-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Task secret management #602
Comments
This comment was marked as outdated.
This comment was marked as outdated.
I like this idea, and it would be the creating credentials that would need to access the various secret managers? |
If we automate the whole process as part of the task lifecycle, it would manage the following additional resources:
|
Going to use aws terminology I think we discussed that we should not edit, create, or delete roles. If they list an |
I don't recall discussing this, but we're on the same page: if |
Then, do you propose to add a new |
I think that a secrets {
SNOWFLAKE_USER = "arn"
SNOWFLAKE_PASS = "arn"
GITHUB_BOT_PAT = "arn"
} However I don't really see this being a highly demanded feature, it would be nice and I'm sure that it could/would get used, but you can also just use the I feel that there could be some confusion about who has access to the secrets, ie the creating user's credentials or the tasks assigned credentials. Maybe I am overcomplicating this? |
What if we use the Unencrypted by defaultresource "iterative_task" "example" {
···
environment = {
NAME = "value"
}
} Encrypted on demandresource "iterative_task" "example" {
···
key = "arn:"
environment = {
NAME = "value"
}
} When users provide a |
I like this idea! Now we just need some log masking for them as well 😅 |
The current mechanism used to pass environment variables to
task
scripts stores the values in plain text as part of the instance'scloud-init
startup script.Instead, it should be using
permission_set
from #550 and:aws
az
gcp
k8s
This brings the high-level debate of whether automate the whole permissions set and secret manager creation process or leave it to the user as part of a separate lifecycle, similarly to #299.
Prototypes
Amazon Web Services
Footnotes
Semantically equivalent, but insecure by default: securing them is not our responsibility, but the cluster administrators' ↩
The text was updated successfully, but these errors were encountered: