-
Notifications
You must be signed in to change notification settings - Fork 558
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support to manage items within a generic secret #2394
base: main
Are you sure you want to change the base?
Add support to manage items within a generic secret #2394
Conversation
…into feat/vault-generic-secret-item
Hi there @kaerimichi - please feel free to tag me directly when you feel this is ready for review! I'll get direct notifications when you do. Thank you! |
…into feat/vault-generic-secret-item
…into feat/vault-generic-secret-item
@heatherezell it's now ready for review! please let me know if this addition makes sense... thanks in advance |
@heatherezell do you have a plan if and when this PR will be merged? Is it a good feature for you? If not, why not? We need the proposed solution and are currently considering using @kaerimichi's fork for now. |
Thanks for checking in! Our engineering and product teams will be taking this under consideration. I can't guarantee a timeline, as it's a net-new feature, but we hear that folks want it included. :) |
…into feat/vault-generic-secret-item
Description
This PR add support for the
vault_generic_secret_item
resource.This new feature aims to enhance the existing
vault_generic_secret
resource in the terraform-provider-vault by allowing granular management of key/value items within a Vault generic secret (KV). Currently, this resource enables management at the whole secret level, meaning the entire secret is created or destroyed as a single unit. This enhancement provides the ability to create, update, and delete individual key/value pairs within a secret, offering more precise control over secrets management.Users can now update specific key/value pairs within an existing secret without affecting other items. This is particularly useful in scenarios where multiple applications or services share a secret, and individual updates need to be isolated.
With the ability to manage keys within a secret, users can avoid destroying the entire secret when running terraform destroy on specific key/value pairs. By isolating key/value updates, the risk of accidental data loss or exposure due to the complete deletion of secrets is minimized. The feature also introduces a more efficient way of managing secrets, as users no longer need to recreate entire JSON structures for minor updates.
Use Cases
Checklist
Output from acceptance testing:
Community Note