-
Notifications
You must be signed in to change notification settings - Fork 0
Open
Description
The big question with heatlamp-ansible is: what's the correct way to handle secrets? I can see a few alternatives:
- Put the vault password in the vault and hand it to heatlamp-ansible by environment variable. You'd need root on the box to read it from the container anyway, in which case you could just read all of the vault secrets from wherever they were templated in. On the other hand, if you have secrets in your vault that aren't used on every host, this makes an exploit on any box in your system worse by giving access to all secrets at once.
- Use tags to skip tasks that need secrets. If you change a secret, you'll need to re-run the playbook by hand for those settings to change. I expect this won't be a viable option in many cases just because most containers will need access to at least one secret, so the set of things that you'll actually be able to continuously deploy will be small.
- Template in an unencrypted var file with only the relevant secrets in it. A middle ground for option 1. Reasonable, but likely to require some finesse to implement.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels