-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add pod identities to Azure Key Vault provider #3813
Comments
I didn't take into account the race-condition. I thought if a TA had a Key Vault and pod identity, any Azure scalers would still work with the pod identity. In my head the main use-case for this was, if a user had a non-Azure scaler in use such as RabbitMQ. We will use pod identity to access the key vault, but the scaler itself will use the secrets stored in the key vault. |
The use case how I discovered this was: |
Sorry about the bug, but it's nice that you were able to discover it before some user did. |
No worries at all, my first contribution broke the rabbitmq scaler... it happens 😉😉 |
Proposal
At this moment, the Azure Key Vault provider code supports pod identities but it's not documented anywhere. There is also a race condition in the way that is implemented because it uses the section
podIdentity
but scalers use that section too, so depending on scaler implementation will take secrets from the vault or use pod identity, we should redesign this, maybe placing that section inside the key vault block.There is another problem because secret is required and we shouldn't require it if we support pod identity.
Use-Case
No response
Anything else?
No response
The text was updated successfully, but these errors were encountered: