Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

If a KV secret is marked for future deletion the secret is not return when it is still valid. #1881

Open
darkedges opened this issue Feb 15, 2024 · 1 comment

Comments

@darkedges
Copy link

darkedges commented Feb 15, 2024

Please note that the Consul Template issue tracker is reserved
for bug reports and enhancements. For general usage questions,
please use the Consul Community Portal or the Consul mailing list:

https://discuss.hashicorp.com/c/consul
https://groups.google.com/forum/#!forum/cons

Consul Template version

HashiCorp Vault 1.15.2 uses 0.33

Configuration

Please review hashicorp/vault-k8s#123

Expected behavior

If a secret is marked for future deletion and it is within the timeframe it should be generated.

Actual behavior

The following https://github.com/hashicorp/consul-template/blob/v0.33.0/dependency/vault_read.go#L181 just checks to see if the value is present instead of verifying it should have been deleted.

Steps to reproduce

Please review hashicorp/vault-k8s#123

References

Please review hashicorp/vault-k8s#123

@thevilledev
Copy link
Contributor

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants