Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support vault prefix depth config (#73) #74

Merged

Conversation

keejon
Copy link
Contributor

@keejon keejon commented Jun 17, 2024

The Vault Secret Provider seems to have problems to retrieve secrets from KV secret engines with a path that is longer than one element (e.g. secrets/dev). This will make the prefix path depth of the vault client configurable. (#73)

@keejon
Copy link
Contributor Author

keejon commented Jun 24, 2024

Hey @davidsloan 👋, would be great if you could have a look. We are currently facing issues resolving secrets from vault engines with prefix path depth > 1. I also think the codacy check has to be adapted so it allows _ in field names.

Copy link
Contributor

@davidsloan davidsloan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for contributing the fix.

@@ -324,6 +324,27 @@ class VaultSecretProviderTest extends AnyWordSpec with Matchers with BeforeAndAf
response.getData.asScala("value") shouldBe "mock"
}

"should be configured for vault engine prefix depth" in {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

there is a test for explicitly setting the prefix depth, can there also be a test to ensure the default value is 1?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I also added a test for the default 👍

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@davidsloan Does this look good to you?

@keejon keejon force-pushed the feat/support-vault-prefix-path-depth branch from 169dad3 to d45e27e Compare June 24, 2024 10:16
@keejon keejon requested a review from davidsloan June 24, 2024 18:51
@keejon
Copy link
Contributor Author

keejon commented Jul 15, 2024

Hey @davidsloan, sorry to bother you again but would you be able to merge this and ideally make an release? Would be greatly appreciated 🙏

@stheppi stheppi merged commit a36e8b8 into lensesio:master Jul 19, 2024
4 checks passed
@stheppi
Copy link
Contributor

stheppi commented Jul 19, 2024

Hi @keejon ,

It will take a while for us to release it since we need to upgrade the Kafka dependencies and investigate the CVEs. We advise to build the project and use the artifacts before we release them.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants