Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support standalone secret managers (aws-vault / Hashicorp Vault / etc) #97

Open
carlspring opened this issue Apr 2, 2023 · 4 comments
Labels

Comments

@carlspring
Copy link

It would be cool, if instead of having to set up Github tokens for the AWS keys, this could be neatly integrated with 99designs/aws-vault. On privately hosted Github Actions Runners, this would make things a lot more secure.

@motatoes
Copy link
Contributor

motatoes commented Apr 2, 2023

Hi @carlspring thanks for the contribution! You are helping us make this tool better for everyone. This is an interesting one indeed for the case of private github runners. Do you have a specific scenario in mind for this or how it could work? example we could distribute aws-vault along with the tool or install it ahead of using the cli and still map it as environment variables to digger.

@carlspring
Copy link
Author

Hi @motatoes ,

Typically, we would have privately hosted Github Action Runners running via our own custom Docker images (available via private ECR, or other private registry). These images would have aws-vault on them and the access keys will be added via the key/values stored in SSM. This infrastructure itself is also Terraformed, which is how these credentials are pre-configured. There is no exporting of credentials via variables or anything leaking. All the Terraform scripts are executed via aws-vault exec.

This will allow users to have a rather secure set up.

Of course, you can set up your credentials as Github secrets, but if you're hosting this on a public runner, there's always a risk of leaking the secrets, if some malicious actor tries fiddling around via a well-crafted pull request.

@motatoes motatoes added the good first issue Good for newcomers label Apr 5, 2023
@ZIJ ZIJ changed the title Add support for aws-vault Support standalone secret managers (aws-vault / Hashicorp Vault / etc) May 9, 2023
@ZIJ
Copy link
Contributor

ZIJ commented May 9, 2023

Alternatively (or both perhaps) - Hashicorp Vault. Suggested by Joseph Beadle

A quick win … Hashicorp vault is that supported? It’s easy to integrate as it’s golang also and does azure, AWS and Gcp secret management!

@carlspring
Copy link
Author

This should probably be its own issue, just like HashiCorp Vault should be a separate thing as well and there should probably be a parent / epic issue linking this sort of work.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants