Open
Description
Summary
For some usecases I'll need a Kubernetes Sercret from type Opaque
with data in stringData
and not in data
. See also https://kubernetes.io/docs/concepts/configuration/secret/#restriction-names-data. That is a native Kubernetes use case which would be great, to have it in combination with 1Password Operator.
Use cases
Allow to store secret values that are not base64 encoded in stringData
for applications that need unencrypted values in a Kubernetes Secret.
Proposed solution
Adding option to specify if Opaque secret will store the values in data
or stringData
.
Following OnePasswordItem ...
apiVersion: onepassword.com/v1
kind: OnePasswordItem
type: Opaque/stringData
metadata:
name: private-repo-creds
spec:
itemPath: vaults/mysecretvault/items/private-repo-creds
... should create a Kubernetes Secret like this:
apiVersion: v1
kind: Secret
metadata:
name: private-repo-creds
namespace: demo
stringData:
type: git
url: git@git.demo.com:kubernetes/application
sshPrivateKey: |
-----BEGIN PRIVATE KEY-----
... wait for 1Password support for stringData in secrets
-----END PRIVATE KEY-----
Is there a workaround to accomplish this today?
If the application supports it, you can decode the base64 encoded value before use. In my case, that's not possible.
Metadata
Metadata
Assignees
Labels
No labels