Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[EPIC] Refactor Secrets Handling #9646

Closed
6 of 8 tasks
cgardens opened this issue Jan 20, 2022 · 7 comments
Closed
6 of 8 tasks

[EPIC] Refactor Secrets Handling #9646

cgardens opened this issue Jan 20, 2022 · 7 comments
Labels
area/platform issues related to the platform Epic team/platform-move type/enhancement New feature or request

Comments

@cgardens
Copy link
Contributor

cgardens commented Jan 20, 2022

Tell us about the problem you're trying to solve

We should audit our handling of secrets anywhere they are present in code. The goal is identify everywhere in the codebase where secrets are access and that our handling meets our desired security posture. This project is focused on de-risking areas where it would be easy for a developer to make a mistake about secrets.

Describe the solution you’d like

Spec

Execution Plan

@cgardens cgardens added type/enhancement New feature or request needs-triage labels Jan 20, 2022
@cgardens
Copy link
Contributor Author

relates to: #7391

@cgardens cgardens added 2022-q1-platform area/platform issues related to the platform and removed needs-triage labels Jan 20, 2022
@cgardens cgardens changed the title Audit Secrets Handling Improve Secrets Handling Feb 1, 2022
This was referenced Feb 1, 2022
@olivermeyer
Copy link
Contributor

I am hosting the OSS version of Airbyte and have a few questions:

  • Can we expect that after this issue is closed, we will no longer see any unencrypted secrets in the Airbyte DB?
  • If yes, given the 2022-q1-platform label, can we expect this issue to be release and available for the OSS version by the end of this quarter?
  • If no, is there another issue which relates to ensuring that all secrets in the Airbyte DB are encrypted?

Thanks :)

@anand-srinivaas
Copy link

anand-srinivaas commented Feb 17, 2022

  • If there is an option to extend external secret services like cloud secret managers or vault, will be very much helpful!
  • Appreciate if this can be done in this quarter :)

Thanks

@cgardens cgardens changed the title Improve Secrets Handling Refactor Secrets Handling Feb 21, 2022
@cgardens
Copy link
Contributor Author

cgardens commented Feb 21, 2022

@anand-srinivaas thanks for your note! I have updated this issue so that the scope of it is more clear. This issue is focused on refactoring secrets code.

We actually already support GCP Secrets Manager(docs). I have created a separate issue #10519 to add support for HashiCorp Vault. I don't think we will be able to devote time to Vault this quarter, but we are open to contribution here. If someone can implement the SecretsPersistence class with Vault, we can bring it the rest of the way home. If there is some other secrets manager you'd like please create an issue and tag me.

@cgardens
Copy link
Contributor Author

@olivermeyer can you speak a little more about what outcome you'd like. do simply want the the db to be encrypted at rest or are you specifically looking for credentials values to be specifically encrypted?

@olivermeyer
Copy link
Contributor

olivermeyer commented Feb 24, 2022

@olivermeyer can you speak a little more about what outcome you'd like. do simply want the the db to be encrypted at rest or are you specifically looking for credentials values to be specifically encrypted?

@cgardens I am familiar with the Airflow model (which may or may not be a common way of going about this, I don't know): secret values are encrypted in the DB and decrypted with a key which is generated when the Airflow installation is first started (doc). To spell it out, this means that even if someone somehow accesses the DB, they cannot see our secrets.

Right now, if someone gains access to our Airbyte DB, they will also get access to most system to which Airbyte connects. That's a problem.

Does this make sense?

@cgardens cgardens changed the title Refactor Secrets Handling [EPIC] Refactor Secrets Handling May 11, 2022
@cgardens cgardens added the Epic label May 11, 2022
@cgardens
Copy link
Contributor Author

Closing as the projects we care about for this quarter are complete. The remaining open issues will be prioritized and handled separately.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/platform issues related to the platform Epic team/platform-move type/enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

4 participants