-
Notifications
You must be signed in to change notification settings - Fork 42
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature request: support wrapped secrets #114
Comments
There are two ways to use the module right now:
It seems like you are suggesting a hybrid: the compilers have permissions in Vault, but all machines need to be able to access vault to redeem the token. Since a resource can be either deferred or not deferred, but not both, I am not sure how you could actually do this. |
This is where my basic understanding of Puppet might be an issue, I'm not sure what compilers do, but to further explain the whole concept of the feature request: it is so that the Puppet Server has minimal knowledge of sensitive information that it does need to know. From what I can tell, the In this regard, how would one go about and get a secret ID and provide it to the agent? From what I can tell from the documentation, the preferred method is by setting |
Hi!
I'm looking for a way to securely deliver secrets onto my nodes, and believe the best way to go about that is to use Vault for secrets management. I've been reading up on support for this in Puppet, and came across documentation referincing the use of this Puppet module. After looking at the documentation, I'm rather certain that the recommended way of using Vault's AppRole authentication method (the method I prefer for having nodes authenticating with my Vault instance) is not supported by this module. The main issue seems to be the lack of support for unwrapping wrapped secrets here.
The way to use the AppRole as recommended by Hashicorp is as follows (translated to Puppet terminology):
As far as I can tell from looking at the source code, step 3 is not implemented; only an unwrapped secret ID can be passed as an argument. It would be really nice if there is a way to pass a wrapped secret token to the lookup command, which would first be exchanged for the actual secret ID in the code. This might be as simple as detecting whether the secret ID is in fact a secret ID (seems like a UUID format) or a token (typically 3 lowercase letters, a period and then followed by random alphanumeric characters), and adding the unwrap logic before exchanging role ID/secret ID for an authentication token if the format is the latter. Or perhaps an
unwrap:
prefix for the secret ID?The text was updated successfully, but these errors were encountered: