Skip to content

Credentials Dependency issue should come from desired state not desired configuration #605

@rudchrisp

Description

@rudchrisp

Description:
Currently (and this understandably) one cannot change the referred secret (Service Manager Secret) used in a ServiceInstance.

Issue
In Day to Day operations often configurations like manifest/secret names are renamed and properties changed hence a very simple enhancement of this validation would be to not validate a change of:

btpAccessCredentialsSecret: <secretName>

Since this is only the actual "location" of the secret.
Instead the more flexible user friendly and easy to use solution not depending on the "reference" but on the actual "credential"

proposed solution
In the Admission Webhook instead of checking if the changed. (this should be ignored completly) Instead retrieve the secret content and hash256 it. If this hash deviates from the hash256 you had previously reject that secret. Since has256 is not revertible this would be secure.

With this simple enhancement of the hook the usability for day to day operations and user happiness would be improved dramatically.

Note: we had a lot of back and forth with secret management in our LOB and patterns convention changes scanner tools etc etc and this was a big pain.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions