Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Proposal: secrets web app #20

Open
axel7083 opened this issue May 15, 2023 · 3 comments
Open

Proposal: secrets web app #20

axel7083 opened this issue May 15, 2023 · 3 comments

Comments

@axel7083
Copy link

/kind feature

Description

In the same manner the Volumes web app allow the user to manipulate PVCs in their Kubeflow cluster by providing a user friendly way to handle the lifecycle of PVC objects. A Secret web app could be made to create, manage and use secrets in kubeblow components.

Use case

  • When dealing with private registry, it requires to interact with the cluster resources to add the ImagePullSecrets to the ServiceAccount, this task could be automated with the Secrets Web app.

  • In a Kubeflow Pipeline, we sometime requires to use secrets, for the v2 they have a dedicated package kfp[kubernetes] helping with that, but it would be useful to be able to use secrets as pipeline arguments, selecting from a list.

  • Jupyter Notebook, we could assign secrets to jupyter, so the user would not have to have them hardcoded and copy past in their notebook. The secrets could be mounted as env or volume.

Security concern

To avoid most issues with dealing with secrets, only list, patch, write and delete RBAC verb should be allowed. Retrieving secrets value using the secrets web app should be impossible.

The creation and deletion of secrets in a Profile should be limited to Owners.

@andreyvelich
Copy link
Member

/transfer dashboard

@google-oss-prow google-oss-prow bot transferred this issue from kubeflow/kubeflow Nov 11, 2024
Copy link

@axel7083: The label(s) kind/feature cannot be applied, because the repository doesn't have them.

In response to this:

/kind feature

Description

In the same manner the Volumes web app allow the user to manipulate PVCs in their Kubeflow cluster by providing a user friendly way to handle the lifecycle of PVC objects. A Secret web app could be made to create, manage and use secrets in kubeblow components.

Use case

  • When dealing with private registry, it requires to interact with the cluster resources to add the ImagePullSecrets to the ServiceAccount, this task could be automated with the Secrets Web app.

  • In a Kubeflow Pipeline, we sometime requires to use secrets, for the v2 they have a dedicated package kfp[kubernetes] helping with that, but it would be useful to be able to use secrets as pipeline arguments, selecting from a list.

  • Jupyter Notebook, we could assign secrets to jupyter, so the user would not have to have them hardcoded and copy past in their notebook. The secrets could be mounted as env or volume.

Security concern

To avoid most issues with dealing with secrets, only list, patch, write and delete RBAC verb should be allowed. Retrieving secrets value using the secrets web app should be impossible.

The creation and deletion of secrets in a Profile should be limited to Owners.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

milinddethe15 pushed a commit to milinddethe15/dashboard that referenced this issue Feb 26, 2025
* Add support for setting custom "command" and "args" for Notebook servers (kubeflow#20)

* Support command and args in PodDefault

* Improve logging, refactoring

* Add unit test for setCommandAndArgs, fix broken tests

* Cleanup
Copy link

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants