-
Notifications
You must be signed in to change notification settings - Fork 4.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Option to Disable Secret Values in Kubernees Dashboard UI #9340
Comments
Force hiding secret values only on the UI side wouldn't increase security since it would be just a workaround. API would still send full response and it would be as easy as checking the networking tab to see it. The only proper way of managing that is through Kubernetes native features such as RBACs. Dashboard is basically just a proxy to the K8S API server. |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close not-planned |
@k8s-triage-robot: Closing this issue, marking it as "Not Planned". In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
What would you like to be added?
I would love the ability to leave out the value of secrets or asterisk them out when viewing secrets in the kubernetes dashboard ui. Seems like it could be a relatively easy addition just not feeding the values to the UI.
Why is this needed?
It allows for increased security in clusters and peace of mind that ever changing resource additions/subtractions/types don't need to always need to be managed/accounted for with ultra specific RBAC.
The text was updated successfully, but these errors were encountered: