Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Transit encryption option #3

Open
awwithro opened this issue Nov 14, 2019 · 1 comment
Open

Transit encryption option #3

awwithro opened this issue Nov 14, 2019 · 1 comment

Comments

@awwithro
Copy link

awwithro commented Nov 14, 2019

My team is looking at this tool since it seems to solve the exact problem we're trying to figure out. i.e. storing secrets in SCM to populate vault.

One thing that crossed my mind was that instead of having to manage pub/private keys for doing the encryption would be to leverage vault's transit encryption API: https://www.vaultproject.io/docs/secrets/transit/index.html

I was thinking part of the provider could point to a path in vault for the transit mount and use the api for encrypting/decrypting the secrets before finally storing the value in vault. Am I way off base with this? Would you be amenable to a PR to this effect or is this not something you see in the provider's future?

@syndbg
Copy link
Member

syndbg commented Nov 19, 2019

@awwithro Sounds like a good idea. We'll think about it and prototype a bit.

The approach seems to solve some issues for us too.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants