The Brigade project is archived. Learn more.

You are viewing docs for Brigade v2. Click here for v1 docs.

Brigade Docs

Secrets

Brigade provides tools for storing sensitive data outside of your Brigade scripts, and then passing that information into the jobs that need them.

This is accomplished by associating secrets with a given project, which the project’s script can then access as needed. Secrets are persisted only on the substrate in the project namespace and are not stored in Brigade’s backing database.

Adding a Secret to Your Project

Imagine a case where we need to pass a sensitive piece of information to one of the jobs in a project’s Brigade script. For example, we might need to pass an authentication token to a job that must authenticate to a remote service.

We first need to set the secret key and value on the project via brig. There are two methods to do this, both provided on the brig project secret set command:

  • Set a secret in-line:
$ brig project secret set --project my-project --set foo=bar
  • Setting a secret via a secrets.yaml file:
$ echo "foo: bar" >> ./secrets.yaml
$ brig project secret set --project my-project --file ./secrets.yaml

Accessing a Secret within a Brigade script

Within a Brigade script (brigade.js or brigade.ts file), we can access any of the secrets defined on our project.

What NOT to do

This first example demonstrates direct access of a secret defined on a project in the event handler code outside of any Job. We only show this method to demonstrate how/where the secret value will be leaked.

⚠️ THIS IS UNSAFE AND WILL LEAK THE SECRET

const { events } = require("@brigadecore/brigadier");

events.on("brigade.sh/cli", "exec", async event => {
  console.log("Project secret foo = " + event.project.secrets.foo);
});

events.process();

Here is the output when this event is handled:

$ brig event create --project my-project --follow

Created event "8b44098e-cd4a-416c-9d4e-b361ff300409".

Waiting for event's worker to be RUNNING...
2021-09-14T22:52:50.444Z INFO: brigade-worker version: dc2481f-dirty
Project secret foo = top$ecret

Direct access of a project secret in the context of a Job’s container is also unsafe, even if the job isn’t logging the secret itself. Consider the following example:

const { Job, events } = require("@brigadecore/brigadier");

events.on("brigade.sh/cli", "exec", async event => {
  let job = new Job("my-job", "docker:latest", event);
  job.primaryContainer.command = ["sh"];
  job.primaryContainer.arguments = [
    "-c",
    "docker login" +
      " -u " + event.project.secrets.dockerUser +
      " -p " + event.project.secrets.dockerPassword
  ];

  await job.run();
});

events.process();

Even if the dockerUser and dockerPassword secrets aren’t leaked in the job logs, they will be leaked on the job Pod manifest. In example above, the following snippet would be seen under the Pod’s spec:

spec:
  containers:
  - args:
    - -c
    - docker login -u me -p top$ecret
    command:
    - sh
    image: docker:latest

Accessing secrets safely

For passing project secrets into a Job, the best practice is to do so via the Job’s environment. Brigade stores this data in the form of a secret on the substrate.

Here is an example of passing a project secret safely into a Job:

const { Job, events } = require("@brigadecore/brigadier");

events.on("brigade.sh/cli", "exec", async event => {
  let job = new Job("my-job", "docker:latest", event);
  job.primaryContainer.environment = {
    "DOCKER_USER": event.project.secrets.dockerUser,
    "DOCKER_PASSWORD": event.project.secrets.dockerPassword
  };
  job.primaryContainer.command = ["sh"];
  job.primaryContainer.arguments = [
    "-c",
    "docker login -u ${DOCKER_USER} -p ${DOCKER_PASSWORD}"
  ];

  await job.run();
});

events.process();

In this case, we retrieve the secrets from the project, and we pass them into the Job as environment variables. When the job executes, it can access the dockerUser and dockerPassword secret values via their corresponding environment variables.

Additionally, these secrets aren’t leaked in the job Pod manifest. Here is how the Pod manifest looks using this method:

spec:
  containers:
  - args:
    - -c
    - docker login -u ${DOCKER_USER} -p ${DOCKER_PASSWORD}
    command:
    - sh
    env:
    - name: DOCKER_PASSWORD
      valueFrom:
        secretKeyRef:
          key: my-job.DOCKER_PASSWORD
          name: c943d42b-aad7-4093-90b4-e9caa4f2fae3-my-job
    - name: DOCKER_USER
      valueFrom:
        secretKeyRef:
          key: my-job.DOCKER_USER
          name: c943d42b-aad7-4093-90b4-e9caa4f2fae3-my-job
    image: docker:latest

Image pull secrets for Worker and Jobs

An image pull secret is used by the substrate (Kubernetes) to pull an OCI image on which a Worker’s or Job’s container is based. This is only necessary if the image exists in a private repository.

Any/all image pull secrets must be pre-created on the substrate by an Operator prior to use in Brigade. The secret must be created in the namespace dedicated to a project for use by that project’s Worker/Jobs.

As a reminder, a project’s namespace can be found under kubernetes.namespace when inspecting a project via:

$ brig project get --id <project name> -o yaml

Once created, the name of the image pull secret may be added to the Worker configuration on the intended project. For example, if an image pull secret named privateregistrysecret exists on the substrate in the namespace for project my-project, it can be added to the project definition like so:

apiVersion: brigade.sh/v2
kind: Project
metadata:
  id: my-project
spec:
  workerTemplate:
    kubernetes:
      imagePullSecrets:
      - privateregistrysecret

Worker and Job containers for events handled by the project will then have access to the image pull secret.

FAQ

Why don’t all jobs automatically get access to all of the project’s secrets? Why do I have to pass them to the Job.environment?

Brigade is designed to use off-the-shelf Docker images. In the examples above, we used the debian:latest image straight from DockerHub. We wouldn’t want to just automatically pass all of our information straight into that container. For starters, doing so might inadvertently override an existing environment variable of the same name. More importantly, the data might get misused or unintentionally exposed by the container.

So we err on the side of safety.

Can I encrypt my secrets?

Brigade uses Kubernetes Secrets for holding sensitive data. Kubernetes Secret data is base64-encoded but not encrypted by default. Operators looking to encrypt these resources should reference the Kubernetes documentation. Note that support for this feature will depend on the distribution used (e.g. the cloud provider offering or other self-hosted option.)

Bottom line: You can trust Brigade secrets as much as you trust your Kubernetes secrets. If you trust how Kubernetes stores your secrets, you’re all set. If you don’t, then you need to solve that problem before you can trust Brigade’s secret handling.