You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Overview
We want to enhance Dagu to securely manage secrets by retrieving them from Vault, AWS Secrets Manager, or GCP Secret Manager. Since these devices can be physically stolen, our goal is to ensure secrets are never stored in plain text on the device and are only loaded at execution time with minimal exposure.
Proposal
Secret Providers Configuration
Extend DSL to include a secretProviders section for Vault, AWS, and GCP.
No Plain Text Logging: Ensure logs/UI never expose secret values, potentially masking them.
Any feedbacks on the design, or thoughts are very welcomed.
The text was updated successfully, but these errors were encountered:
yohamta
changed the title
Add Secure Secret Management Support for IoT Devices (Vault, AWS, GCP)
Add Secure Secret Management Support (Vault, AWS, GCP)
Jan 22, 2025
Overview
We want to enhance Dagu to securely manage secrets by retrieving them from Vault, AWS Secrets Manager, or GCP Secret Manager. Since these devices can be physically stolen, our goal is to ensure secrets are never stored in plain text on the device and are only loaded at execution time with minimal exposure.
Proposal
Secret Providers Configuration
secretProviders
section for Vault, AWS, and GCP.DAG File
secrets:
Sectionsecrets:
block in each DAG to declare which provider to use, the secret’s path/ARN, and an internal reference name.Security Considerations
Any feedbacks on the design, or thoughts are very welcomed.
The text was updated successfully, but these errors were encountered: