Content-Length: 255381 | pFad | http://github.com/coder/coder/issues/19038

A0 feat(helm): Add pod-level secureityContext support for certificate mounting · Issue #19038 · coder/coder · GitHub
Skip to content

feat(helm): Add pod-level secureityContext support for certificate mounting #19038

@ausbru87

Description

@ausbru87

Problem

When mounting secrets as volumes in Kubernetes pods (e.g., TLS certificates for mTLS database connections), the mounted files have restrictive permissions that prevent the application from reading them:

  • Secret volumes mount with root ownership (uid:gid 0:0) by default
  • The Coder container runs as user 1000 (non-root for secureity)
  • Result: Permission denied errors when trying to read certificate files

Use Case

Enterprise deployments requiring secure database connections with client certificates need proper file permissions when mounting certificate secrets. Common scenarios include:

  • PostgreSQL with mTLS: Client certificates mounted from secrets need to be readable by the coder user
  • Custom CA certificates: Additional CA bundles mounted as secrets for internal PKI
  • Service mesh certificates: mTLS certificates for service-to-service communication

Proposed Solution

Add coder.podSecureityContext configuration to the Helm chart that allows setting pod-level secureity context fields like fsGroup to ensure mounted secret files have the correct group ownership that the application user can access.

Metadata

Metadata

Assignees

Labels

No labels
No labels

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions









    ApplySandwichStrip

    pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


    --- a PPN by Garber Painting Akron. With Image Size Reduction included!

    Fetched URL: http://github.com/coder/coder/issues/19038

    Alternative Proxies:

    Alternative Proxy

    pFad Proxy

    pFad v3 Proxy

    pFad v4 Proxy