You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In kubernetes, these two config items should be configured as secrets so as to (somewhat) protect them. This means that they cannot go in /config because one is not allowed to mount secrets and config maps to the same location (or a subdir).
The text was updated successfully, but these errors were encountered:
For cacerts, this is configuration of the system if you follow normal unix model: they ultimately go into /etc and are read and used by various system software. They are not credentials and they are not "secret" in any way: CA certs have to be publicly available to be useful.
For cadcproxy.pem : yes, this is a credential and noted "probably wrong" thing to do in the READMEs.
We have to design containers for how kubernetes works? I'm not saying it's bad to separate credentials from config, but it's always bad to make choices based on one deployment technology.
The complication is in how to pass the certificate to the application... currently we use the normal OpenCADC "well known location" of $HOME/.ssl/cadcproxy.pem but cadc-java and cadc-tomcat images don't advertise or guarantee a specific value of $HOME and there are good reasons to try to keep it like that.
Options, in no specific order:
deployer puts a cert file however/wherever they want and applications have to be configured with the path to the file; change all application config parsing
specify a known value for $HOME so deployer can put application config and credentials into $HOME however they like and keep /config for "system" config
specify exactly 2 separate mount points - config and credentials - so k8s can be made to work and everyone else has more complexity
There are other use cases (besides k8s) that would be best satisfied by 1 or 2 (current won't work, 3 won't be any better)
A base container like this is an API and it's hard to keep it from being very brittle. Option 2 could be very brittle.
In kubernetes, these two config items should be configured as secrets so as to (somewhat) protect them. This means that they cannot go in /config because one is not allowed to mount secrets and config maps to the same location (or a subdir).
The text was updated successfully, but these errors were encountered: