-off-by: Ramiro Andres Videla <[email protected]>
Signed-off-by: Ramiro Andres Videla <[email protected]>
Signed-off-by: Ramiro Andres Videla <[email protected]>
Im trying to add the e2e test case, but maybe I'm pointing to the wrong direction. I'm having this error after creating a test case where I thought was the right place if Im not in the right place, pls gide me a bit here, |
/run-e2e |
/run-e2e hashicorp_vault |
Signed-off-by: Ramiro Andres Videla <[email protected]>
Signed-off-by: Ramiro Andres Videla <[email protected]>
Signed-off-by: Ramiro Andres Videla <[email protected]>
Signed-off-by: Ramiro Andres Videla <[email protected]>
Signed-off-by: Ramiro Andres Videla <[email protected]>
/run-e2e hashicorp_vault |
/run-e2e hashicorp_vault |
Only KEDA colleagues can trigger e2e tests :P |
/run-e2e hashicorp_vault |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There's a conflict and also the e2e test fails
feat(hashicorp-vault): Support token from a secret
What's Changed
Added a new field,
tokenSecretRef
, to the HashiCorp Vault credentials configuration.This new field allows users to specify a Kubernetes secret containing the Vault token.
The existing
token
string field will be used as a fallback iftokenSecretRef
is not provided.Why This Is Important
Previously, the HashiCorp Vault token had to be provided directly as a string in the KEDA configuration. This is not a recommended security practice for production environments, as it can expose sensitive information.
This change introduces a more secure way to manage the token by leveraging Kubernetes secrets. This aligns with best practices for handling credentials within a Kubernetes cluster.
How to Use It
Users can now configure their trigger with either the existing token field or the new tokenSecret field. For example:
In the example above, secret-name and secret-key point to the secret containing the token.
Checklist
Issue 6026: Hashicorp vault auth allow tokens directly set in TriggerAuthentication
Fixes #
Helm chart PR change: kedacore/charts#774
Relates to #