-
Notifications
You must be signed in to change notification settings - Fork 2.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
HashiCorp key vault does not override application.properties #14743
Comments
/cc @vsevel |
related to #14707 ? |
No. I don't remember where I got this value. Some quarkus code or an example somewhere. What would an appropriate value? |
I think I got it from the zookeeper config source for the kubernetes config we have:
@geoand what do you think? should we go with |
Both are just fine. The Kubernetes uses both of them in order to ensure that secrets override properties, but for vault I assume you don't have 2 different kinds of sources |
By the way, per the spec, a We may want to add that capability to the |
After changing the value from 150 to 285 it works as expected. |
When @bardsoleim tested with ordinal=285, he modified the Quarkus source. Is it possible to override this runtime or with @QuarkusMain ? |
Not with a simple configuration as far as I'm aware. Right now, the possible options I see is to create a new provider / instance that is able to override the ordinal, but since it requires some internal Quarkus config it may not be so easy. Another option may be to cast the |
@radcortez you mean we should honor a property |
No, just Please check:
|
@radcortez it looks a bit strange to put this information into the vault, because that is something that's going to be quarkus specific. whereas vault is a central point for many workloads and tools. we would have to figure out a path in the kv secret engine such as |
Don't you already take into account the app config in the |
yes we could. note that
somebody would have to decide what to do if |
We can opt out of it if we don't find a suitable way to do it. I guess the spec did not foreseen these cases, so this is somehow uncharted territory. We can certainly bend the rules a little bit and point to a different property, other than |
so would you be fine with a property such as |
Yes. We can even add some of the reasoning why we picked that approach. Thanks! |
Describe the bug
HashiCorp vault does not override properties in application.properties
Expected behavior
Values in application.properties that share the same name described in vault should be overridden.
Actual behavior
Only the values in application.properties gets assigned.
To Reproduce
https://quarkus.io/guides/vault
follow this guide while having a value for "a-private-key" in application.properties
Steps to reproduce the behavior:
icable, add screenshots to help explain your problem.)
**Environment **
Quarkus 1.11.1.Final
The text was updated successfully, but these errors were encountered: