Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enable support for docker secrets #21

Open
tombisho opened this issue Aug 2, 2022 · 0 comments
Open

Enable support for docker secrets #21

tombisho opened this issue Aug 2, 2022 · 0 comments
Assignees

Comments

@tombisho
Copy link

tombisho commented Aug 2, 2022

At the moment the Opal administrator password is passed as an environment variable to the container to set when the container is started for the first time. The most secure option is to store that password in an .env file and set the permission to 400, so that only root has access. This is OK, but some may object to having the password in plain text at all, for example in case someone forgets to set the permissions to 400 or the .env file is accidentally checked into Github.

Docker secrets can be used in swarm mode. However, some additional coding is required to get the secret into an environment variable to be consumed by the container. This requires some extra code in the container start up (see here). It is this extra code that could be added to the Opal image. This means that the passwords are not stored in plain text anywhere and are unlikely to be accidentally included in a check in.

The disadvantage of this method is that running in swarm mode might offer more complexity in terms of debugging etc. It does seem possible to add new Rock containers, but I have not tested extensively adding, removing and scaling them. It is more complex for the user to set up.

@ymarcon ymarcon self-assigned this Aug 12, 2022
@ymarcon ymarcon transferred this issue from obiba/opal Sep 7, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants