[Security] Enable secret rotation feature in KV secret provider
Infrastructure Submissions:
- [YES] Have you added an explanation of what your changes do and why you'd like us to include them?
- [NO] I have updated the documentation accordingly.
- [NA] I have added tests to cover my changes.
- [YES] All new and existing tests passed.
- [YES] I have formatted the terraform code. (
terraform fmt -recursive && go fmt ./...
)
Current Behavior or Linked Issues
Each Service principal secret has expiration date. When we perform rotation and secret value is updated in Keyvault - KV secret provider is not able to sync new version of the secret into AKS secret. This MR enabling automatic syncing of Keyvault secret to AKS which is expected behaviour.
Does this introduce a breaking change?
- [NO]
Edited by Vasyl Leskiv [SLB]