Replies: 4 comments 23 replies
-
Yes, in-memory. If you dont |
Beta Was this translation helpful? Give feedback.
-
Yes I have, thanks. If I implement any external connectors, they should be fully opt-in and I don't want to rely on them the build my whole config in the first place, that's why I would create a separation solution for this. I would probably look at something like RustyVault first, if it has a compatible API, yes. Vaultwarten has nothing to do with HCP vault, it is a fork of Bitwarden. Have not heard of OIDCVarden yet, but it's nice that they implement the SSO part for vaultwarden, which was a reasons for me to not use it so far. OpenBao on the other hand is part of the Linux Foundation, which is a big plus for me. So yeah, probably no real need to add this functionality to Rauthy. |
Beta Was this translation helpful? Give feedback.
-
Today when starting to create a new docker container for a ca I had the idea: As I had already experience when I tried to program an FS for mtp, I thought, it must not be much of a problem, could then serve it time limited etc. That would make it transparent to programs that read secrets from FS. And guess what, some other smart people had the same idea many years ago already of course. Vault filesystem (and Docker volume plugin) [GO] Experimental FUSE clients for Hashicorp REST APIs (ConsulFS,VaultFS,NomadFS,TFEFS,KubernetesFS) [c++] Hashicorp Vault fuse filesystem (unfinished) [Python] |
Beta Was this translation helpful? Give feedback.
-
I've been digging the way that k8s handles secrets. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
As this topic came from other services for me, I was thinking about how to avoid secrets in environment variables to avoid them to show up / leak in ps, logs, errors.
As rauthy currently fully handles config in environment vars, even the config file is completely loaded as env vars, everything will be shown there.
Don't know if this will be an option, but I collected some ideas here.
I found currently 3 options that could be done.
Option 1 (Bash Process Subsitution)
This idea I found here:
https://smallstep.com/docs/step-ca/certificate-authority-server-production/#avoid-storing-passwords-in-environment-variables
Option 2 (delete config file)
If the config file would only be parsed once for importing, I thought an easy way would be to inject the configfile, set an env var like "delete_config_file_after_load" and delete the file after everything was read.
Option 3 (secrets manager / vault)
This is what I would like to use, and centralize configs.
Starting looking into secrets managers I found RustyVault, an early compatible alternative to HCP Vault:
https://github.com/Tongsuo-Project/RustyVault
In combination with "config-vault-rs":
https://github.com/edugzlez/config-vault-rs
One can then do:
set env var with token
(I wouldlike to have a time limited token or OTP)
All this would require that rauthy would use a central serializable config object that then is either filled by env vars, infos from config file (best only loaded once at the beginning), or remote config from vault.
A quick search in rauthy source for "env::" shows that currently many calls directly ready from env.
Beta Was this translation helpful? Give feedback.
All reactions