You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This behaviour exposes sensitive Postgres credentials in a ConfigMap, normally visible to a normal user. Both local setup and remote Postgres URL are affected.
data:
DATABASE_URL: postgresql://plane:plane@postgres:5432/plane# ^ Visible sensitive information
Possible fix
Move DATABASE_URL to app-secrets secret in charts/plane-ce/templates/config-secrets/app-env.yaml since the secret is used similarly to the ConfigMap counterpart.
System Info
OS: Ubuntu 22.04
Chart Version: plane-ce:1.0.22
The text was updated successfully, but these errors were encountered:
thanks, same for REDIS URL (the password is also exposed), or sentry DSN. Actually there are a few keys that should be moved to secrets out of configmap. It would also be great to be able to pass secrets using existing secrets rather than having to hardcode or pass at runtime.
AMQP_URL in app-env.yaml also contains a secret stored in a ConfigMap despite a secret object existing for RabbitMQ in rabbitmqdb.yaml: .Values.services.rabbitmq.default_password
Description
helm-charts/charts/plane-ce/templates/config-secrets/app-env.yaml
Lines 49 to 55 in 6258277
This behaviour exposes sensitive Postgres credentials in a ConfigMap, normally visible to a normal user. Both local setup and remote Postgres URL are affected.
Steps to reproduce
Install plane with the minimal set values
kubectl get configmap plane-app-app-vars -oyaml
Possible fix
Move
DATABASE_URL
toapp-secrets
secret incharts/plane-ce/templates/config-secrets/app-env.yaml
since the secret is used similarly to the ConfigMap counterpart.System Info
OS: Ubuntu 22.04
Chart Version: plane-ce:1.0.22
The text was updated successfully, but these errors were encountered: