Details
-
Bug
-
Status: Resolved
-
Major
-
Resolution: Fixed
-
None
-
None
Description
The Kubernetes deployment contributed in FINERACT-783 by creates a Kubernetes Deployment using 2 passwords hard-coded in YAML, for the tenants and demo DB (based on Fineract's Docker Compose set-up).
One of the passwords is in a Kubernetes Secret, so it shouldn't be able to see it at runtime, but that is kind of pointless because unless someone changes the default, its default can be seen in source.
The other password is in a -D Java property in the YAML, and not even in a secret.
The goal of this issue is to:
(a) replace the password in the -D Java property by a Kubernetes secret... This may require some Java code changes to be able to pass it as an Environment Variable instead of a Java System Property; I think since we've doneĀ FINERACT-796, this should be relatively easy, now that we don't use Tomcat XML for a JNDI DS anymore.
(b) remove the hard-coded default value from the Secret YAML, and instead during installation create the database passwords as secrets randomly. Research on the web re. best practices how to do this (reach out to see if Fineract CN may have already solve this?). At the simplest, you could imagine just doing something like https://stackoverflow.com/a/59678911/421602 in our kubernetes/kubectl-startup.sh.
Attachments
Issue Links
- is blocked by
-
FINERACT-783 Fineract on Kubernetes
- Resolved
- links to