Secrets PropertySource
Kubernetes has the notion of Secrets for storing
sensitive data such as passwords, OAuth tokens, and so on. This project provides integration with Secrets to make secrets
accessible by Spring Boot applications. You can explicitly enable or disable This feature by setting the spring.cloud.kubernetes.secrets.enabled property.
When enabled, the Fabric8SecretsPropertySource looks up Kubernetes for Secrets from the following sources:
- 
Reading recursively from secrets mounts 
- 
Named after the application (as defined by spring.application.name)
- 
Matching some labels 
Note:
By default, consuming Secrets through the API (points 2 and 3 above) is not enabled for security reasons. The permission 'list' on secrets allows clients to inspect secrets values in the specified namespace. Further, we recommend that containers share secrets through mounted volumes.
If you enable consuming Secrets through the API, we recommend that you limit access to Secrets by using an authorization policy, such as RBAC. For more information about risks and best practices when consuming Secrets through the API refer to this doc.
If the secrets are found, their data is made available to the application.
Assume that we have a spring boot application named demo that uses properties to read its database
configuration. We can create a Kubernetes secret by using the following command:
kubectl create secret generic db-secret --from-literal=username=user --from-literal=password=p455w0rdThe preceding command would create the following secret (which you can see by using kubectl get secrets db-secret -o yaml):
apiVersion: v1
data:
  password: cDQ1NXcwcmQ=
  username: dXNlcg==
kind: Secret
metadata:
  creationTimestamp: 2017-07-04T09:15:57Z
  name: db-secret
  namespace: default
  resourceVersion: "357496"
  selfLink: /api/v1/namespaces/default/secrets/db-secret
  uid: 63c89263-6099-11e7-b3da-76d6186905a8
type: OpaqueNote that the data contains Base64-encoded versions of the literal provided by the create command.
Your application can then use this secret — for example, by exporting the secret’s value as environment variables:
apiVersion: v1
kind: Deployment
metadata:
  name: ${project.artifactId}
spec:
   template:
     spec:
       containers:
         - env:
            - name: DB_USERNAME
              valueFrom:
                 secretKeyRef:
                   name: db-secret
                   key: username
            - name: DB_PASSWORD
              valueFrom:
                 secretKeyRef:
                   name: db-secret
                   key: passwordYou can select the Secrets to consume in a number of ways:
- 
By listing the directories where secrets are mapped: -Dspring.cloud.kubernetes.secrets.paths=/etc/secrets/db-secret,etc/secrets/postgresqlIf you have all the secrets mapped to a common root, you can set them like: -Dspring.cloud.kubernetes.secrets.paths=/etc/secrets
- 
By setting a named secret: -Dspring.cloud.kubernetes.secrets.name=db-secret
- 
By defining a list of labels: -Dspring.cloud.kubernetes.secrets.labels.broker=activemq -Dspring.cloud.kubernetes.secrets.labels.db=postgresql
As the case with ConfigMap, more advanced configuration is also possible where you can use multiple Secret
instances. The spring.cloud.kubernetes.secrets.sources list makes this possible.
For example, you could define the following Secret instances:
spring:
  application:
    name: cloud-k8s-app
  cloud:
    kubernetes:
      secrets:
        name: default-name
        namespace: default-namespace
        sources:
         # Spring Cloud Kubernetes looks up a Secret named s1 in namespace default-namespace
         - name: s1
         # Spring Cloud Kubernetes looks up a Secret named default-name in namespace n2
         - namespace: n2
         # Spring Cloud Kubernetes looks up a Secret named s3 in namespace n3
         - namespace: n3
           name: s3In the preceding example, if spring.cloud.kubernetes.secrets.namespace had not been set,
the Secret named s1 would be looked up in the namespace that the application runs.
See namespace-resolution to get a better understanding of how the namespace
of the application is resolved.
Similar to the ConfigMaps; if you want your application to fail to start
when it is unable to load Secrets property sources, you can set spring.cloud.kubernetes.secrets.fail-fast=true.
It is also possible to enable retry for Secret property sources like the ConfigMaps.
As with the ConfigMap property sources, first you need to set spring.cloud.kubernetes.secrets.fail-fast=true.
Then you need to add spring-retry and spring-boot-starter-aop to your classpath.
Retry behavior of the Secret property sources can be configured by setting the spring.cloud.kubernetes.secrets.retry.*
properties.
| If you already have spring-retryandspring-boot-starter-aopon the classpath for some reason
and want to enable fail-fast, but do not want retry to be enabled; you can disable retry forSecretsPropertySourcesby settingspring.cloud.kubernetes.secrets.retry.enabled=false. | 
Since data coming from Secrets is usually treated as sensitive, endpoints of the actuator /env and /configprops can be made to sanitize data, so that it is not displayed in plain text. In order to do that, you need to set:
spring.cloud.kubernetes.sanitize.secrets=trueThis setting is supported since 3.0.6 and upwards.
| Name | Type | Default | Description | 
|---|---|---|---|
| 
 | 
 | 
 | Enable Secrets  | 
| 
 | 
 | 
 | Sets the name of the secret to look up | 
| 
 | 
 | Client namespace | Sets the Kubernetes namespace where to look up | 
| 
 | 
 | 
 | Sets the labels used to lookup secrets | 
| 
 | 
 | 
 | Sets the paths where secrets are mounted (example 1) | 
| 
 | 
 | 
 | Enables or disables consuming secrets through APIs (examples 2 and 3) | 
| 
 | 
 | 
 | Enable or disable failing the application start-up when an error occurred while loading a  | 
| 
 | 
 | 
 | Enable or disable secrets retry. | 
| 
 | 
 | 
 | Initial retry interval in milliseconds. | 
| 
 | 
 | 
 | Maximum number of attempts. | 
| 
 | 
 | 
 | Maximum interval for backoff. | 
| 
 | 
 | 
 | Multiplier for next interval. | 
Notes:
- 
The spring.cloud.kubernetes.secrets.labelsproperty behaves as defined by Map-based binding.
- 
The spring.cloud.kubernetes.secrets.pathsproperty behaves as defined by Collection-based binding.
- 
Access to secrets through the API may be restricted for security reasons. The preferred way is to mount secrets to the Pod. 
You can find an example of an application that uses secrets (though it has not been updated to use the new spring-cloud-kubernetes project) at
spring-boot-camel-config