Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

External Secrets Store Support: HashiCorp Vault #10519

Open
Tracked by #837
cgardens opened this issue Feb 21, 2022 · 3 comments
Open
Tracked by #837

External Secrets Store Support: HashiCorp Vault #10519

cgardens opened this issue Feb 21, 2022 · 3 comments
Assignees
Labels
accepting-contributions Feel free to contribute to them area/platform issues related to the platform autoteam frozen Not being actively worked on team/compose team/platform-move type/enhancement New feature or request

Comments

@cgardens
Copy link
Contributor

cgardens commented Feb 21, 2022

epic: #837

Tell us about the problem you're trying to solve

Currently, Airbyte only integrates with one external secrets store: GCP Secrets Manager. Users who already use HashiCorp Vault would like to be able to have Airbyte integrate. with it.

Describe the solution you’d like

Add HashiCorp Vault as an option for external secrets.

Describe the alternative you’ve considered or used

A clear and concise description of any alternative solutions or features you've considered or are using today. We already have a SecretsPersistence interface to work with. The existing GCP Secrets Manager implementation can be found in the class GoogleSecretManagerPersistence. Basically we need to:

  1. Implement SecretsPersistence for HashiCorp Vault with tests similar to what already exists.
  2. Allow setting appropriate env variable to configure it and pipe through that configuration into the app.

In terms of external contribution part 1 should be very doable. We would be happy to help on part 2 once tests are passing for part 1.

@cgardens
Copy link
Contributor Author

@benmoriceau we have VaultSecretPersistence implemented already. What is the gap between what we have now and saying this is usable for OSS?

@benmoriceau
Copy link
Contributor

@cgardens A community user submitted the Vault persistence. So it is usable in OSS at the moment. That being say we currently only support a token based authentication and not all the supported auth by Vault.

Also the vault connection lib that we are using is not supported anymore so if we were to invest more on this we should probably implement our own lib since there was no other java lib available last time I checked.

@seanglynn-thrive
Copy link

Hey @benmoriceau @cgardens
I'm wondering if you guys have faced any issues while connecting to a vault location to persist secrets, that requires a particular SSL cert?
We're currently blocked from using the Vault secretstore as a result of this :(
See: #22065

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
accepting-contributions Feel free to contribute to them area/platform issues related to the platform autoteam frozen Not being actively worked on team/compose team/platform-move type/enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

9 participants