Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ProviderConfig externalID should take a secretRef #1548

Open
anthonynashduco opened this issue Oct 30, 2024 · 1 comment
Open

ProviderConfig externalID should take a secretRef #1548

anthonynashduco opened this issue Oct 30, 2024 · 1 comment
Labels
enhancement New feature or request needs:triage

Comments

@anthonynashduco
Copy link

What problem are you facing?

We use an external-id to assume through our auth account into other accounts. This value is, and should be treated as, a secret. Currently in the ProviderConfig you can only hard code a value into the resource, which is a problem when they're in gitops.

What could help solve your problem?

Change structure from

spec:
  assumeRoleChain:
  - externalID: <string>

to

spec:
  assumeRoleChain:
  - externalID:
      secretRef:            # Either this
        name: <string>
        namespace: <string>
        key: <string>
      value: <string>       # or this
@anthonynashduco anthonynashduco added enhancement New feature or request needs:triage labels Oct 30, 2024
@cristicalin
Copy link

cristicalin commented Nov 28, 2024

Would love to see this feature added to the aws provider family.

Our use-case involves installing providers and the provider configs through gitops which means the externalID could sometimes be visible and exposed to unauthorized users. Being able to create a secret with external secrets operator or some other secure way to get secrets into the cluster would mitigate this.

We considered the scenario to wrap the creation of the ProviderConfig into it's won XRD but that adds complexity to the code in a way that makes it more difficult to reason about.

To avoid a breaking change I would suggest this format instead:

spec:
  assumeRoleChain:
  - externalID: # Either this
  - externalIDSecretRef: # or this

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request needs:triage
Projects
None yet
Development

No branches or pull requests

2 participants