Closed mook-as closed 3 years ago
For the secret paths thing, I'm leaning towards:
secrets/
(K/V v2) for the actual secrets, and mapped/
(K/V v1) for consumption by the pipelines. (Names pending, those are kind of terrible.)secrets/
into mapped/
and delete anything in the second tree that isn't configured to exist (as configured by some secret inside secrets/
).That should hopefully ensure we don't make one-off things that can't be tracked. That does mean we now have a pretty powerful role that can read all secrets, though.
This PR doesn't scribe the current status quo, but there is currently no plan either to implement the changes documented in it either, so closing it for now. We can always re-open if/when we get back to it.
Description
Adds a discussion / documentation on how we intend to use Vault to manage our credentials.
Motivation and Context
We need to sort out how we want to approach #1607 / #1608.
How Has This Been Tested?
N/A
Types of changes
Checklist: