Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[VaultPKISecret] Populate ca.crt from the vault issuing_ca #178

Open
djds opened this issue May 10, 2023 · 2 comments
Open

[VaultPKISecret] Populate ca.crt from the vault issuing_ca #178

djds opened this issue May 10, 2023 · 2 comments
Labels
enhancement New feature or request PKI PKI secrets
Milestone

Comments

@djds
Copy link

djds commented May 10, 2023

Populate ca.crt from the vault issuing_ca field the Kubernetes secret created by VaultPKISecret if the target secret is of type kuberntes.io/tls. Many Kubernetes applications expect a CA to be located at that key and this would obviate the need for separate CA ConfigMaps or Secrets in many cases. This is especially useful because Vault works great as a cluster CA, but would also simplify the rollout of new trust anchors when the CA is updated or rotated.

@djds djds added the enhancement New feature or request label May 10, 2023
@kschoche kschoche added the PKI PKI secrets label May 10, 2023
@nia-potato
Copy link

I also have this requirement, and is blocking deployment, we cannot expect to not auto populate caCertSecret when rolling out vso to clusters.

@tvoran
Copy link
Member

tvoran commented Feb 26, 2024

BTW, this can now be done using a template:

apiVersion: secrets.hashicorp.com/v1beta1
kind: VaultPKISecret
metadata:
  name: example
spec:
  ...
  destination:
    name: pki1
    transformation:
      templates:
          ca.crt:
            text: |
              {{- printf "%s" (get .Secrets "issuing_ca") -}}

@benashz benashz added this to the v0.8.0 milestone Jun 27, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request PKI PKI secrets
Projects
None yet
Development

No branches or pull requests

5 participants