Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

explain secrets password format #261

Open
ikke-t opened this issue Jun 5, 2023 · 1 comment
Open

explain secrets password format #261

ikke-t opened this issue Jun 5, 2023 · 1 comment

Comments

@ikke-t
Copy link

ikke-t commented Jun 5, 2023

It seems secrets format has changed since I last used it. I didn't see it explained anywhere. So looking around I ended up with this:

  - name: ldap
    vaultPrefixes:
      - global
    fields:
      - name: bindPassword
        value: foobar
        onMissingValue: generate
        vaultPolicy: validatedPatternDefaultPolicy

which compalains:

TASK [vault_utils : Loads secrets file into the vault of a cluster] ***************************************************
fatal: [localhost]: FAILED! => {"changed": false, "msg": "Secret has onMissingValue set to 'generate' but has a value set"}

Value is not missing, it should just ignore that generate field. Variable name "onMissingValue" would indicate it ignores this if value is set.

But alltogether, the format of secrets file should be described in the doc. As of current, it doesn't have "value:" in example.

arunhari82 pushed a commit to arunhari82/multicloud-gitops that referenced this issue Jun 5, 2023
@mbaldessari
Copy link
Contributor

I added #262 with a link to the specs. Maybe we should open up a dedicated section in the docs to cover for this in a more visible way?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants