Open arbroen opened 5 years ago
We're currently in the architecture phase of Celery 5.0.0.
I'd rather not introduce new features to 4.x which may complicate it further. We already have connection problems with brokers as it is.
If you'd like to get involved, ping me on twitter or drop me an email.
Im trying to use rabbitmq as a broker for celery and using Hashicorp vault for root credential rotation. How do I use Hashicorp vault's rabbitmq secret engine with celery? Since this issue is related, Is there any updates on this for version 5.2.7.
Any news on this? Thank you very much.
Any update to this?
Checklist
Related Issues and Possible Duplicates
Related Issues
Possible Duplicates
Brief Summary
Modern key vaults like Azure Key Vault support key/secret rotation. In my personal case the TTL of a secret value is about ~2 hours, with a little random component. This means creating new connections to a BROKER_URL after the key has been rotated will fail.
The current approach declares the BROKER_URL as a static variable in the settings. Key rotation would need to have at least the password part of the design to be dynamic.
This feature would increase security options when using Celery. Stimulate the user to tread carefully.
Design
Architectural Considerations
Proposed Behavior
The ability to include a BROKER_PASSWORD_TTL. As soon as the time to live expires a rotation callback function is used to get the new password value.
Example user implementation:
And the rotator:
Proposed UI/UX
BROKER_PASSWORD_TTL - A timedelta, datetime or crontab when the password expires. BROKER_PASSWORD_ROTATOR - function that handles password rotation (as such the user can implement any provider/custom wishes themselves initially).
Diagrams
N/A
Alternatives
Thank you
For maintaining this awesome library. PS. If someone points me in the right direction I would be very much willing to create a PR for this.