Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feat: Added Oracle Cloud Infrastructure(OCI) Vault service as a backend with vaultid #670

Open
wants to merge 13 commits into
base: main
Choose a base branch
from

Conversation

ddevadat
Copy link

Description

Added Oracle Cloud Infrastructure(OCI) Vault service as a backend.

The plugin is configured with vault id and comparment id. So the deployment manifest doesnt have to store the vault ocid.

Checklist

Please make sure that your PR fulfills the following requirements:

  • Reviewed the guidelines for contributing to this repository
  • The commit message follows the Conventional Commits Guidelines.
  • Tests for the changes have been updated
  • Are you adding dependencies? If so, please run go mod tidy -compat=1.21 to ensure only the minimum is pulled in.
  • Docs have been added / updated
  • Optional. My organization is added to USERS.md.

Type of Change

  • Bugfix
  • Feature
  • Code style update (formatting, local variables)
  • Refactoring (no functional changes, no api changes)
  • New tests
  • Build/CI related changes
  • Documentation content changes
  • Other (please describe)

Other information

With this change user will be able to use OCI vault for storing secrets by
AVP_TYPE=ocivault
AVP_OCI_VAULT_ID="ocid1.vault.oc1.aaa"
AVP_OCI_VAULT_COMPARTMENT_ID="ocid1.compartment.oc1..aaa"

Added a new backend for Oracle Cloud Infrastructure Vault service
Documentes updated with the instruction for OCI backend

Signed-off-by: Deepak Devadathan <[email protected]>
When specifying latest secret version , explicitly setting version was failing.

Signed-off-by: Deepak Devadathan <[email protected]>
Added support for Oracle Cloud Infrastructure api key based authentication.
Authentication will be tried with api key based method first and if its not available it will fallback to
instance principal based authentication

Signed-off-by: Deepak Devadathan <[email protected]>
Updated the backend doc for a sample policy statement for instance principal authentication

Signed-off-by: Deepak Devadathan <[email protected]>
Added vault and compartment id for OCI based backend. This removes the need to put vault id
in the manifest files. Documents updated for this setup

Signed-off-by: Deepak Devadathan <[email protected]>
Corrected minor typo error in backend.md for OCI setup

Signed-off-by: Deepak Devadathan <[email protected]>
Update the documentation for backend.md with correct ref value pattern for vauld ocid

Signed-off-by: Deepak Devadathan <[email protected]>
Updated sample pattern for OCI vault

Signed-off-by: Deepak Devadathan <[email protected]>
updated the go mod file by running go mod tidy -compat=1.21

Signed-off-by: Deepak Devadathan <[email protected]>
Feat: Added Oracle Cloud Infrastructure(OCI) Vault service as a backend with vaultid
Prevent multiple secrets lookup for decrypting individual secrets. This issue was causing very
slow response, when oci vault has a large number of secrets.

Signed-off-by: Deepak Devadathan <[email protected]>
Fix: To prevent slowness in secrets lookup in oci vault
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant