Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Is there way to allow runtime credentials on S3 resource? #89

Closed
akoranne opened this issue Dec 7, 2017 · 1 comment
Closed

Is there way to allow runtime credentials on S3 resource? #89

akoranne opened this issue Dec 7, 2017 · 1 comment

Comments

@akoranne
Copy link

akoranne commented Dec 7, 2017

The S3 resource requires the creds (access key, secret key) to be passed in.

A client of mine needs an air-gap environment on a public cloud - gov instance. I know it sounds oxymoronic, but I can assure you, it is a valid case. We are using S3 as image store (no docker). The client also is very strict on security.

We had to modify the pipelines "assume role" on the fly. We also modified pipelines to use S3 for images (cflinuxfs2, ert etc). It works.

One caveat though, we still have to provide access key, and secret key in the params that allows access to the S3 bucket which includes the bucket to hold terraform state. Passing these creds are against the client's security procedures.

So, was wondering, if there is a way to not pass the creds on S3 resource but leverage it at runtime?

@hunan-rostomyan
Copy link

You can set up a credentials manager (e.g. CredHub, Vault) and store the parameters there to be injected at runtime. This tutorial explains how to do it with CredHub.

Request for a Vault tutorial has been created on the tutorial github page, so you might also want to follow that issue for updates.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants