Skip to content

Commit d2de566

Browse files
authored
Merge branch 'dapr:v1.16' into sb-workflows
2 parents eddbdf5 + 597b519 commit d2de566

File tree

1 file changed

+2
-32
lines changed

1 file changed

+2
-32
lines changed

daprdocs/content/en/operations/configuration/secret-scope.md

Lines changed: 2 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,7 @@ In addition to [scoping which applications can access a given component]({{% ref
1111
For more information about configuring a Configuration resource:
1212
- [Configuration overview]({{% ref configuration-overview.md %}})
1313
- [Configuration schema]({{% ref configuration-schema.md %}})
14-
For more information about configuring a Configuration resource:
15-
- [Configuration overview]({{% ref configuration-overview.md %}})
16-
- [Configuration schema]({{% ref configuration-schema.md %}})
14+
1715

1816
## Configure secrets access
1917

@@ -58,10 +56,8 @@ The `allowedSecrets` and `deniedSecrets` list values take priority over the `def
5856

5957
### Scenario 1: Deny access to all secrets for a secret store
6058

61-
In a Kubernetes cluster, the native Kubernetes secret store is added to your Dapr application by default. In some scenarios, it may be necessary to deny access to Dapr secrets for a given application. To add this configuration:
6259
In a Kubernetes cluster, the native Kubernetes secret store is added to your Dapr application by default. In some scenarios, it may be necessary to deny access to Dapr secrets for a given application. To add this configuration:
6360

64-
1. Define the following `appconfig.yaml`.
6561
1. Define the following `appconfig.yaml`.
6662

6763
```yaml
@@ -75,26 +71,8 @@ In a Kubernetes cluster, the native Kubernetes secret store is added to your Dap
7571
- storeName: kubernetes
7672
defaultAccess: deny
7773
```
78-
```yaml
79-
apiVersion: dapr.io/v1alpha1
80-
kind: Configuration
81-
metadata:
82-
name: appconfig
83-
spec:
84-
secrets:
85-
scopes:
86-
- storeName: kubernetes
87-
defaultAccess: deny
88-
```
89-
90-
1. Apply it to the Kubernetes cluster using the following command:
91-
92-
```bash
93-
kubectl apply -f appconfig.yaml`.
94-
```
9574

96-
For applications that you need to deny access to the Kubernetes secret store, follow [the Kubernetes instructions]({{% ref kubernetes-overview %}}), adding the following annotation to the application pod.
97-
1. Apply it to the Kubernetes cluster using the following command:
75+
2. Apply it to the Kubernetes cluster using the following command:
9876

9977
```bash
10078
kubectl apply -f appconfig.yaml`.
@@ -108,7 +86,6 @@ dapr.io/config: appconfig
10886
10987
With this defined, the application no longer has access to Kubernetes secret store.
11088
111-
### Scenario 2: Allow access to only certain secrets in a secret store
11289
### Scenario 2: Allow access to only certain secrets in a secret store
11390
11491
To allow a Dapr application to have access to only certain secrets, define the following `config.yaml`:
@@ -126,7 +103,6 @@ spec:
126103
allowedSecrets: ["secret1", "secret2"]
127104
```
128105

129-
This example defines configuration for secret store named `vault`. The default access to the secret store is `deny`. Meanwhile, some secrets are accessible by the application based on the `allowedSecrets` list. Follow [the Sidecar configuration instructions]({{% ref "configuration-overview.md#sidecar-configuration" %}}) to apply configuration to the sidecar.
130106
This example defines configuration for secret store named `vault`. The default access to the secret store is `deny`. Meanwhile, some secrets are accessible by the application based on the `allowedSecrets` list. Follow [the Sidecar configuration instructions]({{% ref "configuration-overview.md#sidecar-configuration" %}}) to apply configuration to the sidecar.
131107

132108
### Scenario 3: Deny access to certain sensitive secrets in a secret store
@@ -151,9 +127,3 @@ This configuration explicitly denies access to `secret1` and `secret2` from the
151127
## Next steps
152128

153129
{{< button text="Service invocation access control" page="invoke-allowlist.md" >}}
154-
155-
This configuration explicitly denies access to `secret1` and `secret2` from the secret store named `vault,` while allowing access to all other secrets. Follow [the Sidecar configuration instructions]({{% ref "configuration-overview.md#sidecar-configuration" %}}) to apply configuration to the sidecar.
156-
157-
## Next steps
158-
159-
{{< button text="Service invocation access control" page="invoke-allowlist.md" >}}

0 commit comments

Comments
 (0)