Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

More secure installation by default, with more guidance #820

Open
chulkilee opened this issue Jan 4, 2021 · 2 comments
Open

More secure installation by default, with more guidance #820

chulkilee opened this issue Jan 4, 2021 · 2 comments

Comments

@chulkilee
Copy link
Contributor

First of all, thank you for the helm chart! I'm testing harbor with helm, and it works great!

Having some default credentials in values.yaml may lead to expose harbor unintentionally, even the doc "suggests" to change them... so here are a few suggestions.

Having security section in the README

There are critical credentials, which exposes data - but the doc doesn't clearly say it must be set.

For example:

registry.credentials.password: The password for accessing the registry instance, which is hosted by htpasswd auth mode. More details see official docs. It is suggested you update this value before installation.

I think it should be MUST, mentioned in own section, not buried in the config table.

Generate all secrets if not given

Here are lists of secrets already being generated automatically

  • core.secret
  • core.xsrfKey
  • jobservice.secret
  • registry.secret
  • notary.secretName

And there are WIP

And followings are not in work:

  • registry.credentials.password (and registry.credentials.htpasswd)

Are there any other secrets? Also it would be nice for the chart maintainer if the two PR uses the similar approach.

Do not use default values for secrets

Until all secrets are automatically generated by the chart... it would be better to fail if any secrets are not given.

Accept reference to Secret

It would be nice all secrets can take the reference (probably name and key) to k8s Secret. I know there are some challenges (e.g. what should happen when the referenced Secrets changes outside helm..) - but this chart is already accepting some Secret references (e.g. CA, TLS, ...)

@bbockelm
Copy link

bbockelm commented Jan 9, 2021

I'd like to second the last item! We keep all our configs in git and have a separate system for secret management -- we can't keep secrets in helm charts. The goal is to treat all our ConfigMap objects as if they were leaked publicly.

It's fairly achievable in the end -- here's an example technique to inject a secret into a config file, combining a ConfigMap and Secret with an initContainer:

https://www.magalix.com/blog/the-configuration-template-pattern

@dajudge
Copy link
Contributor

dajudge commented Apr 13, 2021

Is this (at least partially) a duplicate of #189?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants