-
-
Notifications
You must be signed in to change notification settings - Fork 1
Add CoreConfig & Root/Intermediate Secrets #29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
You could do the following:
|
@ingalls FYI: I locked the write permissions to Secrets Manager down to a single key "/tak-admin-cert" from within the container. |
This comment was marked as resolved.
This comment was marked as resolved.
|
@chriselsen I removed CoreConfig from the secrets manager as the following 2 things will bite us: Federation & COT Injectors can be modified via API but the backend store is the CoreConfig and not the database. As such if there is heavy use of either we will blow past our 100 version limit in the AWS SecretStore service. This PR is getting long in the tooth so for now I've dropped CoreConfig and will re-evaluate where it should live. The S3 bucket for ECS config is an option? Or Maybe AWS System Manager Parameter Store? |
Context
Intent here (and I'm not stuck on this approach cc/ @chriselsen) is to provide a more durable location to store irreplaceable files (Root CA/Intermediate) in the same way the TAK Admin Cert is currently implemented thanks to @chriselsen
Secondarily this can also serve as a way to inject externally modified or provided config/certs into the core EFS/ECS tasks