Skip to content

Allow the OIDC extension client secret to be provided by an Environment Variable #35897

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
biggles007 opened this issue Oct 21, 2024 · 4 comments
Labels
enhancement New feature or request extension/oidcauth needs triage New item requiring triage Stale

Comments

@biggles007
Copy link

Component(s)

extension/oidcauth

Is your feature request related to a problem? Please describe.

Allowing the simple rotation of client secrets in the oidcauth extension at scale in cloud deployments

Describe the solution you'd like

Many aspects of the OTEL SDK are configurable through environment variables, extending this to the oidcauth extension would allow the simple rotation of secrets at large scale. For example, Azure Functions/App Service allow for Key Vault secrets to be passed in through environment variables, these can be rotated in the Key Vault and will then be refreshed within 24 hours.

Describe alternatives you've considered

I'm aware the _file option could be used, but there is no ability to change files easily in many cloud services once they have been deployed.

Additional context

No response

@biggles007 biggles007 added enhancement New feature or request needs triage New item requiring triage labels Oct 21, 2024
Copy link
Contributor

Pinging code owners:

See Adding Labels via Comments if you do not have permissions to add labels yourself.

@jpkrohling
Copy link
Member

jpkrohling commented Dec 2, 2024

I'm sorry, but I'm not fully grasping what's being requested here. The OIDC Auth Extension is a server authenticator, to be used in receivers. It will read a token from a request and validate it against the provided auth server. There's no secret as part of the configuration of this component.

Did you have the bearer token auth extension in mind? If so, wouldn't something like this work for you?

  bearertokenauth:
    token: "${env:MY_BEARER_TOKEN}"

This would still require a restart of the process (pod) for new values to be applied, but that's true for env vars in general, not only for this component.

Copy link
Contributor

github-actions bot commented Feb 3, 2025

This issue has been inactive for 60 days. It will be closed in 60 days if there is no activity. To ping code owners by adding a component label, see Adding Labels via Comments, or if you are unsure of which component this issue relates to, please ping @open-telemetry/collector-contrib-triagers. If this issue is still relevant, please ping the code owners or leave a comment explaining why it is still relevant. Otherwise, please close it.

Pinging code owners:

See Adding Labels via Comments if you do not have permissions to add labels yourself.

@atoulme
Copy link
Contributor

atoulme commented Feb 21, 2025

Closing as not planned, please reopen if you want to talk about this more, @biggles007

@atoulme atoulme closed this as not planned Won't fix, can't repro, duplicate, stale Feb 21, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request extension/oidcauth needs triage New item requiring triage Stale
Projects
None yet
Development

No branches or pull requests

3 participants