-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Software/infrastructure requirements should go into more detail about passing secrets to containers #109
Comments
@mmisworking Do you already have certain ideas on this? Certain best-practices already in use at KNAW HuC perhaps? |
I think this is the last remaining issue that is still open for the software/infrastructure requirements. I don't really have too much experience on best practices regarding this so I'm hoping to get some input from others who have worked with this and can help amend the document. I do think we should discourage using environment variables for secrets (interesting article: https://diogomonica.com/2017/03/27/why-you-shouldnt-use-env-variables-for-secret-data/) |
I've been reading and thinking a bit more on this and how what this implies for developers preparing containers. If I understand things correctly, a secret engine (like https://github.com/hashicorp/vault-k8s which @mmisworking suggested) makes secrets available via mounts (usually tmpfs, so in-memory) and ensures that these are kept properly encrypted until read. For the underlying software, this probably means that instead of passing an environment variable like @mmisworking @ddeboer does this seem correct to you guys? |
@jblom said:
@4tikhonov added:
#102
The text was updated successfully, but these errors were encountered: