Comments (2)
I agree with your general point about defence-in-depth. However, the goal of sealed-secrets is precisely to turn Secrets into a form that is as "safe" to expose as the rest of your k8s configuration - so it can be used by (eg) open organisations that manage configuration by publicly readable git repositories.
If you have a suggestion, I would welcome some text for the README that communicates a more nuanced level of concern here. Perhaps we talk about the dangers of future-exploits (as you suggest), and then recommend users make the SealedSecret as available as the rest of their config? (ie: a paranoid organisation also wouldn't make their infrastructure setup details generally available, whereas an open-by-default distributed/transparent community project might choose to do so)
Regarding forward-secrecy, my hope with SealedSecrets was that it would encourage faster password rotation, since it enables automated "write-only" pipelines. I don't know of anyone who has actually done this using sealed-secrets however (and password rotation is generally an issue across our industry). Again, I would welcome some text for the README to talk about the importance of this too (or more specific bugs/PRs to better enable this use case).
from sealed-secrets.
I don't there are action items here, closing.
from sealed-secrets.
Related Issues (20)
- Sealed Secrets plugin for Helm HOT 1
- Helm chart 2.14.0 error if dashboard enabled after commonLabels added
- Sealed secret is not working when you have the kubernetes secret parse the data using the stringData using the yml file HOT 3
- Incorrect selector matchLabels on Helm chart ServiceMonitor HOT 1
- Correct way to validate the kubeseal tarball with Ansible HOT 4
- (question) sealed-secrets ingress, what use is it? HOT 2
- Immutable secrets are still not supported HOT 2
- Using sealed-secrets without controller/operator HOT 3
- About 0.25.0 release HOT 2
- Offline validation using signatures HOT 6
- Template `data` field treated as `stringData`, `stringData` ignored HOT 4
- Kubeseal not working on EKS IPv6 CLuster HOT 8
- kubeseal does not respond HOT 7
- Document system:authenticated group usage in GKE HOT 3
- Kubeseal is not able to fetch certificate HOT 1
- Kubeseal --re-encrypt with local certificates HOT 1
- Activate the golangci-lint gosec linter in the project configuration HOT 1
- Program managed sealed secret in GitOps environment (using ArgoCD)
- [Helm] Netpol & Servicemonitor enabled - not able to scrape metrics HOT 1
- lastTransitionTime/lastUpdateTime under status->conditions not updated when updating a SealedSecret
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from sealed-secrets.