Hashicorp Vault Trait

The Hashicorp Vault trait can be used to use secrets from Hashicorp Vault

The Hashicorp Vault trait is disabled by default.

For more information about how to use secrets from Hashicorp vault take a look at the components docs: Hashicorp Vault component

A sample execution of this trait, would require the following trait options: -t hashicorp-vault.enabled=true -t hashicorp-vault.token="token" -t hashicorp-vault.port="port" -t hashicorp-vault.engine="engine" -t hashicorp-vault.port="port" -t hashicorp-vault.scheme="scheme"

This trait is available in the following profiles: Kubernetes, Knative, OpenShift.

Configuration

Trait properties can be specified when running any integration with the CLI:

$ kamel run --trait hashicorp-vault.[key]=[value] --trait hashicorp-vault.[key2]=[value2] integration.groovy

The following configuration options are available:

Property Type Description

hashicorp-vault.enabled

bool

Can be used to enable or disable a trait. All traits share this common property.

hashicorp-vault.auto

bool

Enables automatic configuration of the trait.

hashicorp-vault.host

string

The Host to use

hashicorp-vault.port

string

The Port to use

hashicorp-vault.engine

string

The Hashicorp engine to use

hashicorp-vault.token

string

The token to access Hashicorp Vault. This could be a plain text or a configmap/secret The content of the hashicorp vault token is expected to be a text containing a valid Hashicorp Vault Token. Syntax: [configmap|secret]:name[/key], where name represents the resource name, key optionally represents the resource key to be filtered (default key value = hashicorp-vault-token).

hashicorp-vault.scheme

string

The scheme to access Hashicorp Vault