-
Notifications
You must be signed in to change notification settings - Fork 25
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
should we use a Secret for the application.properties? #6
Comments
I would argue that the citizen developer would need access to the config,
but may not need/have access to secret stuff, so it may make sense to split
this up now rather then later. So my vote would be to make the split
between Secret and ConfigMap now.
my 2 cents
…--K
On Tue, Dec 20, 2016 at 5:37 AM, James Strachan ***@***.***> wrote:
The connector configuration frequently contains username, passwords,
tokens and secrets. e.g. for the twitter component all the component
properties should be secret
One day we may want to split the configuration between 2 resources; a
ConfigMap and a Secret; with secret stuff only going into the Secret.
However for now - maybe just using a Secret instead of a ConfigMap for
the connector configuration is simplest? It then makes sure the
configuration is all secret?
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#6>, or mute the
thread
<https://github.com/notifications/unsubscribe-auth/AACK-En3hCRLrcDaBPgcT5JHBJSfVZJgks5rJ6_4gaJpZM4LRsRS>
.
--
Kurt T. Stam
twitter: @KurtStam
google+: [email protected]
|
If we don't have a way to I recall that a long time ago, there have been an request raised in Camel, to mask passwords, etc when presenting endpoint urls in logs, jmx etc. I don't know if it was ever implemented, but it might worth checking if it has and if we can extract that info from there. |
I think the next Camel version maintains the metadata of which properties are secret |
@KurtStam there may be properties that the citizen developer may need to populate that are secret (e.g. login / passwords to sales force or something) |
We have an open question whether openshift/kubernetes are secret enough... Do we need encryption at rest, etc. |
I was just browsing through documents and found this. Example would be, Is there possiblity to store all secrets in some sort of small HA KV database. |
The connector configuration frequently contains username, passwords, tokens and secrets. e.g. for the twitter component all the component properties should be secret
One day we may want to split the configuration between 2 resources; a
ConfigMap
and a Secret; with secret stuff only going into theSecret
.However for now - maybe just using a
Secret
instead of aConfigMap
for the connector configuration is simplest? It then makes sure the configuration is all secret?The text was updated successfully, but these errors were encountered: