Handling Secrets in Pipeline-as-code #1332
Labels
area/api
Indicates an issue or PR that deals with the API.
kind/design
Categorizes issue or PR as related to design.
lifecycle/stale
Denotes an issue or PR has remained open with no activity and has become stale.
One challenge we run into when using Tekton for pipeline-as-code is around handling the creation of Secrets used both by PipelineResources (which require specific type and annotations) as well as the more typical Secrets used in Steps.
A typical case has us in response to an event create a single-use namespace and laydown definitions for Pipelines, Tasks, ConfigMaps, etc. We then generate a PipelineRun and the particular set of PipelineResources that will be used as well as do some totally non-standard magic to create Secrets. So, in particular this issue is to see if there is anything we can do to standardise the process.
There are many excellent secret management tools available and I'm hoping we can find a way to use them. They typically either store secret values encrypted or else store the values externally in a secure store.
There are two approaches that I'd like to propose but am certainly looking for others...
For example:
For example:
I've left details out on how to decrypt or access the secretsmanager however I'm hoping we could figure that out using the serviceAccount or similar. This issue is mostly for now looking at the format of secrets we could safely check-in to a git repo and then unpack at runtime.
The text was updated successfully, but these errors were encountered: