Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

adminHash does not work as a secret #183

Open
larsenqec opened this issue Nov 19, 2024 · 1 comment
Open

adminHash does not work as a secret #183

larsenqec opened this issue Nov 19, 2024 · 1 comment

Comments

@larsenqec
Copy link

We are experiencing the issue described here running chart version 4.5.6

apache/couchdb#4590

When a pod restarts, the admin password hash is recalculated with a random salt and this seems to affect session cookies
when using the Fauxton UI.

The suggested resolution is to specify adminHash in the values, however according to the comments in values.yaml, this is not considered secure.

We attempted to define adminHash in our preconfigured secret which also contains adminPassword, but it seems that adminHash is not read from the secret. The statefulset.yaml template only reads adminHash from Values.

I am requesting that adminHash as a secret (like adminPassword) be implemented.

@larsenqec
Copy link
Author

Update. I discovered that the statefulset.yaml template does indeed read adminHash from the kubernetes secret, however the values.yaml documentation is simply wrong. If you put ANY value for adminHash in your helm deployment, then it will read the value of adminHash from the secret. So, we have deployed with adminHash = true in Values while the full hash is in our secret.

The comments in values.yaml should be updated.

Suggestion values.yaml should be changed to have "adminHashFromSecret" as a true/false option. That would certainly clarify matters.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant