Skip to content

Support Vault Provider for Secrets#540

Open
heurtematte wants to merge 3 commits intoeclipse-csi:feat/hashicorp-vault-supportfrom
heurtematte:main
Open

Support Vault Provider for Secrets#540
heurtematte wants to merge 3 commits intoeclipse-csi:feat/hashicorp-vault-supportfrom
heurtematte:main

Conversation

@heurtematte
Copy link
Contributor

Support Vault Provider in addition to Pass and Bitwarden.

e.g:

    orgs.newOrgSecret('REPO3_TOKEN_PASSWORD') {
      value: "vault:technology.cbi/repo3.eclipse.org/token-password",
    },
    orgs.newOrgSecret('REPO3_TOKEN_USERNAME') {
      value: "vault:technology.cbi/repo3.eclipse.org/token-username",
    },
``

@netomi netomi self-requested a review December 17, 2025 08:47
netomi
netomi previously approved these changes Dec 17, 2025
@netomi
Copy link
Member

netomi commented Dec 19, 2025

This fixes #196

@lukpueh
Copy link
Contributor

lukpueh commented Jan 7, 2026

FYI, in a different project I created a signing abstraction for Vault, and tested it against a real vault instance: secure-systems-lab/securesystemslib#800

If we want tests that go beyond mocking, we could take inspiration from that setup. Should I open a ticket?

@netomi
Copy link
Member

netomi commented Jan 14, 2026

so I cant really test right now as I dont have access to a vault instance.

if you provide such local setup @lukpueh I could review this PR.

@lukpueh
Copy link
Contributor

lukpueh commented Jan 14, 2026

so I cant really test right now as I dont have access to a vault instance.

if you provide such local setup @lukpueh I could review this PR.

The referenced setup creates a local vault instance on the fly. So everyone (devs, CI) can run it...

I'll start with a ticket and put the implementation in my backlog. :)

@heurtematte
Copy link
Contributor Author

if needed, I have created a specific mount point named "test" in our internal secrets manager and granted you access to test this feature out. you will need to override the default moint point which is "cbi".

@heurtematte
Copy link
Contributor Author

What is the status of this PR? Let me know if you need help to test it.

@mbarbero
Copy link
Contributor

@kairoaraujo , @lukpueh , could you please look into adding this to the next sprint release?

@kairoaraujo
Copy link
Contributor

@heurtematte can you solve the conflict, I will do a final round on this PR

@heurtematte
Copy link
Contributor Author

done!

kairoaraujo
kairoaraujo previously approved these changes Feb 11, 2026
Copy link
Contributor

@kairoaraujo kairoaraujo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@heurtematte it is good to merge, only the poetry.lock config.

Signed-off-by: sebastien.heurtematte <[email protected]>
Signed-off-by: sebastien.heurtematte <[email protected]>
Signed-off-by: sebastien.heurtematte <[email protected]>
@heurtematte
Copy link
Contributor Author

I’ve just fixed the errors reported by Prek. It would be worth taking another look.

@heurtematte
Copy link
Contributor Author

How did you test this feature? As far as I can see, you don’t currently have access to the secrets manager.

@kairoaraujo
Copy link
Contributor

Hi @heurtematte,

On top of your branch, I’ve started adding support for the development environment (this is how I’m currently testing the implementation):
https://github.com/eclipse-csi/otterdog/compare/main...kairoaraujo:otterdog:hashicorp-vault-support?expand=1

If you agree, I think we should continue this work in a separate feature branch.
Before including it in an Otterdog release, I believe we should improve a few things:

  • Provide a user guide explaining how to operate Otterdog with Vault.
  • Review some small (nit) hardcoded defaults that make sense for EF, but could be made more flexible and generic.

Let me know what you think.

@heurtematte
Copy link
Contributor Author

@kairoaraujo makes sense. Let me know when the branch is ready.

@heurtematte heurtematte changed the base branch from main to feat/hashicorp-vault-support February 12, 2026 08:45
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants