I have a situation where I need to store JKS keys in vault, but you know the key format is not accepted to be stored as is in vault kv … Currently I’m using vault-csi-provider with secretclassptovider , I base64 the key then store it in vault but when it get fitched by the csi-provider is get encoded again , so the key is double encoded
Do you have any idea if I can ignore the base64 encoding and let the secretclassprovider fetch the values as is without any encoding?
Do you recommend any approach to manage the JKS keys ?
it’s not really that relevant , I wanted the CSI to not encode the already encoded values iin vault
cause as you know the jks format is not accepted to be saved in vault as a plain it has to be base64, and when I did the csi feteched the value and encode it again so when it gets decoded the key is invalid cause it’s still need double decoding
yep it is expected to be rendered in the secret as encoded, but do u have any advise for the JKS keys with vault ? if it’s stored as base64 it will get encoded in secret = twice encodeing