Skip to content

Add support for multiple secrets #23

@aklinkert

Description

@aklinkert

First of all, I think this project is doing an awesome job and heads in the right direction. As already stated in #19 most people are gonna use more than the database secret engine, so does my current client. Since we require to generate AWS credentials as well as pure database credentials on Aurora MySQL. Which breaks the current state of this project down into multiple options:

  1. Run two different init containers, one for the AWS credentials and one for the MySQL credentials, then merge the two lease and token files and run a sidecar renewing both of them, or
  2. Refactor the current code to support multiple secrets
  3. use a different tool

I'd like to go with option 2 and will have a deeper look into the code asap. Any thoughts on this one?

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions