terraform: use http backend with vault/openbao secret transit engine instead of unencrypted s3 bucket #216
Labels
No labels
Compat/Breaking
Difficulty/Architectural
Difficulty/Easy
Difficulty/Hard
Help Wanted
Kind/Bug
Kind/Documentation
Kind/Enhancement
Kind/Feature
Kind/Testing
Priority/Critical
Priority/High
Priority/Low
Priority/Medium
Reviewed/Confirmed
Reviewed/Duplicate
Reviewed/Invalid
Reviewed/Won't Fix
Security
Silenced Alert
Status/Abandoned
Status/Blocked
Status/Need More Info
Status/Postponed
Tracking Issue
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: afnix/infra#216
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Could be considered part of #156.
Terraform state tends to be very sensitive and should not be stored unencrypted, even if the s3 bucket may be trusted.
Instead, we want to use https://github.com/nimbolus/terraform-backend with the HashiCorp Vault Transit engine, local storage (fs), in-memory lock backend (local map) and OIDC for auth.
We can always migrate the state and locks to something else like postgres later with ease.
See https://github.com/nimbolus/terraform-backend/tree/main/docs for the documentation on each of the items listed.
terraform-backend
should be put right next to openbao, which at the time of writing, is on build-coord (hydra).