-
Notifications
You must be signed in to change notification settings - Fork 75
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(jans-pycloudlib): add AWS secret manager support as a secret layer for holding CN configuration #3026
Comments
As we have configs and secrets layers, we can utilize different type of AWS secretsmanager value.
|
Agreed. However, I think we need to unify the method . With google secrets we are also encrypting and compressing the data that is pushed to the secret manager. I think we need to either remove that or also enforce the same with AWS |
Lets keep the Google secrets as is to avoid regression. For AWS secrets, we may add compression before saving it as SecretBinary type. |
Though in my opinion, adding compression likely will make it harder to check the value from official AWS CLI/client apps as those need to decode and/or decompress the value first. Not as straight as we used to have when dealing with native k8s or Vault secrets. |
Right , though the compression came out of the need to lower the size of the payload since upstream clouds have limits on the size of each secret. Since we have full files in our secrets that becomes an issue so we have to compress to make sure we keep the payload and secret low in size and add a how to for dealing with checking the secrets data. |
…ion layers (#3112) * feat(jans-pycloudlib): add AWS Secrets Manager support for configuration layers Ref: #3026 * chore(jans-pycloudlib): updated build (#3113) Signed-off-by: mo-auto <54212639+mo-auto@users.noreply.github.com> Signed-off-by: mo-auto <54212639+mo-auto@users.noreply.github.com> * feat: add aws secret setup to helm chart * ci: add update of pycloud exception Signed-off-by: mo-auto <54212639+mo-auto@users.noreply.github.com> Co-authored-by: mo-auto <54212639+mo-auto@users.noreply.github.com> Co-authored-by: moabu <47318409+moabu@users.noreply.github.com>
Similar to the google secret handler, an AWS secret handler should be added to support multi regional setups with AWS secret manager has the holder of the secret and configuration output.
Things to consider:
Support for AWS KMS key ID (by default using
aws/secretsmanager
) [NEED TEST ON REMOTE AWS]Reference:
JSON structure [DONE]
Excerpt from https://docs.aws.amazon.com/cli/latest/reference/secretsmanager/create-secret.html:
Compression support (lzma vs bz2) [DONE]
Compress secrets value to reduce the size using lzma.
SecretString
type for configs (non-sensitive configuration) andSecretBinary
for secrets (will produce base64 value) [DONE]Secrets naming [DONE]
Excerpt from https://docs.aws.amazon.com/cli/latest/reference/secretsmanager/create-secret.html
AWS credentials and region support [DONE]
Replication of secrets to other regions [NEED TEST ON REMOTE AWS]
The text was updated successfully, but these errors were encountered: