perf: make fetch_secrets use cache for performance (#11201)

diff --git a/apisix/consumer.lua b/apisix/consumer.lua
index 83d2aea..6bbd6ca 100644
--- a/apisix/consumer.lua
+++ b/apisix/consumer.lua
@@ -104,7 +104,8 @@
     for _, consumer in ipairs(consumers_conf.nodes) do
         core.log.info("consumer node: ", core.json.delay_encode(consumer))
         local new_consumer = core.table.clone(consumer)
-        new_consumer.auth_conf = secret.fetch_secrets(new_consumer.auth_conf)
+        new_consumer.auth_conf = secret.fetch_secrets(new_consumer.auth_conf, true,
+                                                        new_consumer.auth_conf, "")
         consumer_names[new_consumer.auth_conf[key_attr]] = new_consumer
     end
 
diff --git a/apisix/plugins/authz-keycloak.lua b/apisix/plugins/authz-keycloak.lua
index 5a7d32d..587628f 100644
--- a/apisix/plugins/authz-keycloak.lua
+++ b/apisix/plugins/authz-keycloak.lua
@@ -759,7 +759,7 @@
 
 function _M.access(conf, ctx)
     -- resolve secrets
-    conf = fetch_secrets(conf)
+    conf = fetch_secrets(conf, true, conf, "")
     local headers = core.request.headers(ctx)
     local need_grant_token = conf.password_grant_token_generation_incoming_uri and
         ctx.var.request_uri == conf.password_grant_token_generation_incoming_uri and
diff --git a/apisix/plugins/limit-count.lua b/apisix/plugins/limit-count.lua
index cc7791a..e3b4c0f 100644
--- a/apisix/plugins/limit-count.lua
+++ b/apisix/plugins/limit-count.lua
@@ -32,7 +32,7 @@
 
 
 function _M.access(conf, ctx)
-    conf = fetch_secrets(conf)
+    conf = fetch_secrets(conf, true, conf, "")
     return limit_count.rate_limit(conf, ctx, plugin_name, 1)
 end
 
diff --git a/apisix/ssl/router/radixtree_sni.lua b/apisix/ssl/router/radixtree_sni.lua
index ec6adac..aab6aaf 100644
--- a/apisix/ssl/router/radixtree_sni.lua
+++ b/apisix/ssl/router/radixtree_sni.lua
@@ -238,7 +238,8 @@
     end
     ngx_ssl.clear_certs()
 
-    local new_ssl_value = secret.fetch_secrets(matched_ssl.value) or matched_ssl.value
+    local new_ssl_value = secret.fetch_secrets(matched_ssl.value, true, matched_ssl.value, "")
+                            or matched_ssl.value
 
     ok, err = _M.set_cert_and_key(sni, new_ssl_value)
     if not ok then