You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the bug
While testing the plugin, when applying an argocd application to my cluster, with the directory.recurse to true, the secret placeholder doesn't get replaced by the vault plugin. When I disabled the directory.recurse to false, it immediately started working as expected. I tested with multiple version (1.11.0, 1.16.1 and 1.18.1) and every time I got the same behaviour.
To Reproduce
Steps to reproduce the behavior:
Apply this example of a argocd application manifest
Check the value of the "mysecret" secret, applied on the "vault-poc" namespace
kubectl get secrets mysecret -n vault-poc -o jsonpath='{.data.PORT}'| base64 -d
Expected behavior
The secret gets the value of <password> instead of the actual value of the secret from the vault (e.g. 9191 or whatever value you configured on the vault)
The text was updated successfully, but these errors were encountered:
Describe the bug
While testing the plugin, when applying an argocd application to my cluster, with the directory.recurse to true, the secret placeholder doesn't get replaced by the vault plugin. When I disabled the directory.recurse to false, it immediately started working as expected. I tested with multiple version (1.11.0, 1.16.1 and 1.18.1) and every time I got the same behaviour.
To Reproduce
Steps to reproduce the behavior:
Expected behavior
The secret gets the value of
<password>
instead of the actual value of the secret from the vault (e.g. 9191 or whatever value you configured on the vault)The text was updated successfully, but these errors were encountered: