Skip to content

Comments

Replace Hashicorp Vault with AKeyless for secrets management#2

Draft
Copilot wants to merge 7 commits intomasterfrom
copilot/replace-hashicorp-with-akeyless
Draft

Replace Hashicorp Vault with AKeyless for secrets management#2
Copilot wants to merge 7 commits intomasterfrom
copilot/replace-hashicorp-with-akeyless

Conversation

Copy link

Copilot AI commented Feb 3, 2026

Migrates secrets management from Hashicorp Vault to AKeyless. Maintains backward compatibility through existing IVaultManager interface.

Core Implementation Changes

API Endpoints:

  • Auth: POST /v1/auth/{method}/loginPOST /auth (unified endpoint with access-type parameter)
  • Secrets: GET /v1/secret/data/{path}POST /get-secret-value
  • Headers: X-Vault-TokenAuthorization: Bearer

Authentication Method Mapping:

Vault AKeyless Config
AppRole (role_id + secret_id) API Key @accessId + @accessKeySecret
Kubernetes JWT Kubernetes @accessId + k8s token
Client Certificate Certificate @accessId + cert files
Token Token @client-secret (unchanged)

Class Refactoring:

  • CVaultCAKeyless
  • CVaultSetCAKeylessSet
  • CVaultManagerCAKeylessManager
  • VaultAuthTypeAuthType

Configuration Schema

Removed:

  • @kind (kv_v1/kv_v2 distinction)
  • @appRoleId, @appRoleSecret

Added:

  • @accessId - AKeyless access identifier
  • @accessKeySecret - k8s secret name containing access key

Response Parsing

// Vault: nested data structure
{ "data": { "data": { "key": "value" } } }

// AKeyless: flat structure with full path as key
{ "/category/name": { "key": "value" } }

Parser now matches secrets by path suffix to handle namespace variations.

Documentation

  • Migration guide with API mapping and troubleshooting
  • Setup guides for Kubernetes and API Key authentication
  • ECL code examples and key rotation procedures

Warning

Firewall rules blocked me from connecting to one or more addresses (expand for details)

I tried to connect to the following addresses, but was blocked by firewall rules:

  • docs.akeyless.io
    • Triggering command: /home/REDACTED/work/_temp/ghcca-node/node/bin/node /home/REDACTED/work/_temp/ghcca-node/node/bin/node --enable-source-maps /home/REDACTED/work/_temp/copilot-developer-action-main/dist/index.js (dns block)

If you need me to access, download, or install something from one of these locations, you can either:

Original prompt

We need to replace our Hashicorp Vault security code and replace it with AKeyless. Can you identify all places that use Hashicorp code and how the calls correspond to the AKeyless. Can create a branch in my repo call MyAKeyless and make code changes to all files replacing Hashicorp vault calls with AKeyless calls so I get the same functionality


✨ Let Copilot coding agent set things up for you — coding agent works faster and does higher quality work when set up for your repo.

Copilot AI and others added 6 commits February 3, 2026 17:03
…tion

Co-authored-by: stuartort <901531+stuartort@users.noreply.github.com>
Co-authored-by: stuartort <901531+stuartort@users.noreply.github.com>
Co-authored-by: stuartort <901531+stuartort@users.noreply.github.com>
Co-authored-by: stuartort <901531+stuartort@users.noreply.github.com>
…sing

Co-authored-by: stuartort <901531+stuartort@users.noreply.github.com>
Co-authored-by: stuartort <901531+stuartort@users.noreply.github.com>
Copilot AI changed the title [WIP] Replace Hashicorp Vault calls with AKeyless integration Replace Hashicorp Vault with AKeyless for secrets management Feb 3, 2026
Copilot AI requested a review from stuartort February 3, 2026 17:12
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants