Skip to content
This repository has been archived by the owner on Jul 26, 2022. It is now read-only.

looks like the app is not isolated to its namespace? #155

Closed
red8888 opened this issue Aug 23, 2019 · 1 comment
Closed

looks like the app is not isolated to its namespace? #155

red8888 opened this issue Aug 23, 2019 · 1 comment

Comments

@red8888
Copy link
Contributor

red8888 commented Aug 23, 2019

I have multiple deployments of the kubernetes-external-secrets in difference namespaces on the same cluster

My expectation is they would be totally isolated but I noticed a deployment in one namespace was accessing a diff namespace

For example I saw this in the deployment in namespace-X
spinning up poller {"id":"mysecret_1234","namespace":"namespace-Z","secretDescriptors":[{"backendType":"secretsManager","data":[{"key":"mykey","name":"mykey"}],"name":"mysecret"}],"ownerReference":{"apiVersion":"kubernetes-client.io/v1","controller":true,"kind":"ExternalSecret","name":"mykey","uid":"......"}}

How is this happening?

I guess im unsure of two things: how does it have access to other namespaces and how is it finding secrets in other namespaces?

Im using the helm chart to deploy and looks like its use ClusterRole. Is fixing this as easy as changing that to just Role? or maybe there is a config option to only look for secrets in the namespace where it was deployed?

@red8888
Copy link
Contributor Author

red8888 commented Sep 13, 2019

@red8888 red8888 closed this as completed Sep 13, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant