Secrets
Secrets are used to store sensitive data like passwords, API keys, TLS certificates, tokens, or other credentials. Kusion provides multiple secret types, and makes it easy to be consumed in containers.
For application dependent cloud resources that are managed by Kusion, their credentials are automatically managed by Kusion (generated and injected into application runtime environment variable). You shouldn't have to manually create those.
Using secrets in workloadโ
Secrets must be defined in AppConfiguration. The values can be generated by Kusion or reference existing secrets stored in third-party vault. Secrets can be consumed in containers by referencing them through the secret://<secret_name>/<key>
URI syntax.
Consume secret in an environment variableโ
You can consume the data in Secrets as environment variable in your container. For example the db container uses an environment variable to set the root password.
import kam.v1.app_configuration as ac
import kam.v1.workload as wl
import kam.v1.workload.container as c
import kam.v1.workload.secret as sec
sampledb: ac.AppConfiguration {
workload: wl.Service {
containers: {
"db": c.Container {
image: "mysql"
env: {
# Consume db-root-password secret in environment
"ROOT_PASSWORD": "secret://db-root-password/token"
}
}
}
# Secrets used to generate token
secrets: {
"init-info": sec.Secret {
type: "token"
}
}
}
}
The example shows the secret root-password
being consumed as an environment variable in the db container. The secret is of type token and will automatically be generated at runtime by Kusion.
Consume all secret keys as environment variablesโ
Sometimes your secret contains multiple data that need to be consumed as environment variables. The example below shows how to consume all the values in a secret as environment variables named after the keys.
import kam.v1.app_configuration as ac
import kam.v1.workload as wl
import kam.v1.workload.container as c
import kam.v1.workload.secret as sec
sampledb: ac.AppConfiguration {
workload: wl.Service {
containers: {
"db": c.Container {
image: "mysql"
env: {
# Consume all init-info secret keys as environment variables
"secret://init-info": ""
}
}
}
# Secrets used to init mysql instance
secrets: {
"init-info": sec.Secret {
type: "opaque"
data: {
"ROOT_PASSWORD": "admin"
}
}
}
}
}
This will set the environment variable "ROOT_PASSWORD" to the value "admin" in the db container.
Types of secretsโ
Kusion provides multiple types of secrets to application developers.
- Basic: Used to generate and/or store usernames and passwords.
- Token: Used to generate and/or store secret strings for password.
- Opaque: A generic secret that can store arbitrary user-defined data.
- Certificate: Used to store a certificate and its associated key that are typically used for TLS.
- External: Used to retrieve secret form third-party vault.
Basic secretsโ
Basic secrets are defined in the secrets block with the type "basic".
import kam.v1.app_configuration as ac
import kam.v1.workload as wl
import kam.v1.workload.secret as sec
sampleapp: ac.AppConfiguration {
workload: wl.Service {
# ...
secrets: {
"auth-info": sec.Secret {
type: "basic"
data: {
"username": "admin"
"password": "******"
}
}
}
}
}
The basic secret type is typically used for basic authentication. The key names must be username and password. If one or both of the fields are defined with a non-empty string, those values will be used. If the empty string, the default value, is used Acorn will generate random values for one or both.
Token secretsโ
Token secrets are useful for generating a password or secure string used for passwords when the user is already known or not required.
import kam.v1.app_configuration as ac
import kam.v1.workload as wl
import kam.v1.workload.secret as sec
sampleapp: ac.AppConfiguration {
workload: wl.Service {
# ...
secrets: {
"api-token": sec.Secret {
type: "token"
data: {
"token": "<the_api_token>"
}
}
}
}
}
The token secret type must be defined. The token
field in the data object is optional and if left empty Kusion will generate the token, which is 54 characters in length by default. If the token
is defined that value will always be used.
Opaque secretsโ
Opaque secrets have no defined structure and can have arbitrary key value pairs.
import kam.v1.app_configuration as ac
import kam.v1.workload as wl
import kam.v1.workload.secret as sec
sampleapp: ac.AppConfiguration {
workload: wl.Service {
# ...
secrets: {
"my-secret": sec.Secret {
type: "opaque"
}
}
}
}
Certificate secretsโ
Certificate secrets are useful for storing a certificate and its associated key. One common use for TLS Secrets is to configure encryption in transit for an Ingress, but you can also use it with other resources or directly in your workload.
import kam.v1.app_configuration as ac
import kam.v1.workload as wl
import kam.v1.workload.secret as sec
sampleapp: ac.AppConfiguration {
workload: wl.Service {
# ...
secrets: {
"server-cert": sec.Secret {
type: "certificate"
data: {
# Please do not put private keys in configuration files
"tls.crt": "The cert file content"
"tls.key": "The key file content"
}
}
}
}
}
External secretsโ
As a general principle, storing secrets in a plain text configuration file is highly discouraged, keeping secrets outside of Git is especially important for future-proofing, even encrypted secrets are not recommended to check into Git. The most common approach is to store secrets in a third-party vault (such as Hashicorp Vault, AWS Secrets Manager and Azure Key Vault, etc) and retrieve the secret in the runtime only. External secrets are used to retrieve sensitive data from external secret store to make it easy to be consumed in containers.
import kam.v1.app_configuration as ac
import kam.v1.workload as wl
import kam.v1.workload.secret as sec
sampleapp: ac.AppConfiguration {
workload: wl.Service {
# ...
secrets: {
"api-access-token": sec.Secret {
type: "external"
data: {
# Please do not put private keys in configuration files
"accessToken": "ref://api-auth-info/accessToken?version=1"
}
}
}
}
}
The value field in data object follow ref://PATH[?version=<VERSION>]
URI syntax. PATH
is the provider-specific path for the secret to be retried. Kusion provides out-of-the-box integration with Hashicorp Vault
, AWS Secrets Manager
, Azure Key Vault
and Alicloud Secrets Manager
.
Immutable secretsโ
You can also declare a secret as immutable to prevent it from being changed accidentally.
To declare a secret as immutable:
import kam.v1.app_configuration as ac
import kam.v1.workload as wl
import kam.v1.workload.secret as sec
sampleapp: ac.AppConfiguration {
workload: wl.Service {
# ...
secrets: {
"my-secret": sec.Secret {
# ...
immutable: True
}
}
}
}
You can change a secret from mutable to immutable but not the other way around. That is because the Kubelet will stop watching secrets that are immutable. As the name suggests, you can only delete and re-create immutable secrets but you cannot change them.