Description
Is your feature request related to a problem? Please describe.
When configuring Vault to run in Kubernetes and use PostgreSQL storage backend, I ran in to an issue where my only option to configure PostgreSQL connection string is to provide it in configurations file - this is a problem to use since we store configurations for deployments in Git and in this case the configuration would contain the database password.
Describe the solution you'd like
libpq already has a set of environment variables pq should be able to pick up - https://www.postgresql.org/docs/current/libpq-envars.html these can be used, or specific set of environment variables can be created to cover these configuration options - this is already the case for other storage backends for Vault - DynamoDB, Manta, S3 and Swift.
Explain any additional use-cases
Not storing secrets in configuration files greatly helps with implementing GitOps type of deployments where the state of application is stored in git - secrets instead can be passed as environment variables to the running application during deployment.
This especially has become the case now when Vault has Helm Chart deployment option and configuration of Vault is part of valuesfile.
Activity