Skip to content
This repository was archived by the owner on May 7, 2025. It is now read-only.

An example using Cloud SQL that shows how the root password can be securely generated and used. #102

@sf-vorlov

Description

@sf-vorlov

Is your feature request related to a problem? Please describe.
Hi Mathieu. I am trying to expand your examples to provision (and to use) a Cloud SQL instance. I am struggling to understand how and where can I create a root password - in secure manner.
As I'd be creating an SQL Instance as a part of the tenant project repo-sync I'd need to provide a password either explicitly (bad idea) or as a reference to a secret (better idea). If it is a secret, then it need to exist in the config controller cluster. However then I'd need to pass the password to the tenant GCP cluster, so that it can be consumed by the application.

So I'm thinking deploy the secret through the helm, using the randAlphaNum template function. Use that to provision the database instance and write it to a secret manager to the tenant project with the SecretManagerSecretVersion.
Then in the tenant GKE cluster I can read it back one way or another (i.e. with the external secrets controller)

Describe the solution you'd like
A Cloud SQL is provisioned. A root password is not committed to any of the Git repos. The password is used by a sample application.

Describe alternatives you've considered

Additional context

Metadata

Metadata

Assignees

No one assigned

    Labels

    questionFurther information is requested

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions