terraform: use http backend with vault/openbao secret transit engine instead of unencrypted s3 bucket #216
Labels
No labels
Compat/Breaking
Difficulty
Architectural
Difficulty
Easy
Difficulty
Hard
Help Wanted
Kind
Bug
Kind
Documentation
Kind
Enhancement
Kind
Feature
Kind
Testing
Priority
Critical
Priority
High
Priority
Low
Priority
Medium
Reviewed
Confirmed
Reviewed
Duplicate
Reviewed
Invalid
Reviewed
Won't Fix
Security
Status
Abandoned
Status
Blocked
Status
Need More Info
Status
Postponed
Tracking Issue
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: the-distro/infra#216
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Could be considered part of #156.
Terraform state tends to be very sensitive and should not be stored unencrypted, even if the s3 bucket may be trusted.
Instead, we want to use https://github.com/nimbolus/terraform-backend with the HashiCorp Vault Transit engine, local storage (fs), in-memory lock backend (local map) and OIDC for auth.
We can always migrate the state and locks to something else like postgres later with ease.
See https://github.com/nimbolus/terraform-backend/tree/main/docs for the documentation on each of the items listed.
terraform-backend
should be put right next to openbao, which at the time of writing, is on build-coord (hydra).