Optimize Helm Chart for JWT Secret setting #1062
-
Dear AKHQ-Maintainers, first of all, thanks for this awesome project and keep up the great work! We are running AKHQ on Kubernetes using the projects Helm-Chart. In the default configuration, the application uses the default JWT secret to sign tokens. This flaw is also written to the application start-up log. Changing the JWT secret is described in the AKHQ docs: https://akhq.io/docs/configuration/authentifications/jwt.html However, the Helm Chart currently doesn't offer great support for this settings as it stores the whole application config under the following object in the If a user doesn't want to store sensitive information in the It would be great to have an alternative way for storing the JWT secret like a Kubernetes Secret or environment variable. Regarding my last note: does AKHQ support reading the JWT secret from another source than the default Hoping to get some input and ideas around this topic. I can think of many solutions to work around this and would like to hear the maintainers thoughts on this. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 2 replies
-
In fact, all the configuration values that you put on I think it will resolved all your issues ? |
Beta Was this translation helpful? Give feedback.
In fact, all the configuration values that you put on
configuration
from values can be put onsecrets
part and will be store as secret on k8s.You can also use an env variable
MICRONAUT_SECURITY_TOKEN_JWT_SIGNATURES_SECRET_GENERATOR
with the same effect.(all configuration can be passed as env var, transforming to upper case and replace all special characters with
_
)I think it will resolved all your issues ?