[JIRA] (JENKINS-60401) Consider merging secret-ssm into aws-secrets-manager

12 views
Skip to first unread message

josephp90@gmail.com (JIRA)

unread,
Dec 9, 2019, 7:16:03 AM12/9/19
to jenkinsc...@googlegroups.com
Joseph Petersen created an issue
 
Jenkins / Task JENKINS-60401
Consider merging secret-ssm into aws-secrets-manager
Issue Type: Task Task
Assignee: Chris Kilding
Components: aws-secrets-manager-credentials-provider-plugin, configuration-as-code-secret-ssm-plugin
Created: 2019-12-09 12:15
Priority: Minor Minor
Reporter: Joseph Petersen

Hi guys

Perhaps consider merging the two plugins as they seem to try to solve the same problem from different angles and you will properly have an conflict about dependencies if installing both plugins.

Chris Kilding
Patrik Boström

Add Comment Add Comment
 
This message was sent by Atlassian Jira (v7.13.6#713006-sha1:cc4451f)
Atlassian logo

chris+jenkins@chriskilding.com (JIRA)

unread,
Dec 9, 2019, 8:52:02 AM12/9/19
to jenkinsc...@googlegroups.com
Chris Kilding commented on Task JENKINS-60401
 
Re: Consider merging secret-ssm into aws-secrets-manager

My coworker had an interesting take on this. He suggested that when he's writing a CasC YAML file and needs to specify a secret key for something, he would like the ability to reference a Jenkins credential's ID in the value slot, with some kind of interpolation syntax.

The high level result would be that any credential, from any provider, could be used to fill in the secret value for that CasC entry.

josephp90@gmail.com (JIRA)

unread,
Dec 9, 2019, 9:25:02 AM12/9/19
to jenkinsc...@googlegroups.com

Chris Kilding while your coworker idea is great. There will be a problem between configuring said provider and at the same time using that provider to reveal secrets.

However this should be possible to solve to always configure credentials provider first and then have a secret resolver use the credentials provider

chris+jenkins@chriskilding.com (JIRA)

unread,
Dec 12, 2019, 6:49:02 AM12/12/19
to jenkinsc...@googlegroups.com

Hi Joseph, would this involving some specific logic to CasC so it knows to always read the credential provider config before doing secret resolution? Or could all of that be done in the (proposed) new secrets resolver?

chris+jenkins@chriskilding.com (JIRA)

unread,
Feb 18, 2020, 5:51:04 AM2/18/20
to jenkinsc...@googlegroups.com
Chris Kilding updated an issue
 
Change By: Chris Kilding
Comment:
Hi Joseph, would this involving some specific logic to CasC so it knows to always read the credential provider config before doing secret resolution? Or could all of that be done in the (proposed) new secrets resolver?

chris+jenkins@chriskilding.com (JIRA)

unread,
Feb 18, 2020, 6:00:02 AM2/18/20
to jenkinsc...@googlegroups.com
 
Re: Consider merging secret-ssm into aws-secrets-manager

Since Secrets Manager is a distinct service from Parameter Store, they should probably continue to be handled by different plugins.

However, it could make sense to add a Secrets Manager SecretSource implementation to this plugin, so that CasC can populate all secrets from Secrets Manager - not just the ones that can be referenced through the CredentialsProvider API. (I'm thinking of the bootstrapping secrets that CasC can't get from a CredentialsProvider.) This would be the counterpart of the Parameter Store SecretSource implementation in the ssm plugin.

Thoughts?

chris+jenkins@chriskilding.com (JIRA)

unread,
Mar 2, 2020, 7:13:03 AM3/2/20
to jenkinsc...@googlegroups.com

I have written up the feature description in JENKINS-61291

This message was sent by Atlassian Jira (v7.13.12#713012-sha1:6e07c38)
Atlassian logo

josephp90@gmail.com (JIRA)

unread,
Mar 7, 2020, 1:10:17 AM3/7/20
to jenkinsc...@googlegroups.com
Joseph Petersen assigned an issue to Joseph Petersen
 
Change By: Joseph Petersen
Assignee: Chris Kilding Joseph Petersen

josephp90@gmail.com (JIRA)

unread,
Mar 7, 2020, 1:25:05 AM3/7/20
to jenkinsc...@googlegroups.com
Joseph Petersen assigned an issue to Chris Kilding
Change By: Joseph Petersen
Assignee: Joseph Petersen Chris Kilding
Reply all
Reply to author
Forward
0 new messages