Moritz Johner

Results 191 comments of Moritz Johner

Hey @Aransh :wave: Did find the `dataFrom.find.path` feature? That's in the [vault docs](https://external-secrets.io/latest/provider/hashicorp-vault/), it allows you to list all secrets under a given vault path recursively. ```yaml apiVersion: external-secrets.io/v1beta1 kind:...

The `merge: {}` doesn't exist yet, it's just an idea :D

> I will add that while this feature will significantly simplify my infrastructure, development, and deployment processes, it is not a blocker. Just thought it might be a great feature...

I think we need to review all the images and rework some of them. Some diagrams unfortunately are not readable. mkdocs-material allows us to use a switch: https://squidfunk.github.io/mkdocs-material/reference/images/#light-and-dark-mode However, then...

IMHO: The solid background color will look bad due to the high contrast (white bg on dark mode). However, as a compromise that would work out. We don't have _that_...

Oh no, how annoying :disappointed: AFAIK we would just use the `.Authorizer()` of the [ClientCredentialsConfig](https://github.com/Azure/go-autorest/blob/9038e4a609b1899f0eb382d03c3e823b70537125/autorest/azure/auth/auth.go#L668-L681), this is an interface. We should be able to create our own Authorizer :thinking: just...

Just a rough sketch: basically copy the relevant stuff from azkv, but load the cert/privkey from secret instead of from file. That should do :thinking: ```diff diff --git a/pkg/provider/azure/keyvault/keyvault.go b/pkg/provider/azure/keyvault/keyvault.go...

Hey @halilkaya, could you please run `make reviewable`? CI reports a diff in the helm chart README. ``` M deploy/charts/external-secrets/README.md ```

I don't know, it doesn't ring a bell. From the looks of it i think this is fine.

crossreference slack thread: https://kubernetes.slack.com/archives/C017BF84G2Y/p1705440846155629 You can use `templateFrom` with `target: Data` that lets you render keys dynamically ```yaml apiVersion: external-secrets.io/v1beta1 kind: SecretStore metadata: name: fake spec: provider: fake: data: -...