-
Notifications
You must be signed in to change notification settings - Fork 23
Open
Description
The Perses CRD currently requires OAuth/OIDC secrets to be stored in plain text, creating a security risk. Additionally, the current secret implementation appears to be broken, causing literal placeholder text to be used instead of actual secret values.
Current Behavior
OAuth/OIDC client secrets must be hardcoded in clear text directly in the Perses CRD configuration.
The CRD does not support secretRef fields to reference Kubernetes Secrets (which would enable integration with External Secrets Operator or similar tools)
Additionally: when configuring secrets, the Azure sign-in URL incorrectly contains client_id= as a literal string instead of injecting the actual secret value
Expected Behavior
- The CRD should support referencing Kubernetes Secrets via secretRef fields for sensitive OAuth/OIDC configuration
- Secret values should be properly injected and resolved when constructing OAuth URLs
- Support for External Secrets Operator patterns through standard Kubernetes Secret references
Steps to Reproduce (for the bug)
- Configure OAuth/OIDC authentication with Azure in Perses CRD
- Set up the client secret according to current documentation
- Attempt to sign in via Azure
- Observe that the redirect URL contains
client_id=<secret>instead of the actual client ID value
Metadata
Metadata
Assignees
Labels
No labels