Uploaded image for project: 'Red Hat build of Keycloak'
  1. Red Hat build of Keycloak
  2. RHBK-3477

KeycloakRealmImport placeholder replacement provides access to sensitive environment variables. [GHI#42046]

XMLWordPrintable

    • False
    • Hide

      None

      Show
      None
    • False

      Before reporting an issue

      [x] I have read and understood the above terms for submitting issues, and I understand that my issue may be closed without action if I do not follow them.

      Area

      operator

      Describe the bug

      With the Keycloak CR, we warn of possible malicious use - https://github.com/keycloak/keycloak/issues/40188

      However a related situation exists with KeycloakRealmImport in that placeholder replacement provides access to all environment variables, but there is no warning.

      The ability to do this was added with https://github.com/keycloak/keycloak/issues/31625 in KC 26.0

      Version

      All of KC 26

      Regression

      [ ] The issue is a regression

      Expected behavior

      A documented warning or behavior that is secure by default.

      Actual behavior

      There's no warning.

      How to Reproduce?

      Create a KeycloakRealmImport CR with placeholders.

      Anything else?

      No response

              Unassigned Unassigned
              pvlha Pavel Vlha
              Keycloak Cloud Native
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated:
                Resolved: