-
Notifications
You must be signed in to change notification settings - Fork 887
docs: add secrets #3057
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs: add secrets #3057
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change | ||||||||
---|---|---|---|---|---|---|---|---|---|---|
@@ -0,0 +1,62 @@ | ||||||||||
# Secrets | ||||||||||
|
||||||||||
<blockquote class="info"> | ||||||||||
This article explains how to use secrets in a workspace. To authenticate the | ||||||||||
workspace provisioner, see <a href="./templates/authentication">this</a>. | ||||||||||
</blockquote> | ||||||||||
|
||||||||||
Coder is open-minded about how you get your secrets into your workspaces. | ||||||||||
|
||||||||||
## Wait a minute... | ||||||||||
|
||||||||||
Your first stab at secrets with Coder should be your local method. | ||||||||||
You can do everything you can locally and more with your Coder workspace, so | ||||||||||
whatever workflow and tools you already use to manage secrets may be brought | ||||||||||
over. | ||||||||||
|
||||||||||
For most, this workflow is simply: | ||||||||||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
|
||||||||||
|
||||||||||
1. Give your users their secrets in advance | ||||||||||
1. Your users write them to a persistent file after | ||||||||||
they've built their workspace | ||||||||||
|
||||||||||
<a href="./templates#parameters">Template parameters</a> are a dangerous way to accept secrets. | ||||||||||
We show parameters in cleartext around the product. Assume anyone with view | ||||||||||
access to a workspace can also see its parameters. | ||||||||||
Comment on lines
+23
to
+25
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
Reasoning:
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
This is the case right now, but could change in the near future, so I left out the specifics.
The specific permission nodes seem likely to change in the near future as we build out RBAC. So, I phrased it in the safest way. |
||||||||||
|
||||||||||
## Dynamic Secrets | ||||||||||
|
||||||||||
Dynamic secrets are attached to the workspace lifecycle and automatically | ||||||||||
injected into the workspace. For a little bit of up front template work, | ||||||||||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
|
||||||||||
they make life simpler for both the end user and the security team. | ||||||||||
|
||||||||||
This method is limited to | ||||||||||
[services with Terraform providers](https://registry.terraform.io/browse/providers), | ||||||||||
which excludes obscure API providers. | ||||||||||
|
||||||||||
Dynamic secrets can be implemented in your template code like so: | ||||||||||
|
||||||||||
```hcl | ||||||||||
resource "twilio_iam_api_key" "api_key" { | ||||||||||
account_sid = "ACXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX" | ||||||||||
friendly_name = "Test API Key" | ||||||||||
} | ||||||||||
|
||||||||||
resource "coder_agent" "dev" { | ||||||||||
# ... | ||||||||||
env = { | ||||||||||
# Let users access the secret via $TWILIO_API_SECRET | ||||||||||
TWILIO_API_SECRET = "${twilio_iam_api_key.api_key.secret}" | ||||||||||
} | ||||||||||
} | ||||||||||
``` | ||||||||||
|
||||||||||
A catch-all variation of this approach is dynamically provisioning a cloud service account (e.g [GCP](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/google_service_account_key#private_key)) | ||||||||||
for each workspace and then making the relevant secrets available via the cloud's secret management | ||||||||||
system. | ||||||||||
|
||||||||||
## Coder SSH Key | ||||||||||
|
||||||||||
Coder automatically inserts an account-wide SSH key into each workspace. In MacOS | ||||||||||
and Linux this key is at `~/.ssh/id_ecdsa`. You can view and | ||||||||||
regenerate the key in the dashboard at Settings > SSH keys. |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,4 +1,4 @@ | ||
# Authentication & Secrets | ||
# Provider Authentication | ||
|
||
<blockquote class="danger"> | ||
<p> | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.