-
-
Notifications
You must be signed in to change notification settings - Fork 166
Remove support for setting content of gitlab-secrets.json
#213
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
We could add support for mounting/managing the |
Just to know, I'm using this feature right now. For security reasons like ansible-vault puppet eyaml is good enough. Anyway moving this feature to a own profile covers my case. Thanks for the information. |
The more I've run into this, the more I realize it's a critical decision point in the GitLab HA configuration process. Ensuring your There's no real way to NFS mount these, since you'd have to mount The other option presents difficulty as well, since the puppet agent isn't guaranteed to propagate changes to your secrets to all application nodes at once. This may actually be best suited via a bolt task. I've also found you have to run a reconfigure after applying any change to secrets, and this could get complicated in an HA environment where there may be upgrade jobs going on in the background to accommodate zero-downtime upgrades. (In fact at the moment, it appears that all the documentation for updates in HA only mention zero-downtime upgrade processes and no other alternatives.) |
I finally came to a decision on this one, mostly due to some updates I worked out to the documentation of Gitlab HA. So, some secrets are 'shared secrets', and others aren't meant to managed across nodes. The shared secrets can and should be set in Managing the content in the So the end decision is: remove support for setting |
One other thing i found is that there are issues with setting the non-shared secrets in this manner, since it winds up double-escaping the line breaks in the certificate values in the json strings, causing failure of the puppet parser when you try to set secrets that aren't meant to be managed anyways. |
There are many reasons that I believe we should remove support for this feature. They are:
500
errorsImplementing this change would be a backwards incompatible change, requiring a major version increment.
However, I feel that it is everyone's best interest to remove this feature. I don't want anyone to use it as it currently stands without being fully aware of the security risks that come along with using it.
The text was updated successfully, but these errors were encountered: