From 88c843f0a92338226ed99c1b13e29dde8dbe2c1a Mon Sep 17 00:00:00 2001 From: Bojan Zelic Date: Mon, 20 Nov 2023 17:11:45 -0700 Subject: [PATCH 1/2] Vault: Allow TriggerAuthentication Defaults via ENV variables Signed-off-by: Bojan Zelic --- .../authentication-providers/hashicorp-vault.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/content/docs/2.13/authentication-providers/hashicorp-vault.md b/content/docs/2.13/authentication-providers/hashicorp-vault.md index a09b01a4e..b0dfe096b 100644 --- a/content/docs/2.13/authentication-providers/hashicorp-vault.md +++ b/content/docs/2.13/authentication-providers/hashicorp-vault.md @@ -13,14 +13,14 @@ You can pull one or more Hashicorp Vault secrets into the trigger by defining th ```yaml hashiCorpVault: # Optional. - address: {hashicorp-vault-address} # Required. - namespace: {hashicorp-vault-namespace} # Optional. Default is root namespace. Useful for Vault Enterprise - authentication: token | kubernetes # Required. - role: {hashicorp-vault-role} # Optional. - mount: {hashicorp-vault-mount} # Optional. + address: {hashicorp-vault-address} # Optional. (env: $VAULT_ADDR) + namespace: {hashicorp-vault-namespace} # Optional. Default is root namespace. Useful for Vault Enterprise (env: $VAULT_NAMESPACE) + authentication: token | kubernetes # Optional. (env: $VAULT_AUTH) + role: {hashicorp-vault-role} # Optional. (env: $VAULT_ROLE) + mount: {hashicorp-vault-mount} # Optional. (env: $VAULT_MOUNT) credential: # Optional. - token: {hashicorp-vault-token} # Optional. - serviceAccount: {path-to-service-account-file} # Optional. + token: {hashicorp-vault-token} # Optional. (env: $VAULT_TOKEN) + serviceAccount: {path-to-service-account-file} # Optional. (env: $VAULT_JWT_PATH) secrets: # Required. - parameter: {scaledObject-parameter-name} # Required. key: {hashicorp-vault-secret-key-name} # Required. From 9f22a0a5422edf985ad570c17c6a76264f56192d Mon Sep 17 00:00:00 2001 From: Bojan Zelic Date: Mon, 20 Nov 2023 17:14:41 -0700 Subject: [PATCH 2/2] Update hashicorp-vault.md Signed-off-by: Bojan Zelic --- .../authentication-providers/hashicorp-vault.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/content/docs/2.13/authentication-providers/hashicorp-vault.md b/content/docs/2.13/authentication-providers/hashicorp-vault.md index b0dfe096b..68b789c0f 100644 --- a/content/docs/2.13/authentication-providers/hashicorp-vault.md +++ b/content/docs/2.13/authentication-providers/hashicorp-vault.md @@ -13,14 +13,14 @@ You can pull one or more Hashicorp Vault secrets into the trigger by defining th ```yaml hashiCorpVault: # Optional. - address: {hashicorp-vault-address} # Optional. (env: $VAULT_ADDR) - namespace: {hashicorp-vault-namespace} # Optional. Default is root namespace. Useful for Vault Enterprise (env: $VAULT_NAMESPACE) - authentication: token | kubernetes # Optional. (env: $VAULT_AUTH) - role: {hashicorp-vault-role} # Optional. (env: $VAULT_ROLE) - mount: {hashicorp-vault-mount} # Optional. (env: $VAULT_MOUNT) + address: {hashicorp-vault-address} # Optional. (env - $VAULT_ADDR) + namespace: {hashicorp-vault-namespace} # Optional. Default is root namespace. Useful for Vault Enterprise (env - $VAULT_NAMESPACE) + authentication: token | kubernetes # Optional. (env - $VAULT_AUTH) + role: {hashicorp-vault-role} # Optional. (env - $VAULT_ROLE) + mount: {hashicorp-vault-mount} # Optional. (env - $VAULT_MOUNT) credential: # Optional. - token: {hashicorp-vault-token} # Optional. (env: $VAULT_TOKEN) - serviceAccount: {path-to-service-account-file} # Optional. (env: $VAULT_JWT_PATH) + token: {hashicorp-vault-token} # Optional. (env - $VAULT_TOKEN) + serviceAccount: {path-to-service-account-file} # Optional. (env - $VAULT_JWT_PATH) secrets: # Required. - parameter: {scaledObject-parameter-name} # Required. key: {hashicorp-vault-secret-key-name} # Required.