Description
Is your feature request related to a problem? Please describe.
This feature appeared a while ago. When I go to vault I'm reminded that authenticated users can now save secret data as a plaintext file. I'm not sure how this feature made it into vault /ui/ but giving users the ability to save any secret they want onto a potentially unmanaged and unencrypted machine with one click and no protection on said secret isn't wonderful. Monitoring the Network tab under Developer Tools reveals that the Vault web client doesn't reach out with another API call and instead just saves what it has in memory with JS.
Describe the solution you'd like
A per-kv-engine or policy option to disable the download button feature on kv secret values.
Describe alternatives you've considered
Removing this feature.
Explain any additional use-cases
I cannot think of any good reason for Vault to offer users the opportunity of exporting secrets as a plaintext files in their Downloads folder.
Additional context
Searching online returns no results relating to this secret download feature or any discussion about it. A little confusing while searching for ways to disable the feature or learn more about it such as the release it were added in or relevant documentation. It appears to be part of ui/lib/core/addon/components/masked-input.hbs
with relevant commits 01d5d1d, 43258c2, 88ed074, b5e82f5 and even includes a line {{#if @allowDownload}}
though I cannot seem to find documentation about this feature with my poor searching skills.
Activity