Open trhumphries opened 1 week ago
BTW, I just tried the 2.1.0 release and it also creates as an opaque secret
Not sure if this will help. If I change the target.secretName to point to a non-existant value in the App Configuration. It hone generates 2 secrets one called nonexistantsecret that is of type opaque and one with the name of the certificate from the KV that is of type tls
secret: auth: workloadIdentity: serviceAccountName: appconfigidentity target: secretName: nonexistantsecret
Hi @trhumphries , this behavior is expected. The spec.secret
and spec.secret.target
are required if any Key Vault references are expected to be downloaded. By default, Secrets resolved from Key Vault references (without .kubernetes.secret.type
specified) are saved as the Opaque Secret type with target.secretName
.
The one that has got the .kubernetes.secret.type: kubernetes.io/tls
tag is saved as tls type secret, since there's no other secret selected, an empty opaque secret is generated.
I have a reference to a certificate in a KV with the .kubernetes.secret.type set to kubernetes.io/tls. However instead of a tls secret it generates an opaque secret. This did work 2 days ago the latest 2.0.0 update seems to have broken it.