Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Secrets handling in Helm charts not safe #1814

Closed
themightylaz opened this issue Aug 19, 2020 · 7 comments
Closed

Secrets handling in Helm charts not safe #1814

themightylaz opened this issue Aug 19, 2020 · 7 comments
Labels
feature-request Request for a new feature to be added

Comments

@themightylaz
Copy link
Contributor

Hi,

Secrets handling in Helm charts are not encrypted.
Would it be possible to remove the process that creates secrets from the Helm charts.
In this case we could create sealed secrets manually as a separate process beforehand and Helm chart would be just responsible for deploying the application.

Best regards
//Lars

@themightylaz themightylaz added the feature-request Request for a new feature to be added label Aug 19, 2020
@mars-lan
Copy link
Contributor

Could you review and see if this is covered by #1782 already?

@themightylaz
Copy link
Contributor Author

Hi @mars-lan, my impression is that it fixes the issue with passwords verbatim in configmap and moves them to secret instead. We use sealed secrets (https://github.com/bitnami-labs/sealed-secrets) for our secrets, and I do not fully understand if the changes is allowing us to use that. When will #1782 get merged to master branch?

BR
//Lars

@shakti-garg-saxo
Copy link
Contributor

HI @themightylaz,
There is only one secret, "GMS_SECRET" which we will be creating after #1782. The secret-template file for the same is under helm-chart, "datahub-gms".
we are currently auto-generating secret using "{{ randAlphaNum 10 | b64enc | quote }}". Is it possible to do the same in sealed-secrets or do we need to rely on Kubeseal to generate secret?

Thanks.

@mars-lan
Copy link
Contributor

@themightylaz FYI #1782 has been merged now.

@fabiofilz
Copy link
Contributor

Hi @shakti-garg-saxo,

As it is an auto-generating password that it will be used only in datahub and we won't need to store this password outside of the cluster so I think it is OK to keep in this way.

Thank you,
Fabio

@mars-lan
Copy link
Contributor

What do you think, @themightylaz? Can we close this issue now?

@themightylaz
Copy link
Contributor Author

Hi @mars-lan, initial checking looks good so closing issue, thanks for your help!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature-request Request for a new feature to be added
Projects
None yet
Development

No branches or pull requests

4 participants