Replies: 2 comments 1 reply
-
For the initial implementation, I propose that we focus on enabling ways to access secrets stored in other systems, and don't worry about safely encrypting secrets in our database. For example, if a value is passed with a
Similarly we could add functionality in the future to pull secrets from Hashicorp Vault when the is prefixed with The functionality to pull secrets from other systems could be entirely contained within either the manager or engine codebases. There is no need to do it in both locations. To start we can implement just the environment variable support. |
Beta Was this translation helpful? Give feedback.
-
That makes sense. My inclination would be to put this in the engine if possible. I'd also wonder if we colud do better than string prefixes. If this is being used in a proto, could we have a protobuf that we use for these? Something that had a |
Beta Was this translation helpful? Give feedback.
-
The kaskada project as it exists today doesn't have any requirement for secret management. Currently there are no inputs or outputs that require secrets for configuration.
But this is about to change... the
pulsar
branch contains code for reading from and writing to pulsar streams. The API for configuring access to pulsar includes a parameter namedauth_params
for passing authentication secrets. In the current implementation this secret will be stored un-encrypted in the manager's database.This will not be the only secret that the system will need access to. In the future there will probably be many input and output connectors that require secrets for authentication and/or authorization.
We need to figure out methods for safely storing secrets in the system and/or provide ways to access secrets stored in other systems.
Beta Was this translation helpful? Give feedback.
All reactions