Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature/nd 398 secrets in plain sight in nacs task definitions #326

Conversation

asifamirat00
Copy link
Contributor

@asifamirat00 asifamirat00 commented Oct 25, 2024

  • Secrets identified within ecs task definitions for nac-infrastructure and moved from shared services parameter store to target account secrets manager

  • Using secrets block within task definitions to source secrets from secrets manager. Moving secrets to a secrets block allows the secret values to be hidden from plain sight.

  • Associated work to allow tasks to access secrets stored in secrets manager (vpc endpoints to allow network route to secrets in secrets manager, custom policies with permissions to read secrets in secrets manager attached to IAM roles)

  • input parameters in root terraform modules which have been moved to secrets manager are being sourced via data lookups from secrets manager instead of sourcing from .env file and ssm get parameters script

  • removal of parameters from ssm get parameters script, buildspec.yml which have been moved to secrets manager, removal of variables no longer required

  • various other changes to allow secret retrieval to work

…eval of secrets from secrets manager, added new vpc endpoint for secrets, adding local list to secrets to share secrets with modules ND-398
…to source secrets from secrets manager, removing secrets from aws_ssn_get_parameters.sh script which have been moved to secrets manager
…es sourced directly from secrets manager as data lookups ND-398
…d sourced via ecs task definitions from buildspec.yml
…ition, removal of jsondecode formatting from secrets manager lookups as secrets are plain text. ND-398
…s-task-definitions

included updates to ECR retention policy to align with agreed policy
…plicate parameters that existed in both environment block and secrets block of ecs task definitions so secrets only in secrets block
…s-task-definitions

including the following updates - amended cw thresholds (#309)
…s-task-definitions

including the following updates - (details of commits) - including
secrets manager secrets, added descriptions/tags to secret, added dhl
ocsp endpoints
…s-task-definitions

including the following updates - Adding user_data script to RDS bastion (#319)
…r. Removed admin_db_details from outputs as we are no longer including the admin db details parameters in secrets manager. ND-398
…s-task-definitions

Pulling in latest updates to main
…le as we are doing data lookup to retrieve values directly from secrets manager ND-398
…s-task-definitions-new

Pulling in latest updates to main
… for eap_private_key_password/radsec_private_key_password, read_replica db username/password to retrieve values directly from secrets manager
…or admin read replica db password to retrieve values directly from secrets manager
…for eap_private_key_password/radsec_private_key_password, admin db username/password to retrieve values directly from secrets manager
…eing enabled as the endpoints are always required for connection to secr

ets manager / ssm parameter store from task definitions
…s-task-definitions-new

Pulling in latest updates to main
Stephen.James and others added 10 commits October 9, 2024 12:56
…sist.

Using a hard coded count to prevent destruction and recreation of exisitng endpoints created by the
"var.ssm_session_manager_endpoints" boolean when set to true.

ND-510
So the VPC endpoints needs to be attached there.

ND-510
…s-task-definitions-new

Pulling in latest updates to main
…he container tls configuration is expecting within radius tasks definition secrets block
… as these values/secrets are now being obtained from secrets manager using aws data lookups
… secrets manager and are being obtained using data source lookup
…as these have been replaced with ones that are doing data lookups from secrets manager instead of sourcing from .env file and ssm get parameters script
…t parameters as these have been replaced with ones that are doing data lookups from secrets manager instead of sourcing from .env file and ssm get parameters script
…ch have been moved to secrets manager & are being sourced by data lookups instead of sourcing from .env file and ssm get parameters script
@asifamirat00 asifamirat00 requested a review from a team as a code owner October 25, 2024 14:04
@asifamirat00 asifamirat00 requested review from Gary-H9, moontune and juddin927 and removed request for a team October 25, 2024 14:04
Copy link
Contributor

@laurentb4 laurentb4 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Plan runs fine locally.
Resources deployed in Dev environment and containers are running healthy.

@asifamirat00 asifamirat00 merged commit fe50020 into main Oct 29, 2024
4 checks passed
@asifamirat00 asifamirat00 deleted the feature/ND-398-secrets-in-plain-sight-in-nacs-task-definitions-new branch October 29, 2024 14:32
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants