-
Notifications
You must be signed in to change notification settings - Fork 40
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature request: array of secretNames in values.yaml #10
Comments
Sorry for the late reply. My notification settings for this repository were filtering the activity if my name was not directly mentioned. A bit strange. |
@vadimkim no worries for the late reply. I'll describe my use case to help explain. I have ingress on cluster A:
Then on cluster B (production only).
If cluster A was to be compromised, I do not want the DNS for myco.com to be vulnreable. So, for that reason, my uncle created a new account with hetzner just to manage the DNS of myco.com. This is why I have 2 hetzner DNS secrets on cluster B. I don't think this is a great security issue. What do you think? |
Any updates on how to manage two zones with different Hetzner accounts? |
@ibotty, @EarthlingDavey I didn't fully understand the idea. Initially you talked about multiple secrets then about multiple zones. Container, if compromised, can reveal API token that can be used by attacker to change DNS records at Hetzner. This is problem, indeed. Very serious. To improve security I am planning to upgrade base docker images first. Then we can think about DNS security as whole. Your solution looks complicated and benefits are not that obvious. |
Hi @vadimkim, thanks for taking care of it again! Very appreciated. My use case is a multi-tenant(-ish) cluster that has dns zones managed by different hetzner accounts. ATM, I am using two If there were two secrets corresponding to these two accounts it would need chosing the issuer superfluous. |
Hey @vadimkim thanks for your reply. I think maybe I can add to my explanation to clear one thing up. You say...
.. this is correct in some scenarios, but not for my case. Say I have myco .net <-- for staging and development on Cluster A. With that being the case I use the same Hetzner DNS account because clusters both use the .net domain. So, what is the next logical step if I want to run only one public facing .com service on my production Cluster B? Maybe I'm wrong, there could be a better way, but this is what I did... Use a new Hetzner account with a 2nd API key to manage .com DNS. Why did I decide to do this? Because, if Cluster A somehow leaks the secret for .net DNS, I have damage limitation and the attacker cannot modify my very important .com DNS records. You are right though, if Cluster B is compromised then both secrets are leaked. It sounds like a similar setup to @ibotty , but with a different reasoning.
This seems like solid advice, thank you!
Awesome, cheers! I hope this reply comes across in the friendly manner that I intend, I appreciate your time and discussion 👊✌️ |
Firstly, thanks for the very helpful tool. I have started using it in production, literally 2 minutes ago 😎
This feature would allow users to have multiple issuers, each with its own account on Hertzner with individual DNS API keys.
Would you mind considering this for the next release? My hacky work around at the moment is to manually create a role and role binding like this...
The text was updated successfully, but these errors were encountered: