-
Notifications
You must be signed in to change notification settings - Fork 54
Add Bitwarden credential manager #66
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
4432e5b to
89334e8
Compare
|
I pushed some changes cause some format issues in the code. |
sduenas
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks again for your PR. I think it will be nice to integrate this. Please check my comments and remove all references to other managers not yet supported (AWS, Hashicorp).
1ef95dd to
8f015e9
Compare
8f015e9 to
28b5bfe
Compare
sduenas
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please check my comments.
66f5aea to
ddcaacf
Compare
c423eb4 to
d6dbc75
Compare
|
Did some more changes and pushed. Testing was not correct after last comment changes. |
|
So, testing, reading and refactoring I've come to the finding that when we use client_id + client_secret (apikey) for login, then we need the master password for unlocking the vault. That means that we have to add the master password somewhere to the login or creating the object so we can unlock the vault. This does not happen if we use user-password, in which case the vault unlocks by itself. So I've come to two options:
I am going to push changes with option 1, cause we have already put in the parameter list two sensitive strings, so adding one more I don't think would be a problem. Awaiting opinions. |
d6dbc75 to
20424b5
Compare
|
So it's right now using the master_password as third argument. Rechecked everything and tested. Should be good to go and returns what is shown in the README. |
|
@jjmerchante can you have a look to this PR? |
jjmerchante
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Overall, it looks good to me. Please review my comments, most are about style.
I don’t like using the master password, but as you said, there isn’t any other way to unlock. I think using API keys is better for authentication, because in some cases you need single sign-on or two-factor authentication, and with API keys, as I understand it, this isn’t required.
Let’s keep this as is for now, we can explore Bitwarden Secrets later.
20424b5 to
1f81c78
Compare
|
Did all the changes and merged the poetry.lock changes too. I also agree that the master password is not the best solution but could develop a Bitwarden Secrets solution next to this so people can choose which one to use. |
365a1b3 to
8c042e7
Compare
|
I am not sure how to resolve that poetry.lock conflict without breaking stuff, can I leave this to you? I am still not 100% sure of my git skills. |
The best way is to remove the Then push with If have any issues, let me know and I can update it for you. |
72cec79 to
f7eed67
Compare
|
Fixed that missing line and tried to fix the poetry.lock following instructions, but it keeps showing as error. Can you fix it? Would also like to know what's going on, I don't understand. Thanks a lot for the reviews and I'm around for any other changes. |
Signed-off-by: Alberto Ferrer Sánchez <alberefe@gmail.com>
f7eed67 to
34ba6d5
Compare
|
I was wrong with my previous instructions. Here’s what I actually did in your branch (assuming |
jjmerchante
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Implement credential management system with Bitwarden integration. This provides automated secrets retrieval.
This relieves the user from hardcoding credentials in files and also automates the retrieval of api keys from pools in an automated way, optimizing speed when the program needs to rotate through several api keys or credentials to access different services in a row.
The following are the contents of the PR: