Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

should we use a Secret for the application.properties? #6

Open
jstrachan opened this issue Dec 20, 2016 · 6 comments
Open

should we use a Secret for the application.properties? #6

jstrachan opened this issue Dec 20, 2016 · 6 comments

Comments

@jstrachan
Copy link
Contributor

The connector configuration frequently contains username, passwords, tokens and secrets. e.g. for the twitter component all the component properties should be secret

One day we may want to split the configuration between 2 resources; a ConfigMap and a Secret; with secret stuff only going into the Secret.

However for now - maybe just using a Secret instead of a ConfigMap for the connector configuration is simplest? It then makes sure the configuration is all secret?

@KurtStam
Copy link

KurtStam commented Dec 20, 2016 via email

@iocanel
Copy link
Member

iocanel commented Jan 13, 2017

If we don't have a way to mark which configuration keys are passwords, keys or aneything else that needs to be secret, then using Secrets instead of ConfigMap is oneway right?

I recall that a long time ago, there have been an request raised in Camel, to mask passwords, etc when presenting endpoint urls in logs, jmx etc. I don't know if it was ever implemented, but it might worth checking if it has and if we can extract that info from there.

@jstrachan
Copy link
Contributor Author

I think the next Camel version maintains the metadata of which properties are secret

@jstrachan
Copy link
Contributor Author

@KurtStam there may be properties that the citizen developer may need to populate that are secret (e.g. login / passwords to sales force or something)

@jimmidyson
Copy link

We have an open question whether openshift/kubernetes are secret enough... Do we need encryption at rest, etc.

@markrey
Copy link

markrey commented Feb 24, 2017

I was just browsing through documents and found this.
We have lots of static and dynamic secrets. ( For example, OAuth token which is getting refreshed every few days by other application ).

Example would be,
Funktion Camel flow starts -> acquires and uses token from Vault -> Make API call -> Stop

Is there possiblity to store all secrets in some sort of small HA KV database.
Something like Hashicorp Vault.
https://github.com/hashicorp/vault

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants