Allow loading secrets from mounted files rather than ENV vars#488
Allow loading secrets from mounted files rather than ENV vars#488bdunne wants to merge 1 commit intosclorg:masterfrom
Conversation
This allows keys from kubernetes secrets to be mounted as files to avoid exposing them in the ENV.
|
Thanks for contribution, supporting secrets generally looks like a good idea to me and the code is pretty effective. What might not be perfect is to have all secrets available as ENV for the main container process. So, these are my thoughts: We should likely allow-list variables handled like this. There might be other secrets (private/public keys, certificate) that must be handled differently than putting to the variable and also all the real secretes (passwords, private keys) should not be set for the postmaster process (should be explicitly unset), because the databases itself is so complex, that getting it from the process might be possible by unauthorized users and thus would create a security issue. |
|
Plus we should have a test for this, and include it in the README.md. |
|
I cannot find any guidance what path is recommended for the secrets like this, |
|
@pkubatrh I wonder whether this might be a good learning task for Ondra or Adam (includes some small piece of research). |
|
[test] |
1 similar comment
|
[test] |
Pull Request validationFailed🔴 Review - Missing review from a member (1 required) Success🟢 CI - All checks have passed |
This allows keys from kubernetes secrets to be mounted as files to avoid exposing them in the ENV.