-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[EPIC] Refactor Secrets Handling #9646
Comments
relates to: #7391 |
I am hosting the OSS version of Airbyte and have a few questions:
Thanks :) |
Thanks |
@anand-srinivaas thanks for your note! I have updated this issue so that the scope of it is more clear. This issue is focused on refactoring secrets code. We actually already support GCP Secrets Manager(docs). I have created a separate issue #10519 to add support for HashiCorp Vault. I don't think we will be able to devote time to Vault this quarter, but we are open to contribution here. If someone can implement the |
@olivermeyer can you speak a little more about what outcome you'd like. do simply want the the db to be encrypted at rest or are you specifically looking for credentials values to be specifically encrypted? |
@cgardens I am familiar with the Airflow model (which may or may not be a common way of going about this, I don't know): secret values are encrypted in the DB and decrypted with a key which is generated when the Airflow installation is first started (doc). To spell it out, this means that even if someone somehow accesses the DB, they cannot see our secrets. Right now, if someone gains access to our Airbyte DB, they will also get access to most system to which Airbyte connects. That's a problem. Does this make sense? |
Closing as the projects we care about for this quarter are complete. The remaining open issues will be prioritized and handled separately. |
Tell us about the problem you're trying to solve
We should audit our handling of secrets anywhere they are present in code. The goal is identify everywhere in the codebase where secrets are access and that our handling meets our desired security posture. This project is focused on de-risking areas where it would be easy for a developer to make a mistake about secrets.
Describe the solution you’d like
Spec
Execution Plan
The text was updated successfully, but these errors were encountered: