Announcing Vault Secrets

Today, the leading open source cloud native continuous integration (CI) and continuous delivery (CD) platform, is announcing the official integration with HashiCorp’s Vault secret manager which secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. This integration allows you to securely share secrets stored in Vault with your deployment pipelines.

Get Started using with Vault

Get started by installing the 0.9 technology preview and by installing the Vault plugin. Once installed, the first step is to create a Vault secrets resource (below). For demonstration purposes, lets store our Docker registry credentials, used to publish images to Dockerhub.

Vault Secret Create

The secret should be visible in the dashboard once successfully created. Note that you can add the X-Drone-Repos and X-Drone-Events properties to limit which repositories and pipeline events have access to these secrets.

Vault Secret Info

The next step is to reference the secrets in your .drone.yml configuration file, in the secrets section. In the below example, the secret is referenced as secret/data/docker#username, where secret/data/docker is the path of the kv secret, and username is the key.

- publish:
    image: plugins/docker
    - docker_username
    - docker_password
    repo: octocat/server

      name: secret/data/docker#username

      name: secret/data/docker#password

Drone is modern CI/CD. Container-native and available via open source and an enterprise on-prem edition. Try it today.