Replies: 4 comments 3 replies
-
|
Shouldn’t we also support reading secrets mounted as files? The configuration file would have the location to the file with the secrets, and the file with the secrets would be mounted at runtime. I remember this was also a recommended practice. The configuration will look like this |
Beta Was this translation helpful? Give feedback.
-
|
+1.. As you correctly proposed, we need the environment variable support in immediate terms and vault integration after that.. Also, with [1] (cc: @rajithacharith) we are planning to infer values from the environment variables for some other configs.. We can(/need) to align the work and reuse any resolving logic. Also, if there are default values that needs to be changed every deployment, we need to track those as well.. I'm thinking we need to generate those values dynamically in product startup sequence.. To be clear, i'm not suggesting to generate this in the server startup code.. Rather we have the start.sh script to initialize these when running with a flag like [1] #527 |
Beta Was this translation helpful? Give feedback.
-
|
During offline discussion with @senthalan and @rajithacharith, we decided to supports 3 ways handle secrets depending on the deployment model:
crypto:
key: "file://repository/resources/security/crypto.key"
# or
key: {{ .CRYPTO }}
# or
key: "value"In the build script, we will be adding file object to the pack as default. The final format of the each variable type is yet to be finalised. |
Beta Was this translation helpful? Give feedback.
-
|
Fixed with #937 |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Right now, Thunder deployments include secrets directly in
deployment.yamlfile (for example, encryption secret).This approach works for initial setups but poses clear security and maintainability risks, especially as we expand to different environments and teams.
We should move toward a secure and flexible secret management model, starting with environment variables as a baseline.
Option 1: Environment Variables
Secretobjects and mounting them as environment variables or volumes.pkg/secretsorpkg/env).Option 2: Secret Manager Integration (future extension)
Beta Was this translation helpful? Give feedback.
All reactions