Skip to content

Commit 3194c08

Browse files
committed
Update bug bounty process
1 parent 22261f2 commit 3194c08

File tree

1 file changed

+30
-33
lines changed

1 file changed

+30
-33
lines changed

README.md

Lines changed: 30 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -42,17 +42,17 @@ spec:
4242
args: ["start"]
4343
# A 1Password Connect server will inject secrets into this application.
4444
env:
45-
- name: OP_CONNECT_HOST
46-
value: http://onepassword-connect:8080
47-
- name: OP_CONNECT_TOKEN
48-
valueFrom:
49-
secretKeyRef:
50-
name: connect-token
51-
key: token
52-
- name: DB_USERNAME
53-
value: op://my-vault/my-item/sql/username
54-
- name: DB_PASSWORD
55-
value: op://my-vault/my-item/sql/password
45+
- name: OP_CONNECT_HOST
46+
value: http://onepassword-connect:8080
47+
- name: OP_CONNECT_TOKEN
48+
valueFrom:
49+
secretKeyRef:
50+
name: connect-token
51+
key: token
52+
- name: DB_USERNAME
53+
value: op://my-vault/my-item/sql/username
54+
- name: DB_PASSWORD
55+
value: op://my-vault/my-item/sql/password
5656

5757
- name: my-app # my-app isn't listed in the inject annotation above, so secrets won't be injected into this container.
5858
image: my-image
@@ -61,10 +61,10 @@ spec:
6161
command: ["npm"]
6262
args: ["start"]
6363
env:
64-
- name: DB_USERNAME
65-
value: op://my-vault/my-item/sql/username
66-
- name: DB_PASSWORD
67-
value: op://my-vault/my-item/sql/password
64+
- name: DB_USERNAME
65+
value: op://my-vault/my-item/sql/username
66+
- name: DB_PASSWORD
67+
value: op://my-vault/my-item/sql/password
6868
```
6969
7070
<details>
@@ -98,15 +98,15 @@ spec:
9898
args: ["start"]
9999
# A 1Password Service Account will inject secrets into this application.
100100
env:
101-
- name: OP_SERVICE_ACCOUNT_TOKEN
102-
valueFrom:
103-
secretKeyRef:
104-
name: op-service-account
105-
key: token
106-
- name: DB_USERNAME
107-
value: op://my-vault/my-item/sql/username
108-
- name: DB_PASSWORD
109-
value: op://my-vault/my-item/sql/password
101+
- name: OP_SERVICE_ACCOUNT_TOKEN
102+
valueFrom:
103+
secretKeyRef:
104+
name: op-service-account
105+
key: token
106+
- name: DB_USERNAME
107+
value: op://my-vault/my-item/sql/username
108+
- name: DB_PASSWORD
109+
value: op://my-vault/my-item/sql/password
110110

111111
- name: my-app # my-app isn't listed in the inject annotation above, so secrets won't be injected into this container.
112112
image: my-image
@@ -115,18 +115,17 @@ spec:
115115
command: ["npm"]
116116
args: ["start"]
117117
env:
118-
- name: DB_USERNAME
119-
value: op://my-vault/my-item/sql/username
120-
- name: DB_PASSWORD
121-
value: op://my-vault/my-item/sql/password
118+
- name: DB_USERNAME
119+
value: op://my-vault/my-item/sql/username
120+
- name: DB_PASSWORD
121+
value: op://my-vault/my-item/sql/password
122122
```
123123
124124
</details>
125125
126126
To inject secrets, the Pod you're looking to inject into must have a `command` value defined in its [Deployment or Pod spec](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.26/#container-v1-core). The 1Password Secrets Injector works by mutating the this value on initilization, and as such a command is needed to be mutated. If the deployments you're using aren't designed to have `command` specified in the deployment, then the 1Password Kubernetes Operator may be a better fit for your use case.
127127

128-
**Note:** Injected secrets are available *only* in the current pod's session. In other words, the secrets will only be accessible for the command listed in the container specification. To access it in any other session, for example using `kubectl exec`, it's necessary to prepend `op run --` to the command.
129-
128+
**Note:** Injected secrets are available _only_ in the current pod's session. In other words, the secrets will only be accessible for the command listed in the container specification. To access it in any other session, for example using `kubectl exec`, it's necessary to prepend `op run --` to the command.
130129

131130
In the example above the `app-example1` container will have injected the `DB_USERNAME` and `DB_PASSWORD` values in the session executed by the command `npm start`.
132131

@@ -293,6 +292,4 @@ If you can't inject secrets in your pod, make sure:
293292

294293
1Password requests you practice responsible disclosure if you discover a vulnerability.
295294

296-
Please file requests through [**BugCrowd**](https://bugcrowd.com/agilebits)
297-
298-
For information about our security practices, please visit the [1Password Security homepage](https://1password.com/security/).
295+
Please file requests by sending an email to [email protected].

0 commit comments

Comments
 (0)