You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jul 26, 2022. It is now read-only.
Version: godaddy/kubernetes-external-secrets:4.2.0
We have a permission strategy in vault which gives each kubernetes auth backend role permission to specific path in vault.
Using these roles for different external secrets results in permission denied for all but the ones with one of the roles.
How does the authentication works:
Does it login as a role and keeps renewing the provided token? and when it process a secret that is defined with a different role it still tries to access the secret in vault using that logged on role?
Is there a way to support multiple controllers that will logon with different roles?
As an example, given these two secrets, one will always succeed and the other will fail during sync.
If KES is caching the login token then that login token can only be for a single vault role. Does KES need to be a little smarter and cache a map of roles -> tokens and look up (& potentially renew these) as necessary?
Agree @KouriR . Granting the service account multiple vault roles is acceptable as long as you lock down the service account namespace. Users in other namespace simply say what role they are using (which should be the one assigned to them/team).
Using multiple service accounts will require multiple deployments of KES.
Giving the KES operator access to all your roles does not work in a multitenant environment. A malicious user can simply specify a role which they should not have access to.
Version:
godaddy/kubernetes-external-secrets:4.2.0
We have a permission strategy in vault which gives each kubernetes auth backend role permission to specific path in vault.
Using these roles for different external secrets results in permission denied for all but the ones with one of the roles.
How does the authentication works:
As an example, given these two secrets, one will always succeed and the other will fail during sync.
The text was updated successfully, but these errors were encountered: