Skip to content

feat(helm): Add pod-level securityContext support for certificate mounting #19038

@ausbru87

Description

@ausbru87

Problem

When mounting secrets as volumes in Kubernetes pods (e.g., TLS certificates for mTLS database connections), the mounted files have restrictive permissions that prevent the application from reading them:

  • Secret volumes mount with root ownership (uid:gid 0:0) by default
  • The Coder container runs as user 1000 (non-root for security)
  • Result: Permission denied errors when trying to read certificate files

Use Case

Enterprise deployments requiring secure database connections with client certificates need proper file permissions when mounting certificate secrets. Common scenarios include:

  • PostgreSQL with mTLS: Client certificates mounted from secrets need to be readable by the coder user
  • Custom CA certificates: Additional CA bundles mounted as secrets for internal PKI
  • Service mesh certificates: mTLS certificates for service-to-service communication

Proposed Solution

Add coder.podSecurityContext configuration to the Helm chart that allows setting pod-level security context fields like fsGroup to ensure mounted secret files have the correct group ownership that the application user can access.

Metadata

Metadata

Assignees

Labels

No labels
No labels

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions

    pFad - Phonifier reborn

    Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

    Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


    Alternative Proxies:

    Alternative Proxy

    pFad Proxy

    pFad v3 Proxy

    pFad v4 Proxy