Project

General

Profile

Container secret mounts » History » Version 11

Peter Amstutz, 01/28/2022 03:01 PM

1 1 Tom Clegg
h1. Container secret mounts
2
3 2 Tom Clegg
This is a proposed modification to [[Containers API]].
4
5
Add a "secret_mounts" serialized field to containers and container requests.
6
7
"secret_mounts" has the same form and behavior as "mounts", except:
8
* Only literal content is allowed (kind=text or kind=json)
9
* Current value is never returned in a container request or container API response
10
* Current value can be retrieved from a new API (@/arvados/v1/containers/$uuid/secret_mounts@) which must be authenticated by the container's own runtime token
11 1 Tom Clegg
* Never appears in container logs
12
* Never appears in the Arvados logs table
13
* Never appears in websocket updates
14
* Never appears in API server request logs
15
16 6 Tom Clegg
If a secret_mount target is below output_path in the filesystem, it is omitted from the output collection (but this is not an error).
17 4 Peter Amstutz
18 10 Tom Clegg
It is an error to use the same mount target in a container request's @mounts@ and @secret_mounts@.
19
20 3 Peter Amstutz
For clarity, some ways in which secret_mounts behaves like mounts are:
21 2 Tom Clegg
* Non-identical secret_mounts disqualifies a container for reuse. The mere existence of secret_mounts does not disqualify.
22
* secret_mounts can be set via container_requests#create and container_requests#update APIs
23
* secret_mounts cannot be null, but can be an empty hash
24
* keys of secret_mounts are paths in the container's filesystem, and always begin with "/"
25 5 Peter Amstutz
26 7 Tom Clegg
"secret_mounts" api response:
27
28
<pre><code class="json">
29
{
30
  "secret_mounts": {
31 9 Tom Clegg
    "/secrets/foo": {
32
      "kind": "text",
33
      "content": "foobar\n"
34
    }
35 7 Tom Clegg
  },
36
  "_response_time_or_other_api_metadata": "..."
37 1 Tom Clegg
}
38
</code></pre>
39 8 Tom Clegg
40 11 Peter Amstutz
h3. Secret environment
41
42
Add a "secret_environment" serialized field to containers and container requests.
43
44
"secret_environment" has the same form and behavior as "environment", except:
45
46
* Current value is never returned in a container request or container API response
47
* Current value can be retrieved from a new API (@/arvados/v1/containers/$uuid/secret_environment@) which must be authenticated by the container's own runtime token
48
<pre><code class="json">
49
{
50
  "secret_environment": {
51
    "ACCESS_KEY": "1234"
52
   },
53
  "_response_time_or_other_api_metadata": "..." 
54
}</code></pre>
55
* Never appears in container logs
56
* Never appears in the Arvados logs table
57
* Never appears in websocket updates
58
* Never appears in API server request logs
59
60
It is an error to use the same environment variable in a container request's @environment@ and @secret_environment@.
61
62
For clarity, some ways in which secret_environment behaves like environment are:
63
* Non-identical secret_environment disqualifies a container for reuse. The mere existence of secret_environment does not disqualify.
64
* secret_environment can be set via container_requests#create and container_requests#update APIs
65
* secret_environment cannot be null, but can be an empty hash
66
* keys of secret_environment are names of environment variables
67
68
There is no support for secret command line arguments.
69 8 Tom Clegg
70
Documentation note: Anyone who can modify a container request can access its secrets by changing the command, docker image, etc., and committing it. So be careful.