You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
When AZURE_CLIENT_ID env is imported into a pod using envFromsecretRef method (meaning no annotation is set on a ServiceAccount), the workload identity webhook adds an empty AZURE_CLIENT_ID to env section of a container spec.
Due to env section having higher precedence in Kubernetes, when a container starts it gets an empty AZURE_CLIENT_ID.
Describe the solution you'd like
Since having empty AZURE_CLIENT_ID is of no use, it would be better if webhook stops adding empty AZURE_CLIENT_ID.
The issue with this approach is that not every helm chart offers a way to pass secretKeyRef, sometimes only envFromsecretRef is available.
Additional context
In our environment, terraform is used to generate a managed identity and to save a client ID into an Azure Key Vault.
Then, external-secrets operator fetches the client ID (along with other secrets) from the Key Vault and saves it into a k8s secret with a key AZURE_CLIENT_ID.
Pods have the following in their spec to populate environment variables:
envFrom:
- secretRef:
name: <name>
The text was updated successfully, but these errors were encountered:
Is your feature request related to a problem? Please describe.
When
AZURE_CLIENT_ID
env is imported into a pod usingenvFrom
secretRef
method (meaning no annotation is set on a ServiceAccount), the workload identity webhook adds an emptyAZURE_CLIENT_ID
toenv
section of a container spec.Due to
env
section having higher precedence in Kubernetes, when a container starts it gets an emptyAZURE_CLIENT_ID
.Describe the solution you'd like
Since having empty
AZURE_CLIENT_ID
is of no use, it would be better if webhook stops adding emptyAZURE_CLIENT_ID
.Describe alternatives you've considered
The issue with this approach is that not every helm chart offers a way to pass
secretKeyRef
, sometimes onlyenvFrom
secretRef
is available.Additional context
In our environment, terraform is used to generate a managed identity and to save a client ID into an Azure Key Vault.
Then, external-secrets operator fetches the client ID (along with other secrets) from the Key Vault and saves it into a k8s secret with a key
AZURE_CLIENT_ID
.Pods have the following in their spec to populate environment variables:
The text was updated successfully, but these errors were encountered: