Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

feat(helm): Add pod-level securityContext support for certificate mounting #19038

Assignees
ausbru87
@ausbru87

Description

@ausbru87

Problem

When mounting secrets as volumes in Kubernetes pods (e.g., TLS certificates for mTLS database connections), the mounted files have restrictive permissions that prevent the application from reading them:

  • Secret volumes mount with root ownership (uid:gid 0:0) by default
  • The Coder container runs as user 1000 (non-root for security)
  • Result: Permission denied errors when trying to read certificate files

Use Case

Enterprise deployments requiring secure database connections with client certificates need proper file permissions when mounting certificate secrets. Common scenarios include:

  • PostgreSQL with mTLS: Client certificates mounted from secrets need to be readable by the coder user
  • Custom CA certificates: Additional CA bundles mounted as secrets for internal PKI
  • Service mesh certificates: mTLS certificates for service-to-service communication

Proposed Solution

Addcoder.podSecurityContext configuration to the Helm chart that allows setting pod-level security context fields likefsGroup to ensure mounted secret files have the correct group ownership that the application user can access.

Metadata

Metadata

Assignees

Labels

No labels
No labels

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions


    [8]ページ先頭

    ©2009-2025 Movatter.jp