-
Notifications
You must be signed in to change notification settings - Fork 306
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
FISH-338 Create HashiCorp MicroProfile Config Source #4982
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Don't really know what a hashi crop is so I just can reason about general things.
.../java/fish/payara/microprofile/config/extensions/hashicrop/HashiCropSecretsConfigSource.java
Outdated
Show resolved
Hide resolved
.../java/fish/payara/microprofile/config/extensions/hashicrop/HashiCropSecretsConfigSource.java
Outdated
Show resolved
Hide resolved
...s/src/main/java/fish/payara/microprofile/config/extensions/hashicrop/model/SecretHolder.java
Outdated
Show resolved
Hide resolved
jenkins test please |
@MeroRai is this ready to be re-reviewed? |
Fix deserialisation error and write test for fetching properties from the config source. Signed-off-by: Matthew Gill <[email protected]>
jenkins test please |
@jbee @MattGill98 is reviewing it now. Thank you for your earlier reviews. |
.../java/fish/payara/microprofile/config/extensions/hashicorp/HashiCorpSecretsConfigSource.java
Outdated
Show resolved
Hide resolved
… Secrets Engine path and Secrets path.
jenkins test please |
jenkins test please |
1 similar comment
jenkins test please |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looking much better, just needs a null check before the HTTP calls
.../java/fish/payara/microprofile/config/extensions/hashicorp/HashiCorpSecretsConfigSource.java
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Discussed with Susan and this scenario is unlikely
Merge pull request payara#4982 from MeroRai/FISH-338 Merge pull request payara#5086 from Cousjava/FISH-876-hashicorp-vault-blocking
We have at least 70 Java applications and now trying to use the secrets that is saved from vault. The plan is to create no-root tokens in order to access the secrets from vault. Reason to use non-root token is java applications must not see the secrets of each other. Please suggest the possible ways to achieve requirement Vault configuration is like: Non-root token A must access only - /DEV/APP-A |
Description
This is a feature, that allows you to fetch secrets from HashiCrop Vault to be used as a config source for Payara.
Documentation
https://docs.payara.fish/community/docs/5.2020.7/documentation/microprofile/config/cloud/hashicorp.html