-
Notifications
You must be signed in to change notification settings - Fork 19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature request] Support repository address and password using environment variables #208
Comments
@rapenne-s Have you tried Also, I should add this to the doc: The passphrase is always the first thing read on stdin when auth is performed for encrypted archives. So doing a regular pipe of the secret will work. Related: #171 What gives me pause in directly reading the env for the passphrase is that the practice is associated with mishandling or breeches because (for example) env being dumped out in error reports (automated or otherwise). Using As for examples to follow: OpenVPN is one that uses env variables extensively yet tries to limit client password input to stdin only (even userpass file has to be enabled at compile time). OpenSSH appears to be another example. Generally, I've expected most variables (not secrets) to be represented on the command line. Reading env directly means adding a 3rd interface (in addition to CLI and config file) where yet another interface (Python API) is already planned. This means fielding requests to expose xyz feature to env settings in addition to making troubleshooting less clear (and env dumps become a regular part of the process). I'm open to ideas on this subject, but currently leaning toward the option that is simpler to implement and protect. |
To clarify one point: Using I'm also open to hearing about counter-examples, security tools that do accept secrets via env. |
Maybe it should be added to docs, but there is a simple hack around all the above, which is --passcmd combined to this should fill the need? |
This is how my current script works (with cat) but how does |
Hi
Most backup tools support passing the repository address and the repository password as environment variable, this makes scripting easier, and automated backups are a must.
Systemd services can load environment variables from files, which make it easy to write scripts and loading secrets from a file that can only be read by root.
It would be great if wyng could support this mechanism.
The text was updated successfully, but these errors were encountered: