You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi, I'm trying to run vault-unseal as container in my docker swarm instance.
Then I realize to make it work I need to store my tokens in unencrypted format inside the vault-unseal.yaml file in the host.
I think it would be very nice if the vault-unseal support reading token list from separate file, so I can then use docker secrets to store my tokens securely.
🌧 Is your feature request related to a problem?
No response
🔎 Describe alternatives you've considered
--
⚠ If implemented, do you think this feature will be a breaking change to users?
Yes
⚙ Additional context
To make my approach of using vault-unseal clearer, here is the example.
First I create new secret containing the tokens: echo "aaaaaaaaaaaaaaaaaa,bbbbbbbbbbbbbbb" | docker secret create vault_unseal_tokens_a_b -
Then I can use the stack compose script below to easily spawn new vault-unseal node:
Sorry for the delay @brofids -- have you looked at simply mounting a .env file in the container in question? Not near my Kubernetes setup to confirm that's how I'm doing it, but it should work. it's the CWD of the container, so if you haven't modified it, it should just be /.env. This won't load them as environment variables, rather it will read the file and populate them in runtime as if they were environment variables.
That may or may not work for your case, depending on if you're able to format the file beforehand or not.
✨ Describe the feature you'd like
Hi, I'm trying to run vault-unseal as container in my docker swarm instance.
Then I realize to make it work I need to store my tokens in unencrypted format inside the
vault-unseal.yaml
file in the host.I think it would be very nice if the vault-unseal support reading token list from separate file, so I can then use docker secrets to store my tokens securely.
🌧 Is your feature request related to a problem?
No response
🔎 Describe alternatives you've considered
--
⚠ If implemented, do you think this feature will be a breaking change to users?
Yes
⚙ Additional context
To make my approach of using vault-unseal clearer, here is the example.
First I create new secret containing the tokens:
echo "aaaaaaaaaaaaaaaaaa,bbbbbbbbbbbbbbb" | docker secret create vault_unseal_tokens_a_b -
Then I can use the stack compose script below to easily spawn new vault-unseal node:
🤝 Requirements
The text was updated successfully, but these errors were encountered: