Bug 2184987
| Summary: | To be able to read the VAULT_TOKEN from a file | ||
|---|---|---|---|
| Product: | [Red Hat Storage] Red Hat OpenShift Data Foundation | Reporter: | Amrita Mahapatra <ammahapa> |
| Component: | rook | Assignee: | Santosh Pillai <sapillai> |
| Status: | CLOSED WONTFIX | QA Contact: | Neha Berry <nberry> |
| Severity: | medium | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 4.12 | CC: | odf-bz-bot, tnielsen |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2023-08-15 15:30:28 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Amrita Mahapatra
2023-04-06 12:05:59 UTC
Based on the discussion here: https://bugzilla.redhat.com/show_bug.cgi?id=2144067#c19 The purpose of this BZ would be to investigate if there are any KMS-related sensitive keys that we are loading as environment variables, which should instead be loaded from a file in the pod. Reading a file from inside the pod will be better from a security view because environment variables are sometimes logged unintentionally. If the secret were mounted as a file inside the pod, rook would need to read it from a file instead of with the environment variable. The change could be similar in nature as PR https://github.com/rook/rook/pull/11434 where some mon secrets were changed from an env var to be read from a file. @Santosh, please investigate if it is feasible to change this implementation, but for 4.14 should be sufficient. Or if it is too big of a change we should consider closing this since the security risk is only theoretical. |