-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support secrets from a different GCP project #19
Comments
@rawlingsj , if this repo is open to collaboration I won't mind contribute |
Absolutely! All contributions welcome :) |
Fwiw it might be worth looking at https://github.com/external-secrets/kubernetes-external-secrets if you need to work with multiple secret managers which Jenkins X does so we default to that. Having said that this controller is totally fine if you prefer. Just wanted to mention both incase you'd not seen the other project. |
Actually I was also just checking here :) And I believe it solves both problems I would like gsm to solve, will take a look there. Thank you for your prompt response btw |
This would be very handy in a collaborative setting, imagine the scenario of:
cA
lives in projectpA
contains lots of secrets from different teamscA
doesn't want subteam to have write access on secrets in projectpA
for security reasonB
owns projectpB
but notpA
, and doesn't mind for clustercA
to have read access on secrets in projectpB
If gsm supports a different project, the workflow can become:
B
grant projectpB
secret read access to the service account from projectpA
B
creates secretprecious
inpB
B
creates a PullRequest to the repo that contains config of clustercA
, with an empty secret says this is a secretprecious
from projectpB
cA
then can pullprecious
frompB
and fill it inThe text was updated successfully, but these errors were encountered: