-
Notifications
You must be signed in to change notification settings - Fork 446
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support custom Vault secret prefix #6283
Conversation
Visit the preview URL for this PR (updated for commit c5ec0ea): https://gloo-edge--pr6283-expose-vault-secret-q9p2e8to.web.app (expires Thu, 21 Apr 2022 15:16:49 GMT) 🔥 via Firebase Hosting GitHub Action 🌎 |
Issues linked to changelog: |
re-running build, flake #2838 |
The most recent build-bot failure: In the logs I noticed a message that seems to occur whenever we see this type of new flake:
I believe that #6301 will resolve this issue. I vote that for now we kick this flake and track it. And if I can confirm that this linked PR will resolve the issue then I can close any new flake issues |
/kick |
/kick New failed test, same core issue as mentioned above https://storage.googleapis.com/solo-public-build-logs/logs.html?buildid=dc8ff3f1-81c8-4704-9a2a-119c3250e4b6 |
Co-authored-by: Nathan Fudenberg <nathan.fudenberg@solo.io>
Co-authored-by: Nathan Fudenberg <nathan.fudenberg@solo.io>
had flake #6253 |
/kick |
/kick no fail reason shown, CI build failed during "docker-push-extended": Pushed |
/kick
kicking due to possible flake in test |
/kick Locally the kv test that just failed doesnt. So its a flake... though we should consider how we can fix it if this turns out to be truly a flake Edit: too many times to be a real flake minimally a weird test setup |
test flake in CI / k8s regression tests (glooctl, false) (pull_request). Istio/istioctl failed to install, created new issue for it #6316 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
doc
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good. Most of the decisions were in the solokit PR.
Description
Allow injecting a custom
pathPrefix
for Vault secrets, historically this was hard-coded to "secret".Context
Why is this configuration valuable?
It allows for users to use custom secrets engines and for multitenancy-ness for organizations with different/separated secrets paths.
How did this work before?
This value was previously hardcoded in solo-kit https://github.com/solo-io/solo-kit/blob/1d799ae290c2f516f01fc4ad20272d7d2d5db1e7/pkg/api/v1/clients/vault/resource_client.go#L309
How did we verify this?
--vault-path-prefix
fed in by user. The test can create a secret using the custom path prefix, and can also read from Vault.-path
for the Vault test server to test the pathPrefix. This matches how Vault customers enable new secrets engines with custom path.Checklist:
make -B install-go-tools generated-code
to ensure there will be no code diffBOT NOTES:
resolves #6184