Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Differently-scoped credentials per SecretRotator #24

Open
kennethredler opened this issue Jul 3, 2024 · 1 comment
Open

Differently-scoped credentials per SecretRotator #24

kennethredler opened this issue Jul 3, 2024 · 1 comment
Labels
feature request New feature or request

Comments

@kennethredler
Copy link

Is your feature request related to a problem? Please describe.

Scoped credentials.

Describe the solution you'd like to see

I would like the secrets provisioned for two different SecretRotators by the same operator to have two different authorization scopes.

SecretRotator A might put secret N in namespaces 1-5 that only provides authorization to pull image N-Y, and NOT authorized to pull image M-Z.

Meanwhile, SecretRotator B might put secret M in namespaces 6-10 that only provides authorization to pull image M-Z, and NOT authorized to pull image N-Y.

Describe alternatives you've considered

Multiple operators selecting specific SecretRotators by label.

Manual rotation.

Distinct optional attribute of each SecretRotator containing IAM Role ARN assumable by the operator's IRSA.

Additional context

Similar pattern to ExternalSecret operator which can use an assumable role attribute on SecretStore for AWS SecretsManager and ParameterStore providers.

@kennethredler kennethredler added the feature request New feature or request label Jul 3, 2024
@oumkale
Copy link
Member

oumkale commented Jul 17, 2024

HI @kennethredler,

Thank you for raising issue, we will look into and get back to you.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature request New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants