You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It may be preferable in a Kubernetes env to inject secrets as files or environment variable, so we can use k8s secret management, and be able to refer to them from the config.
Kroxylicious could support something like macro replacement, expanding "credential" : "${env:SECRET_NAME}" or "credential" : "${file:/path/to/secret}" and re-writing the json blob before handing it to the encryption module.
Or we could support a different format and aim to upstream it into the encryption module like:
Using the existing json format for defining KMS we embed the secrets in the config file.
It may be preferable in a Kubernetes env to inject secrets as files or environment variable, so we can use k8s secret management, and be able to refer to them from the config.
Kroxylicious could support something like macro replacement, expanding
"credential" : "${env:SECRET_NAME}"
or"credential" : "${file:/path/to/secret}"
and re-writing the json blob before handing it to the encryption module.Or we could support a different format and aim to upstream it into the encryption module like:
The text was updated successfully, but these errors were encountered: