Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[quorum] integrate aws secrets manager #2623

Open
wants to merge 1 commit into
base: develop
Choose a base branch
from

Conversation

saurabhkumarkardam
Copy link
Contributor

@saurabhkumarkardam saurabhkumarkardam commented Sep 18, 2024

Commit to be reviewed


feat(quorum): integrate aws secrets manager

This PR will allow the use of the AWS service called Secrets Manager to store sensitive information, similar to how we use HashiCorp Vault for the same purpose.

- A guide named `integrate-aws-secrets-manager-with-eks.md` has been introduced to help users securely connect their EKS cluster with Secrets Manager using OIDC.
- The Quorum master README has been updated to guide users on how to deploy a network with AWS Secrets Manager.
- A Python script has been added that contains the CRUD operation code for AWS Secrets Manager, injecting the script into the container via ConfigMap.
- The Quorum Genesis and Node charts code have been updated to support Secrets Manager.

fixes #2200

Copy link
Contributor

@sownak sownak left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

condition needs to be checked.

@suvajit-sarkar
Copy link
Contributor

The keys will conflict if same platforms are deployed using the same secret manager region. See if the keys can be made unique using the namespace

This PR will allow the use of the AWS service called Secrets Manager to store sensitive information, similar to how we use HashiCorp Vault for the same purpose.

- A guide named "integrate-aws-secrets-manager-with-eks.md" has been introduced to help users securely connect their EKS cluster with Secrets Manager using OIDC.
- The Quorum master README has been updated to guide users on how to deploy a network with AWS Secrets Manager.
- A Python script has been added that contains the CRUD operation code for AWS Secrets Manager, injecting the script into the container via ConfigMap.
- The Quorum Genesis and Node charts code have been updated to support Secrets Manager.

fixes hyperledger#2200

Signed-off-by: saurabhkumarkardam <[email protected]>
@@ -31,12 +31,23 @@ spec:
image: {{ .Values.image.hooks.repository }}:{{ .Values.image.hooks.tag }}
securityContext:
runAsUser: 0
{{- if eq .Values.global.vault.type "hashicorp" }}
{{- if or (eq .Values.global.vault.type "hashicorp") (and (.Values.global.cluster.cloudNativeServices) (eq .Values.global.cluster.provider "aws")) }}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Conditions are too complex.

  • check first if cloudNativeServices = true, then check if provider = aws or azure etc
  • If cloudNativeServices = false, only the vault.type = hashicorp or Kubernetes
  • There cannot be a situation where cloudNativeServices=true and vault.type=hashicorp, if cloudNativeServices = true, vault.type is ignored. Add all cloud KMS related keys under global.cluster itself

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants