-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Figure out a better way to provide authentication details / credentials #8
Comments
@arvindsv Will add interactive prompts when not all args present — will that do until we finish the token auth work? |
I think env variables are quite convenient and much better than CLI args. How about a solution like hashicorp vault?
For now I guess we could be saving password to a file |
@tomzo theoretically, we get the environment variables free because we're using the spf13/viper package. I need to write some tests to ensure it works as designed. We do already support the password files. |
I think one of the ugly things that @arvindsv was pointing out was that by passing credentials as args means they are echoed to the terminal in plain sight, which is not ideal. The other is that the passwords are exposed in plaintext on disk. Auth tokens would reduce these risks. |
For basic auth:
$ env auth.password=mysecretpasswd For token auth:
$ <some command to generate token, e.g., curl> | gocd config auth-token - |
The text was updated successfully, but these errors were encountered: