Replies: 3 comments 3 replies
-
It's not mentioned here, but the addition of a password field type to the In our use case, our users don't use the Otherwise, these changes are definitely a move in the right direction. |
Beta Was this translation helpful? Give feedback.
-
Nice. // devcontainer.json
// [...]
"secrets": {
"JF_TOKEN": {
"description": "Jfrog artifactory token used by the post-start script.",
"documentationUrl": "..."
},
"FOO_API_SECRET": {
"description": "The required api key to target service foo..."
"documentationUrl": "..."
}
} |
Beta Was this translation helpful? Give feedback.
-
Storing of secrets should be permitted by administrator on each scope |
Beta Was this translation helpful? Give feedback.
-
💥 Problem
Developers often store sensitive information, such as API keys and tokens, insecurely, using plaintext files or chat communications. This practice leads to poor control, lack of visibility, and no audit trail.
Additionally, as noted in Issue #7087, there is a need for a user-level secrets management system. While third-party solutions like HashiCorp Vault and AWS Secrets Manager offer powerful features, they can be complex due to the management of authentication. A native solution in Coder could simplify this process, balancing security and usability.
✅ Solution
Coder will support built-in secrets with 3 scopes:
Secrets can be:
coder secret set
)coder secret get
🔧 CLI Examples
# List secrets $ coder secret list NAME UPDATED MY_API_KEY 2 days ago VERCEL_TOKEN 10 days ago
🖥️ UI Sneak Peek
Secrets will also be configurable via the web UI (Account, Template, Org):
🔍 Auditing (Premium)
All secret usage (set, get, inject) will be logged with:
Example:
💬 Feedback Wanted
coder secret get
and script it out?Let us know what you think!
Beta Was this translation helpful? Give feedback.
All reactions