-
Notifications
You must be signed in to change notification settings - Fork 64
Closed
Labels
enhancementNew feature or requestNew feature or request
Description
Summary
To avoid putting database credentials in the configuration file, they should be pulled from a central secrets store. Current code only supports Azure and Oracle Cloud secret stores. Add also HashiCorp Vault support that would be the most useful for on-prem deployments.
Motivation
To add HashiCorp Vault to the supported credential stores.
Proposed Solution
Just code changes, I have already started to implement it, would like to create a pull request to the first version that support key-value secret store.
The configuration would look like this:
databases:
mydb:
vault:
hashicorp:
proxySocket: /var/run/vault/vault.sock
mountType: secret engine type, currently either "kvv1" or "kvv2"
mountName: secret engine mount path
secretPath: path of the secret
usernameAttribute: name of the JSON attribute, where to read the database username, if ommitted defaults to "username"
passwordAttribute: name of the JSON attribute, where to read the database password, if ommitted defaults to "password"
rfjodorov and anders-swanson
Metadata
Metadata
Assignees
Labels
enhancementNew feature or requestNew feature or request