-
Notifications
You must be signed in to change notification settings - Fork 366
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature Request] Use a Kubernetes secret to protect the OIDC client secret #236
Comments
I think this would be good to have as I've been trying to set up SSO for a fresh temporal installation using the chart. IMO the easiest would be for the client_secret to be an env var that could be injected from a secret. That'd require changes in the web codebase though. |
After some digging I found out that the |
Thanks for that information @Davidonium . Will try that approach will waiting for this issue to get attention. |
@debugger24 I tried this but it's not working and found out that it's not released yet. Is it possible to release it? It improves security a lot. Thank you |
This was implemented in #603 which has since been released. |
Ideally, when we configure authentication to Temporal Web, we shouldn't pass the plaintext client secret as a Helm value but instead pass the name of the Kubernetes Secret which contains the client secret.
Right now, all of
.Values.web.config
is simply just dumped into a ConfigMap [1] then mounted to the Deployment [2]. Temporal Web reads from this configuration file [3].Some initial ideas:
[1] https://github.com/temporalio/helm-charts/blob/master/templates/web-configmap.yaml
[2] https://github.com/temporalio/helm-charts/blob/master/templates/web-deployment.yaml
[3] https://github.com/temporalio/web/blob/master/server/auth/index.js
The text was updated successfully, but these errors were encountered: