tech-debt: tools/vault-import.sh uses hardcoded secret/ KV mount #910
Labels
No labels
action
backlog
blocked
bug-report
cannot-reproduce
in-progress
in-triage
needs-triage
prediction/actioned
prediction/dismissed
prediction/unreviewed
priority
rejected
reproduced
tech-debt
underspecified
vision
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: disinto-admin/disinto#910
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Flagged by AI reviewer in PR #909.
Problem
tools/vault-import.shstill uses hardcodedsecret/data/${path}for its curl-based KV write (lines 149, 151, 162, 166, 170). The rest of the codebase was migrated to the configurableVAULT_KV_MOUNTvariable (defaulting tokv) via PR #909. Any deployment withkv/as its KV mount will see 403/404 failures whenvault-import.shruns.Fix
Either:
vault-import.shto callhvault_kv_put(which now respectsVAULT_KV_MOUNT), orsecret/datareference with${VAULT_KV_MOUNT:-kv}/datamatching the convention inlib/hvault.sh.Auto-created from AI review
Affected files
tools/vault-import.sh(lines 149, 151, 162, 166, 170 — hardcodedsecret/datareferences)lib/hvault.sh(reference implementation usingVAULT_KV_MOUNT)Acceptance criteria
tools/vault-import.shuses${VAULT_KV_MOUNT:-kv}/data(or callshvault_kv_put) instead of hardcodedsecret/datasecret/datapath references remain intools/vault-import.shVAULT_KV_MOUNT=kvis set (matching the standard deployment config)shellcheckcleansecret/mount prefix but migration policies usekv/— agents will get 403 (#890) #909