You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The way how you need to format the string for the objects you want to read from a KeyVault is very confusing. I know that you have to provide a string because of the CRD specification, answered already here (#155)
But if I compare Azure and AWS it is easier to create a SecretProviderClass in AWS.
The way how you need to format the string for the objects you want to read from a KeyVault is very confusing. I know that you have to provide a string because of the CRD specification, answered already here (#155)
But if I compare Azure and AWS it is easier to create a SecretProviderClass in AWS.
In AWS: https://github.com/aws/secrets-store-csi-driver-provider-aws#secretproviderclass-options
In Azure:
The result is, that it is much easier to create this file (manually and especially automatically - e.g. with HCL)
In AWS:
In Azure:
If I want to build this even more generic, I can simply iterate through a list in the AWS way. For Azure, I need to use weird templates.
Why is it implemented that way for Azure? Can this be improved?
The text was updated successfully, but these errors were encountered: