You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Azure Container Apps does not provide a readily apparent way to mount volumes or files, specifically certs required for MySQL connections, to Dapr to create secure binding components. The only option for MySQL is using spec.metadata.pemPath.
This new feature would add spec.metadata.pemContents to the MySQL & MariaDB Binding Spec and give developers the ability to establish secure component bindings in Azure Container Apps simply by passing a string with the contents of the certificate file (e.g. Microsoft's public SSL certificate which must be downloaded in certain environments like Azure Government Cloud) or leveraging various secret stores.
Create Azure Key Vault mysecrets and service principal with the requisite permissions to access the vault. Azure Key Vault Secret Store
Create a new secret mypemcontents and copy the PEM certificate file contents into the secret.
Create a new secret myconnectionString and copy the connection string to the Azure MySQL: <user>:<password>@tcp(<server>:3306)/<database>?allowNativePasswords=true&tls=custom
Create or apply the following Dapr secret store component in Azure Container Apps
This issue has been automatically marked as stale because it has not had activity in the last 30 days. It will be closed in the next 7 days unless it is tagged (pinned, good first issue, help wanted or triaged/resolved) or other activity occurs. Thank you for your contributions.
Describe the feature
Azure Container Apps does not provide a readily apparent way to mount volumes or files, specifically certs required for MySQL connections, to Dapr to create secure binding components. The only option for MySQL is using
spec.metadata.pemPath
.This new feature would add
spec.metadata.pemContents
to the MySQL & MariaDB Binding Spec and give developers the ability to establish secure component bindings in Azure Container Apps simply by passing a string with the contents of the certificate file (e.g. Microsoft's public SSL certificate which must be downloaded in certain environments like Azure Government Cloud) or leveraging various secret stores.Example of the new
bindings.mysql
component:An example usage in Microsoft Azure:
mysecrets
and service principal with the requisite permissions to access the vault. Azure Key Vault Secret Storemypemcontents
and copy the PEM certificate file contents into the secret.myconnectionString
and copy the connection string to the Azure MySQL:<user>:<password>@tcp(<server>:3306)/<database>?allowNativePasswords=true&tls=custom
spec.metadata.pemContents
:Release Note
RELEASE NOTE: ADD MySQL/MariaDB binding now supports PEM contents and PEM path
The text was updated successfully, but these errors were encountered: