Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add asymmetric encryption secret driver #52

Open
SimonDreher opened this issue Nov 9, 2022 · 1 comment
Open

Add asymmetric encryption secret driver #52

SimonDreher opened this issue Nov 9, 2022 · 1 comment

Comments

@SimonDreher
Copy link

Problem
For the AES secret driver I still need to have somehow securely share the key between all people that want to reveal secrets. The other drivers require using a cloud provider.

Solution
I would like to be able to configure some public keys in the skipper config and then encrypt secrets using all those public keys.
Each one of the corresponding private keys can decrypt the secrets.

This way every participant only has to add their public key to the repository and no secret material needs to be exchanged.

Possible solutions could e.g. integrate gpg, age or sops.

Additional context
After changing the public keys, you should be able to reencrypt all the keys. Maybe even support to automatically rotate the secret if a public key was removed. Could be implemented in a separate PR/Issue.

@andaryjo
Copy link
Collaborator

andaryjo commented Nov 9, 2022

Would this be a dedicated driver or maybe just a feature for existing drivers? Besides the "local" AES secret driver, our cloud provider drivers could implement this as well (at least GCP KMS supports asymmetric encryption, not sure about Azure).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants