kubernetes-sigs / secrets-store-csi-driver

Secrets Store CSI driver for Kubernetes secrets - Integrates secrets stores with Kubernetes via a CSI volume.

Home Page:https://secrets-store-csi-driver.sigs.k8s.io/

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Creating a secret of type kubernetes.io/dockerconfigjson

monicabiswal147 opened this issue · comments

Hi Team ,

I am trying to create a secret of type kubernetes.io/dockerconfigjson where my provider is vault in the secretproviderclass yaml.
Is this 'Azure/secrets-store-csi-driver-provider-azure#450' the only way to create a dockerconfigjson type secret as in upload the blob json in keyvault as a secret? Can I also provide under objectName, secretPath and secretKey under spec.parameters.objects: the way I have done for secret type as opaque. My secret keys are docker-repo-url, docker username and docker password.
Is there a documentation with examples on how to use?
Also, Should the objectType: secret always? I have objectName: dockerconfig, secretPath: , secretKey: in my spc.yaml.

The Kubernetes project currently lacks enough contributors to adequately respond to all issues.

This bot triages un-triaged issues according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the issue is closed

You can:

  • Mark this issue as fresh with /remove-lifecycle stale
  • Close this issue with /close
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/lifecycle stale