Skip to content

Conversation

ericchiang
Copy link
Contributor

@ericchiang ericchiang commented Jul 14, 2017

This section attempts to capture some of the best practices around
client API access to secrets. Specifically that list and watch operations
on secrets are extremely powerful.

This has been expressed a few times, but not formalized:

kubernetes/ingress-nginx#816
kubernetes/kubernetes#45189
kubernetes-retired/service-catalog#621

cc @kubernetes/sig-auth-misc


This change is Reviewable

This section attempts to capture some of the best practices around
client API access to secrets. Specitically that controllers should
avoid list and watch operations in favor of getting specific secrets.
@k8s-ci-robot k8s-ci-robot added sig/auth cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. labels Jul 14, 2017
@deads2k
Copy link
Contributor

deads2k commented Jul 26, 2017

lgtm

Copy link
Contributor

@chenopis chenopis left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

One small nit.


For these reasons `watch` and `list` requests for secrets within a namespace are
extremely powerful capabilities and should be avoided, since listing secrets allows
the clients to inspect the values if all secrets in that namespace. The ability to
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

missing word? "...since listing secrets allows the clients to inspect the values if all secrets are in that namespace."

@k8sio-netlify-preview-bot
Copy link
Collaborator

@chenopis chenopis merged commit 787d50a into kubernetes:master Aug 1, 2017
steveperry-53 added a commit that referenced this pull request Aug 1, 2017
* secrets: add a best practices section and API access recommentations (#4380)

* secrets: add a best practices section and API access recommentations

This section attempts to capture some of the best practices around
client API access to secrets. Specitically that controllers should
avoid list and watch operations in favor of getting specific secrets.

* add "are"

* update scratch.md for issue #4068 (#4069)

* update scratch.md for issue #4068

Issue #4068 details the dangers of recommending single etcd instance.

This will likely need to be expanded into better "highly available" cluster documentation

* Refactor list style

* fix ordered list

* fix unordered list

* ul

* add back shell

* Adding tutorial links to docs (#4570)

* Adding tutorial links to docs

* Update index.md
jesscodez pushed a commit that referenced this pull request Sep 22, 2017
…4380)

* secrets: add a best practices section and API access recommentations

This section attempts to capture some of the best practices around
client API access to secrets. Specitically that controllers should
avoid list and watch operations in favor of getting specific secrets.

* add "are"
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cncf-cla: yes Indicates the PR's author has signed the CNCF CLA.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants