-
Notifications
You must be signed in to change notification settings - Fork 351
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Allow use of config maps and secrets in plugin configs #1408
Comments
Do you want something similar to what we did with ApisixConsumer? With a apisix-ingress-controller/test/e2e/suite-plugins/suite-plugins-authentication/jwt.go Lines 139 to 147 in b734af3
|
Yes, please. And if you include the option to set secret key name as well, that would probably solve the most common use cases. |
I'd want to help to solve this. Could it be assigned to me? @tao12345666333 |
Config in ApisixRoute and ApisixPluginConfig can be stored into and referred from kubernetes secret Close apache#1408
* remove secretRef of plugins.config in v2beta3 * add key logs output * add test case to validate the plugins config priority * add the corresponding doc section Close apache#1408
Correct backend configs in networking/v1beta1 and extensions/v1beta1 Close apache#1408
Hi there,
Some plugins require secrets in their configs (e.g. openid-connect with client_secret and session.secret), but there is no way of injecting this from a Kubernetes secret that I can see. Likewise, obtaining some values from config maps could be very useful.
This makes it hard to automate deployments when using apisix-ingress-controller without writing custom scripts to inject secrets at deploy time (which is not always possible or desirable, e.g. when using a Kustomize based workflow with standard tooling like ArgoCD).
Is there a plan to add support for this? For instance, with a preprocessing step of plugin configs or adding the option to refer to a config map/value or secret/value in any of the config values?
The text was updated successfully, but these errors were encountered: