-
-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
use vault for storing credentials #17
Comments
Yes. So the idea is we have a vault with our keyspace for puppet-community (or $name). We'll have keys in there like forge_password etc. for which we can hand out a read-only key to every module that joins us which in turn can be encrypted by The owners of the org will also have a key that gives them write access to the secret so we can update it when needed without anyone else needing to know about the change of credential or it disrupting the release process. |
That doesn't make any sense to me.
|
|
PGP isn't that hard. It's not great for encrypting emails. It's actually really good at having a secret password encrypted to N individuals. |
We already run pcci, so maybe the way forward is to remove travis from the release pipeline all together, run our own release pipeline on servers we control and inject credentials that way. |
Yeah, I've actually been thinking the same. I'm curious if we couldn't just spin up a Drone CI instance ourselves without much trouble. Or a Go (the thing by Thoughtworks). And see if we can get the Beaker testing in there too by leveraging Docker. They've done some recent work allowing you to run Beaker "as is", so without it needing to orchestrate remote machines. |
Whatever problems GPG has around being hard to use, git is far, far worse. |
Anecdotal evidence between the amount of people that manage to use git every day vs GPG invalidates that statement 😛. |
sick 🔥 |
I'm going to close this one for now, I think we need to revisit it once we have hammered out our different processes a bit more. I'm hoping that when we do so we'll be able to consolidate the services that need credentials to very few instead of every module so this issue will be moot. |
we should use vault for storing our forge credentials
@daenney offered to write a small service for retrieving a travis secret from the vault
so anyone could use it to update their secret.
The text was updated successfully, but these errors were encountered: