Bug 2014557 - RFE Copy secret with specific secret namespace, name for source and name, namespace and cluster label for target
Summary: RFE Copy secret with specific secret namespace, name for source and name, nam...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Advanced Cluster Management for Kubernetes
Classification: Red Hat
Component: GRC & Policy
Version: rhacm-2.3
Hardware: All
OS: All
unspecified
high
Target Milestone: ---
: rhacm-2.5
Assignee: Gus Parvin
QA Contact: Derek Ho
Mikela Dockery
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2021-10-15 14:35 UTC by Daniel Schimpfoessl
Modified: 2025-01-27 12:44 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-06-09 02:07:01 UTC
Target Upstream Version:
Embargoed:
ming: rhacm-2.5+


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github open-cluster-management backlog issues 17283 0 None None None 2021-10-15 15:14:36 UTC
Red Hat Product Errata RHSA-2022:4956 0 None None None 2022-06-09 02:07:34 UTC

Description Daniel Schimpfoessl 2021-10-15 14:35:12 UTC
Description of the problem:
When there is a unique secret for each managed cluster on the hub, how do you copy each secret from the hub in a source namespace with a specific name to a selected managed cluster in a different namespace with a different name.

Release version:
2.3

Operator snapshot version:

OCP version:
4.8.13

Browser Info:
N/A

Steps to reproduce:
1. Create 20 managed clusters named user01-user20
2. Create a unique secret on the hub for each cluster
3. Copy each secret from the hub to the managed cluster in the proper namespace with the right name

Actual results:
No option

Expected results:
Each cluster specific secret should be on the managed cluster in the right namespace with the desired name. 
If I have one namespace on the hub "workshop-secrets" with secrets for each managed cluster "dashboard-env-user01"-"dashboard-env-user20", copy each secret to the managed cluster into namespace "lab-ocp-cns" with the name "dashboard-env". Alternatively, and maybe more applicable for users, we could have the secrets in the cluster namespace on the hub to control access by cluster vs by project. Such as the hub would have a secret named "dashboard-evn" in the "user01"-"user20" namespaces. So any variation of namespaceA.nameB for the secret on the hub will result in a namespaceC.nameD on the cluster. Where there needs to be a way to select what source maps to what cluster. Maybe have the secret have a specific label or annotation to key off like subscriptions use for filtering.

Additional info:

Comment 1 Roke Jung 2021-10-15 15:32:48 UTC
The namespace subscription for copying secrets from hub to managed clusters are being deprecated. However, this could be a good user input to enhance policy to enhance its secret management capabilities in the future.

Daniel is currently working around the problem with the namespace secret subscription by creating a unique channel/subscription/placementrule for each managed cluster to copy the cluster specific password.

Comment 2 juhsu 2021-11-11 20:45:59 UTC
Reassigning to product mgmt to prioritize as part of the GRC & policy roadmap.

Comment 3 juhsu 2021-12-13 22:44:48 UTC
Comment from Yu Cao:  This issue will be addressed in 2.5 by https://issues.redhat.com/browse/ACM-1043

Comment 4 yahliu 2022-05-12 04:08:57 UTC
Already verified the feature https://issues.redhat.com/browse/ACM-1043 in 2.5.

Comment 7 errata-xmlrpc 2022-06-09 02:07:01 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Important: Red Hat Advanced Cluster Management 2.5 security updates, images, and bug fixes), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:4956

Comment 9 jenny 2023-01-04 05:26:50 UTC Comment hidden (spam)
Comment 10 Rosestelzer 2023-01-05 06:37:43 UTC Comment hidden (spam)
Comment 12 Katherine561 2024-02-14 08:19:06 UTC Comment hidden (spam)
Comment 13 Ted 2024-03-11 06:58:04 UTC Comment hidden (spam)

Note You need to log in before you can comment on or make changes to this bug.