Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Secrets provider interface for Credhub #705

Closed
aegershman opened this issue Jun 19, 2019 · 0 comments
Closed

Secrets provider interface for Credhub #705

aegershman opened this issue Jun 19, 2019 · 0 comments

Comments

@aegershman
Copy link
Contributor

aegershman commented Jun 19, 2019

See also: [#662] [#573] [#569] [#41] [#392], and specifically #392 (comment)

In order to pass secrets to charts via Credhub, it could be beneficial to consider how a generalized pattern credential references could be used for providers such as Credhub (or SSM, Vault, etc.)

Specifically, my use-case is credhub, but that might not always be the case for my team: looking through the issue backlog shows there's interest in all sorts of provider backends.


Currently, helm secrets (i.e. leverages mozilla/sops) is supported via the secrets: block; during apply, the secrets are decrypted and applied to the deployment. (Sidenote: I've started using this feature, and I love it).

There is an ongoing investigation into using Amazon SSM as a provider, which (appears) to do something similar: during helmfile sync/apply, the credential references are decrypted from the credential manager && the values are passed to the chart.

There are other credential providers which can be used similarly to SSM. E.g., credhub, vault... perhaps even spring cloud config or lastpass or gopass.

At the end of the day, from what I understand, all we're really doing is decrypting values && passing them in either as env values or as a decrypted secrets.yaml (helm secrets). But there still remains questions on the best practice for how this can be repeated for different credential providers.

Thanks for the time & consideration. Apologies if this issue is too open-ended, I can tighten it up to only be about Credhub if desired.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants