Comments (4)
I've updated to title to clarify that our case the differently named secrets are always required in the same namespace. I believe some other companies deploy feature branches to new namespaces so this would not deal with that problem but it's a start.
from sealed-secrets.
Brainstorming:
- we have "exact namespace/name" (default) and "cluster-wide=true" (with annotation) at present. I think it would make sense to add "namespace-wide=true", and that such an option would be reasonably easy to understand the tradeoffs.
- we could add a pattern match/substitute for name and/or namespace, that effectively encompasses everything between "exact match" and "don't care". I like the generality, but in practice I don't know of any common RBAC policies/mechanisms that allow creating namespace/resources within specified name prefixes (or patterns) like this. Afaik, the available k8s mechanisms are either "can't create $resource", "can create $resource called $this", or "can create $resource with any name", so I share your concern that adding a pattern match adds complexity and false security.
- we could add an annotation that enumerated specific allowed namespaces/names. This is kind of like the pattern match, but I think is closer to the capabilities of what RBAC policy can also describe. Not sure if that usefully covers your use-case though.
from sealed-secrets.
Out of those ideas, I think the first option about namespace wide secrets makes the most sense. That's generally how permissions are modelled anyway and the context switching to that option seems relatively straight forward from an analysis point of view. So we'd end up with 3 different permission models. Perhaps even the annotation could be something like sealedsecrets.bitnami.com/permission-model
or similar with allowed values of cluster, namespace, secret (default)?
Even though it was my initial idea, I've gone off the pattern thing. I think it's too complex. I agree with your assessment about other RBAC mechanisms. Kubernetes RBAC supports exact match resourceNames
and probably won't support such expressions. See kubernetes/kubernetes#56582 and kubernetes/kubernetes#56603.
The last idea sounds interesting but would not work for our particular case since the version changes frequently, for some repos on every commit. So it'd be pretty much the same in terms of how many times we need to re-seal a secret.
from sealed-secrets.
Will look to submit a PR for this soon to allow setting different access control modes.
from sealed-secrets.
Related Issues (20)
- Template `data` field treated as `stringData`, `stringData` ignored HOT 4
- Kubeseal not working on EKS IPv6 CLuster HOT 8
- kubeseal does not respond HOT 7
- Document system:authenticated group usage in GKE HOT 3
- Kubeseal is not able to fetch certificate HOT 1
- Kubeseal --re-encrypt with local certificates HOT 1
- Activate the golangci-lint gosec linter in the project configuration HOT 1
- Program managed sealed secret in GitOps environment (using ArgoCD)
- [Helm] Netpol & Servicemonitor enabled - not able to scrape metrics HOT 1
- lastTransitionTime/lastUpdateTime under status->conditions not updated when updating a SealedSecret
- kubeseal is ignoring NO_PROXY variables upon request for cert.pem (403) HOT 4
- Unseal with --raw HOT 6
- Secret values not getting updated HOT 1
- Vendoring fails on 0.26.1 HOT 1
- Bug in Helm Chart in file role-binding.yaml
- Ability to enable TLS on Ingress with custom certificate which exists on the cluster already HOT 4
- Creating sealed secret throws an error: "an empty namespace may not be set when a resource name is provided" HOT 1
- Status shows no key could decrypt secret for successful created secret HOT 1
- decrypt secrets encrypted with custom TLS certificate of expired validity HOT 1
- Secret not yet active when deploying with Helm HOT 2
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from sealed-secrets.