Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Allow loading secrets from mounted files rather than ENV vars #488

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
bdunne wants to merge 1 commit into sclorg:master
base: master
Choose a base branch
Loading
from bdunne:secret_files

Conversation

@bdunne
Copy link

@bdunne bdunne commented Jan 26, 2023
edited by github-actions bot
Loading

This allows keys from kubernetes secrets to be mounted as files to avoid exposing them in the ENV.

This allows keys from kubernetes secrets to be mounted as files to avoid
exposing them in the ENV.
Copy link
Member

hhorak commented Feb 17, 2023

Thanks for contribution, supporting secrets generally looks like a good idea to me and the code is pretty effective. What might not be perfect is to have all secrets available as ENV for the main container process. So, these are my thoughts:

We should likely allow-list variables handled like this. There might be other secrets (private/public keys, certificate) that must be handled differently than putting to the variable and also all the real secretes (passwords, private keys) should not be set for the postmaster process (should be explicitly unset), because the databases itself is so complex, that getting it from the process might be possible by unauthorized users and thus would create a security issue.

Copy link
Member

hhorak commented Feb 17, 2023

Plus we should have a test for this, and include it in the README.md.

Copy link
Member

hhorak commented Feb 17, 2023

I cannot find any guidance what path is recommended for the secrets like this, /run/secrets/postgresql/ does not look wrong, just would like to use something as close as possible to some usual usage (if there is something like this).

Copy link
Member

hhorak commented Feb 17, 2023

@pkubatrh I wonder whether this might be a good learning task for Ondra or Adam (includes some small piece of research).

Copy link
Member

fila43 commented Mar 28, 2023

[test]

1 similar comment
Copy link
Member

fila43 commented Feb 28, 2024

[test]

Copy link

github-actions bot commented Nov 7, 2024
edited
Loading

Pull Request validation

Failed

🔴 Review - Missing review from a member (1 required)

Success

🟢 CI - All checks have passed

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Reviewers

No reviews

Assignees

No one assigned

Projects

None yet

Milestone

No milestone

Development

Successfully merging this pull request may close these issues.

AltStyle によって変換されたページ (->オリジナル) /