-
Notifications
You must be signed in to change notification settings - Fork 5
EVEREST-400 encrypt secrets in secrets storage #245
Conversation
b570419
to
e4b96a7
Compare
e4b96a7
to
c09ba52
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Generally looks good. Left a couple comments for discussion.
@recharte One other thing I just realized. Do I understand it correctly that instead of running a separate instance we're running Vault as part of Everest backend? |
Neither of those is what we want right now. What you're describing is phase 2 of the Percona secrets management plan. In phase 2, the plan is to connect to a vault instance which can be external and managed by the user or bundled with a percona product. What we are implementing right now is phase 1. This leverages the already existing backend DB (postgresql) and encrypts the secrets before persisting them in the DB. |
We'll mention this as an extra step in the installation documentation and the install script.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Great job! Pretty tricky way to migrate the secrets storage, thanks for adding the comments. It should work though, haven't found any misalignment. Concerns that appeared during the review are already discussed and resolved in the existing threads, nothing to add here.
If we plan to drop some of the migration logic in the later releases, I would suggest to create an Admin&Maintenance ticket to not forget about it.
Hey folks, I'm keeping this PR open until Thursday, as I'm waiting for a confirmation from legal regarding the BSL license of [email protected]. |
Co-authored-by: Maxim Kondratenko <[email protected]>
Co-authored-by: Maxim Kondratenko <[email protected]>
Co-authored-by: Maxim Kondratenko <[email protected]>
Co-authored-by: Maxim Kondratenko <[email protected]>
Co-authored-by: Maxim Kondratenko <[email protected]>
EVEREST-400 encrypt secrets in secrets storage
Problem:
EVEREST-400
We were previously storing secrets in plain-text which obviously a really bad idea.
Solution:
Leverage hashicorp vault's AESGCM barrier module to encrypt the secrets in the postgres internal database.
CHECKLIST
Jira
Tests
[] Is an Integration test/test case added for the new feature/change?[] Are unit tests added where appropriate?