Skip to content
This repository has been archived by the owner on Jul 12, 2019. It is now read-only.

Store sensitive environment variables in a secret. #6

Open
wants to merge 3 commits into
base: master
Choose a base branch
from

Conversation

qgroulard
Copy link
Contributor

OBK_SECRET_ variables were previously dealt with as regular OBK_ variables, thus they ended up in cleartext in the yaml files.
They are now stored in a secret.
Notice that Tiller admin can still see them since they are passed as values.

OBK_SECRET_ variables were previously dealt with as regular OBK_ variables, thus they ended up in cleartext in the yaml files.
They are now stored in a secret.
Notice that Tiller admin can still see them since they are passed as values.
chart/templates/secrets.yaml Outdated Show resolved Hide resolved
obk_deploy Outdated Show resolved Hide resolved
- name: PGPASSWORD
value: {{ .Values.application.database_password }}
value: {{ .Values.application.database_password | b64dec }}
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Does this job have access to the secrets?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No, the job is called after the release has been deleted and the secret is part of the release. So indeed, for the few seconds the job is running the password appears in cleartext in its yaml file.

So that values are flatter and at the same level that .Values.env
So that users don't need to pass already encoded variables.
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants