Closed d2lam closed 6 years ago
If you terminate SSL at the Pod level, you should take advantage of K8s Secrets API. You get to volume mount those files to where you will need them. It will be a whole lot better instead of feeding in a very "return line" (aka \n) sensitive string via environment vars.
Closing in favor of using SSL terminated ingress like NGinx.
SUMMARY
What we tried
First attempt
nginx.conf
to include:Second attempt
ssl_certificate os.getenv("UICERT");
(UICERT is reading from a secret)os.getenv
doesn't work.What worked - sorta
Third attempt
v1.0.90
https://127.0.0.1:4443
--> works!TODO
Resources: http://nginx.org/en/docs/http/configuring_https_servers.html
Where we are (12/5/16)
We tried to make nginx.conf read from environment variables:
docker build --build-arg=MYENV=somevalue .
(Similar to https://github.com/screwdriver-cd/screwdriver/blob/master/hooks/build)testenv
is there. So that means it worked./hooks/build
, and then put the secrets in thescrewdriver.yaml
. This seems a bit weird, but that's what we got so far.