The documentation you are viewing is for Dapr v1.11 which is an older version of Dapr. For up-to-date documentation, see the latest version.
How-To: Limit the secrets that can be read from secret stores
In addition to scoping which applications can access a given component, for example a secret store component (see Scoping components), a named secret store component itself can be scoped to one or more secrets for an application. By defining allowedSecrets
and/or deniedSecrets
list, applications can be restricted to access only specific secrets.
Follow these instructions to define a configuration CRD.
Configure secrets access
The secrets
section under the Configuration
spec contains the following properties:
secrets:
scopes:
- storeName: kubernetes
defaultAccess: allow
allowedSecrets: ["redis-password"]
- storeName: localstore
defaultAccess: allow
deniedSecrets: ["redis-password"]
The following table lists the properties for secret scopes:
属性 | 数据类型 | 说明 |
---|---|---|
storeName | string | Name of the secret store component. Name of the secret store component. storeName must be unique within the list |
默认权限 | string | Access modifier. Accepted values “allow” (default) or “deny” |
允许的密钥 | list | List of secret keys that can be accessed |
被拒绝的密钥 | list | List of secret keys that cannot be accessed |
When an allowedSecrets
list is present with at least one element, only those secrets defined in the list can be accessed by the application.
权限优先级
The allowedSecrets
and deniedSecrets
list values take priorty over the defaultAccess
.
场景 | 默认权限 | 允许的密钥 | 被拒绝的密钥 | 权限 |
---|---|---|---|---|
1 - 仅默认访问 | 拒绝/允许 | 为空 | 为空 | 拒绝/允许 |
2 - 默认拒绝允许列表 | 拒绝 | [“s1”] | 为空 | 只能访问"s1" |
3 - 默认允许拒绝列表 | 允许 | 为空 | [“s1”] | 仅限"s1"无法访问 |
4 - 默认允许允许列表 | 允许 | [“s1”] | 为空 | 只能访问"s1" |
5 - 默认拒绝拒绝列表 | 拒绝 | 为空 | [“s1”] | 拒绝 |
6 - 两个列表的默认拒绝/允许 | 拒绝/允许 | [“s1”] | [“s2”] | 只能访问"s1" |
示例
场景1:拒绝访问所有密钥仓库
In Kubernetes cluster, the native Kubernetes secret store is added to Dapr application by default. 在某些情况下,可能有必要拒绝某个应用程序访问 Dapr 密钥。 要添加此配置,请按照下面的步骤:
Define the following appconfig.yaml
and apply it to the Kubernetes cluster using the command kubectl apply -f appconfig.yaml
.
apiVersion: dapr.io/v1alpha1
kind: Configuration
metadata:
name: appconfig
spec:
secrets:
scopes:
- storeName: kubernetes
defaultAccess: deny
For applications that need to be deined access to the Kubernetes secret store, follow these instructions, and add the following annotation to the application pod.
dapr.io/config: appconfig
With this defined, the application no longer has access to Kubernetes secret store.
场景2:只允许访问密钥仓库中的某些密钥
To allow a Dapr application to have access to only certain secrets, define the following config.yaml
:
apiVersion: dapr.io/v1alpha1
kind: Configuration
metadata:
name: appconfig
spec:
secrets:
scopes:
- storeName: vault
defaultAccess: deny
allowedSecrets: ["secret1", "secret2"]
This example defines configuration for secret store named vault. 密钥仓库的默认访问权限是deny
,而有些密钥可以通过应用程序基于allowedSecrets
列表访问。 Follow these instructions to apply configuration to the sidecar.
Scenario 3: Deny access to certain senstive secrets in a secret store
定义以下 config.yaml
:
apiVersion: dapr.io/v1alpha1
kind: Configuration
metadata:
name: appconfig
spec:
secrets:
scopes:
- storeName: vault
defaultAccess: allow # this is the default value, line can be omitted
deniedSecrets: ["secret1", "secret2"]
上面的配置明确禁止从名为 vault 的密钥仓库访问 secret1
和 secret2
,但允许访问所有其他密钥。 Follow these instructions to apply configuration to the sidecar.
Feedback
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.