Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Breakout 4: Token Vault workflows #560

Open
5 tasks
manishapriya94 opened this issue Apr 26, 2023 · 1 comment
Open
5 tasks

Breakout 4: Token Vault workflows #560

manishapriya94 opened this issue Apr 26, 2023 · 1 comment

Comments

@manishapriya94
Copy link
Contributor

manishapriya94 commented Apr 26, 2023

Problem Statement:
Token scanning is important to ensure that secrets/tokens aren't exposed (very important for open source projects and the supply chain that depends on them). A repo contains 100 secrets and an org can contain upto 500

Tasks
*lean on maintainer for admin privileges

@manishapriya94 manishapriya94 transferred this issue from OpenSourceFellows/open-source-mentorship Apr 26, 2023
@ipc103
Copy link

ipc103 commented Apr 26, 2023

2023-04-26

  • The goal of this issue is to be able to read secrets from Vault into an action/workflow
  • Vault is a Hashicorp service for storing secrets
  • OIDC workflows are used to generate short-lived auth tokens
  • We have a Vault account already and can use that to generate a Vault instance
  • We generated a new cluster called hackpod running on AWS
  • Vault is open source, but you can buy a subscription through Hashicorp
  • To access the Cluster via the CLI, you need to download Vault Open Source Edition and install it locally to use the CLI.

Next Steps

  • Follow the instructions after clicking "Access Vault" to access via the CLI
  • Follow the GitHub instructions here to enable OIDC for the Hashicorp Vault

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants