Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Secrets management #30

Closed
zxiiro opened this issue Feb 12, 2024 · 5 comments
Closed

Secrets management #30

zxiiro opened this issue Feb 12, 2024 · 5 comments

Comments

@zxiiro
Copy link
Collaborator

zxiiro commented Feb 12, 2024

We need to manage secrets in a safe and secure way so that folks working in CI can have the appropriate access to retrieve necessary secrets. Some ideas to investigate:

  • AWS Secrets Manager
  • 1password for Open Source Projects (with Terraform provider)

AWS Secrets Manager might be a good option since it's stored in our AWS Account and all ci-infra admins should be able to access it. It has Terraform provider too which we can use to retrieve as part of terraform commands.

@jeanschmidt
Copy link
Contributor

One problem that I have with AWS SM is that we need to be very careful. Not all admins of AWS account would be admin of the pytorch foundation. Those secrets as for now have app keys that are somewhat high level of access.

@zxiiro
Copy link
Collaborator Author

zxiiro commented Feb 20, 2024

We decided to go with 1password. We created a shared vault created called "Engineering" which we will use moving forward.

@zxiiro zxiiro closed this as completed Feb 20, 2024
@malfet
Copy link

malfet commented Feb 20, 2024

We decided to go with 1password

@zxiiro who are those we? Is there a link to document of some sort?

To the best of my knowledge, AWS Secrets Manager has never been compromised, while 1password was https://www.bleepingcomputer.com/news/security/1password-discloses-security-incident-linked-to-okta-breach/ which would be my datapoint against 1password

@malfet malfet reopened this Feb 20, 2024
@zxiiro
Copy link
Collaborator Author

zxiiro commented Feb 20, 2024

@malfet I discussed with @jeanschmidt and he stated he'd prefer 1password. In his comment above mine he stated that he had concerns about using AWS Secrets Manager.

> One problem that I have with AWS SM is that we need to be very careful. Not all admins of AWS account would be admin of the pytorch foundation. Those secrets as for now have app keys that are somewhat high level of access.

@zxiiro
Copy link
Collaborator Author

zxiiro commented Feb 20, 2024

I think at the moment whether we use AWS SM or 1Password it doesn't really matter too much but if we're thinking about supporting a multicloud environment 1Password is probably the better choice.

zxiiro added a commit that referenced this issue Feb 21, 2024
The environment variables storing secrets can now be loaded from
the 1password vault. This requires a new command to setup the
environment variables before passing to make.

    op run --env-file make.env -- make arc-canary

This also requires the 1password CLI to be installed.

Issue: #30
Ref: https://developer.1password.com/docs/cli/
Signed-off-by: Thanh Ha <thanh.ha@linuxfoundation.org>
zxiiro added a commit that referenced this issue Feb 21, 2024
The environment variables storing secrets can now be loaded from
the 1password vault. This requires a new command to setup the
environment variables before passing to make.

    op run --env-file make.env -- make

This also requires the 1password CLI to be installed.

Issue: #30
Ref: https://developer.1password.com/docs/cli/
Signed-off-by: Thanh Ha <thanh.ha@linuxfoundation.org>
zxiiro added a commit that referenced this issue Feb 28, 2024
The environment variables storing secrets can now be loaded from
the 1password vault. This requires a new command to setup the
environment variables before passing to make.

    op run --env-file make.env -- make

This also requires the 1password CLI to be installed.

Issue: #30
Ref: https://developer.1password.com/docs/cli/

Signed-off-by: Thanh Ha <thanh.ha@linuxfoundation.org>
@zxiiro zxiiro closed this as completed Mar 12, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants