What usecase for amtool would not involve authorization or authentication?
I don't think there are.

Le mer. 1 déc. 2021, 09:21, Matthias Rampke <[email protected]> a
écrit :

> I take a less hard line on that … I think it's good not to *accept
> secrets* on the command line, but I think we should not categorically
> exclude generic features (like headers on the command line) because someone
> *might* put secrets there.
>
> I don't have a final opinion whether we should add more than the config
> file in this case, but a feedback I hear a lot from users is that having to
> generate files left and right is challenging in
> post-configuration-management systems (think "I want to run this as a
> one-off job on Kubernetes"). If our stance that secrets only go in files
> causes someone to commit that file to source control, we've
> verschlimmbessert the overall situation.
>
> /MR
>
>
> On Tue, Nov 30, 2021 at 9:09 AM Ben Kochie <[email protected]> wrote:
>
>> There are lots of ways to easily inject secrets into configs.
>>
>> Adding secrets/headers via config file is the safest way.
>>
>> While I'm all for allowing sharp edges in tools if they're not default,
>> I'm strongly against having known unsafe things like secrets on the command
>> line.
>>
>> On Tue, Nov 23, 2021 at 5:38 PM Augustin Husson <
>> [email protected]> wrote:
>>
>>> Hello,
>>>
>>> I think having the http config file is a good idea and a safe one.
>>> The fact users have a rotation in the credential used only means the
>>> client has to authenticate themself first to get a fresher session / token
>>> / credentials. Maybe it's more sophisticated than that, but from my
>>> understanding it shouldn't be.
>>>
>>> Kubernetes is using a config file for it's kube client and it works
>>> nicely. The token used and stored in the file expires every 24h  and it's
>>> not so hard to have a fresher one.
>>>
>>> Best regards,
>>> Augustin.
>>>
>>> Le mar. 23 nov. 2021 à 17:15, Julien Pivotto <[email protected]>
>>> a écrit :
>>>
>>>> Hello -developers,
>>>>
>>>> In the past and still today, we have asked exporters not to use secrets
>>>> on the command line.
>>>>
>>>> There is a pull requests that wants to add secrets on the amtool command
>>>> line:
>>>> https://github.com/prometheus/alertmanager/pull/2764
>>>>
>>>> and users requests to pass arbitrary http headers in amtool via the
>>>> command line too. In the same way, users want to add arbitraty secrets
>>>> in HTTP headers: https://github.com/prometheus/alertmanager/issues/2597
>>>>
>>>> I am personally opposed to allow what we ask others not to do, but maybe
>>>> I am stubborn, so I am asking the developers community here what should
>>>> we do here?
>>>>
>>>> My proposal was to introduce a HTTP client configuration file to amtool,
>>>> so we tackle the secret issue and enable all the other HTTP client
>>>> options easily (oauth2, bearer token, proxy_url, ...). The community was
>>>> not entirely keen on it:
>>>>
>>>> https://github.com/prometheus/alertmanager/issues/2597#issuecomment-974144389
>>>>
>>>> What do the large group of developers think about all this? Note that
>>>> the solution we chose here could/should be applied to promtool and
>>>> getool later.
>>>>
>>>> Thanks!
>>>>
>>>> --
>>>> Julien Pivotto
>>>> @roidelapluie
>>>>
>>>> --
>>>> You received this message because you are subscribed to the Google
>>>> Groups "Prometheus Developers" group.
>>>> To unsubscribe from this group and stop receiving emails from it, send
>>>> an email to [email protected].
>>>> To view this discussion on the web visit
>>>> https://groups.google.com/d/msgid/prometheus-developers/20211123161546.GA696401%40hydrogen
>>>> .
>>>>
>>> --
>>> You received this message because you are subscribed to the Google
>>> Groups "Prometheus Developers" group.
>>> To unsubscribe from this group and stop receiving emails from it, send
>>> an email to [email protected].
>>> To view this discussion on the web visit
>>> https://groups.google.com/d/msgid/prometheus-developers/CAOJizGcb45MwjCj3Bd6_gt9ZatS%2Bnbw%2B1QvjD8wbNdfR77eo%3DQ%40mail.gmail.com
>>> <https://groups.google.com/d/msgid/prometheus-developers/CAOJizGcb45MwjCj3Bd6_gt9ZatS%2Bnbw%2B1QvjD8wbNdfR77eo%3DQ%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>> .
>>>
>> --
>> You received this message because you are subscribed to the Google Groups
>> "Prometheus Developers" group.
>> To unsubscribe from this group and stop receiving emails from it, send an
>> email to [email protected].
>> To view this discussion on the web visit
>> https://groups.google.com/d/msgid/prometheus-developers/CABbyFmpuNnWrT2H6o2Vkpuuvhsa0mJ%2B5MKapUvhs2_0Vs_FZ4w%40mail.gmail.com
>> <https://groups.google.com/d/msgid/prometheus-developers/CABbyFmpuNnWrT2H6o2Vkpuuvhsa0mJ%2B5MKapUvhs2_0Vs_FZ4w%40mail.gmail.com?utm_medium=email&utm_source=footer>
>> .
>>
> --
> You received this message because you are subscribed to the Google Groups
> "Prometheus Developers" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/prometheus-developers/CAMV%3D_gbcesE1_Et0kXNLaj7Bz0BhCMhMMm9kXyb8Za17SaJx8g%40mail.gmail.com
> <https://groups.google.com/d/msgid/prometheus-developers/CAMV%3D_gbcesE1_Et0kXNLaj7Bz0BhCMhMMm9kXyb8Za17SaJx8g%40mail.gmail.com?utm_medium=email&utm_source=footer>
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"Prometheus Developers" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/prometheus-developers/CAFJ6V0qeOtM4f4HN4%2BMBUe%2BxicNnDQBnBWZxhGXwUGGdpxz41Q%40mail.gmail.com.

Reply via email to