Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Namespace isolation for ClusterSecretStore with core secrets #79

Open
all4code opened this issue May 13, 2024 · 0 comments
Open

Namespace isolation for ClusterSecretStore with core secrets #79

all4code opened this issue May 13, 2024 · 0 comments
Assignees
Labels
enhancement New feature or request

Comments

@all4code
Copy link
Collaborator

Implement namespace isolation for following best practices

Allow only access to the vault-kv-secret ClusterSecretStore only from argo, argocd, atlantis, github-runner, harbor, monitoring, oauth2-proxy, sonarqube namespaces

Create a clone of secrets ci-secrets&proxy-docker-config in the vault-kv-workloads-secret ClusterSecretStore

Modify workload templates to use ci-secrets & proxy-docker-config from the workload’s ClusterSecretStore

@all4code all4code added the enhancement New feature or request label May 13, 2024
@all4code all4code added this to CG DevX May 13, 2024
@all4code all4code moved this to Backlog in CG DevX May 13, 2024
@sergs-pci sergs-pci moved this from Backlog to Ready in CG DevX May 14, 2024
@sergs-pci sergs-pci moved this from Ready to In progress in CG DevX Jul 18, 2024
@sergs-pci sergs-pci self-assigned this Jul 18, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
Status: In progress
Development

No branches or pull requests

2 participants