Thanks for that Kirill. Optional sounds good. Right now I'm leaning towards encrypting the full object model in the database rather than selective attributes, I can't think of a reason not to do this and it makes things more transparent and straight forward for the user. I've added a spec for this at https://review.openstack.org/#/c/469467/ if you have a chance to review.

Regards,
-Paul

On 31/05/17 17:59, Kirill Zaitsev wrote:
As long as this integration is optional (i.e. no barbican — no encryption) It feels ok to me. We have a very similar integration with congress, yet you can deploy murano with or without it.

As for the way to convey this, I believe metadata attributes were designed to answer use-cases like this one. see https://docs.openstack.org/developer/murano/appdev-guide/murano_pl/metadata.html for more info.

Regards, Kirill

Le 25 мая 2017 г. à 18:49, Paul Bourke <paul.bou...@oracle.com <mailto:paul.bou...@oracle.com>> a écrit :

Hi all,

I've been looking at a blueprint[0] logged for Murano which involves encrypting parts of the object model stored in the database that may contain passwords or sensitive information.

I wanted to see if people had any thoughts or preferences on how this should be done. On the face of it, it seems Barbican is a good choice for solving this, and have read a lengthy discussion around this on the mailing list from earlier this year[1]. Overall the benefits of Barbican seem to be that we can handle the encryption and management of secrets in a common and standard way, and avoid having to implement and maintain this ourselves. The main drawback for Barbican seems to be that we impose another service dependency on the operator, though this complaint seems to be in some way appeased by Castellan, which offers alternative backends to just Barbican (though unsure right now what those are?). The alternative to integrating Barbican/Castellan is to use a more lightweight "roll your own" encryption such as what Glance is using[2].

After we decide on how we want to implement the encryption there is also the question of how best to expose this feature to users. My current thought is that we can use Murano attributes, so application authors can do something like this:

- name: appPassword
 type: password
 encrypt: true

This would of course be transparent to the end user of the application. Any thoughts on both issues are very welcome, I hope to have a prototype in the next few days which may help solidify this also.

Regards,
-Paul.

[0] https://blueprints.launchpad.net/murano/+spec/allow-encrypting-of-muranopl-properties [1] http://lists.openstack.org/pipermail/openstack-dev/2017-January/110192.html [2] https://github.com/openstack/glance/blob/48ee8ef4793ed40397613193f09872f474c11abe/glance/common/crypt.py

__________________________________________________________________________
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org <mailto:openstack-dev-requ...@lists.openstack.org>?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev


__________________________________________________________________________
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev


__________________________________________________________________________
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

Reply via email to