Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

use workload identity for external secret instead of service key. #233

Merged
merged 1 commit into from
Aug 1, 2022

Conversation

k4leung4
Copy link
Contributor

@k4leung4 k4leung4 commented Jul 5, 2022

@k4leung4 k4leung4 requested a review from cpanato July 5, 2022 17:08
@@ -42,10 +47,17 @@
depends_on = [google_service_account.external_secrets_sa]
}

resource "google_project_iam_member" "external_secrets_binding_token" {
project = var.project_id
role = "roles/iam.serviceAccountTokenCreator"

Check warning

Code scanning / tfsec

Users should not be granted service account access at the project level

Service account access is granted to a user at project level.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Post submit feedback @k4leung4 : can this be updated to grant the role on the specific service accounts(s) that need impersonating? This is a very powerful grant since the external-secrets SA can use access of any other service accounts in the project.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@var-sdk good point. created #264

@k4leung4 k4leung4 requested a review from priyawadhwa July 6, 2022 18:27
helm_release.external_secrets
]
}

resource "kubectl_manifest" "secretstore_gcp_backend" {
yaml_body = <<YAML
apiVersion: external-secrets.io/v1alpha1
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

maybe we can bump to apiVersion: external-secrets.io/v1beta1 and use the new version

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we are still on 0.4.4, i dont think it supports v1beta1

though we should upgrade external secrets to 0.5x
filed https://github.com/sigstore/public-good-instance/issues/480

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i think we don't use anything that breaks, but i will double check

Copy link
Member

@cpanato cpanato left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

non blocking comment
thanks for the update

@k4leung4 k4leung4 merged commit 2f4558e into sigstore:main Aug 1, 2022
@k4leung4 k4leung4 deleted the wip branch August 1, 2022 16:01
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants