Conversation
Co-authored-by: mcavoyk
|
The API as-is has provisions to handle multiples values under a single key: in the case of AWSSM, those are the JSON-encoded properties. In the case of Azure, those could be the Tags coming along with the main secret value. Here is #6 a proposal for using the Azure native bundling using existing CRD API parameters: Here we consider tags as secondary level secrets (much like the There is another type of de-bundling in this PR: in order to try to minimize the number of calls to the Azure API (billing for that service is per call): when the secret is a cert-bundle (which is an information we get from the |
As discussed in external-secrets/external-secrets#22 (comment)
Problem:
(1) A user can't fetch the tags of a secret.
(2) I found another use-case that requires provider-specific options (KES base64/isBinary)
I see two options:
(A) Template Galore 🏇
Tl;DR: use template functions to access metadata or transform base64/pkcs12/pem...
(I think this is a low-hangig fruit once we have basic templating anyway)
(B) provider-specific options in the remoteRef
See proposed changes.