-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Secrets Provider Controller/MutatingAdmissionWebhook #315
Comments
Hi @tomcruise81 |
An alternative might be to create a provider for https://github.com/external-secrets/kubernetes-external-secrets and allow it to do most if not all of what I've described above. Presumably, during the namespaced-installation of that tool, account: my-conjur-account
applianceUrl: https://conjur-oss.cyberark.svc.cluster.local
authnUrl: https://conjur-oss.cyberark.svc.cluster.local/authn-k8s/<authenticator-id>
authnLogin: host/conjur/authn-k8s/<authenticator-id>/apps/secrets-provider-host
sslCertificate: ... could all be provided |
https://github.com/external-secrets/kubernetes-external-secrets was deprecated in favor of it's re-write - https://github.com/external-secrets/external-secrets. That currently supports:
Any plans on creating a provider there? Thanks! |
We now support External Secrets Operator - see https://external-secrets.io/latest/provider/conjur/ |
Is your feature request related to a problem? Please describe.
I would like to see a Secrets Provider MutatingAdmissionWebhook/Controller that processes all
Secrets
in a givenNamespace
. If theSecret
contains Conjur-specific attributes/annotations, it could automatically handle retrieving those secret's values from Conjur. The Controller portion would be necessary to handle updates to thoseSecrets
based on changes on the Conjur side. We're looking for this because creatingCronJobs
for potentially manySecrets
(due to #236) in a givenNamespace
could become unruly very fast, and it allows for more of a single configuration point.Describe the solution you would like
This is inspired by how the cert-manager
Issuer
works.The idea would be to:
Namespace
-level Secrets Provider. This would be where you'd configure:Namespace
-level Secrets Provider would observe:Secrets
- and periodically query Conjur (or register a webhook or something similar) for updated values that'd get propagated into the existingSecrets
Secrets
as they are introduced into theNamespace
, by processing them should they contain theconjur-map
section, or potentially some additional attributes. Alternatively, this could be based on a new CRD that get's transformed through this process into a KubernetesSecret
The text was updated successfully, but these errors were encountered: