-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
dynatraceexporter: Add warning to user for insecure storage of user credentials at rest #2231
Comments
Thanks for bringing this up @alolita. |
Adds the ability for components to use environment variables in string fields in the default configuration returned by `CreateDefaultConfig`. These fields get expanded when the component is loaded, in the same way the fields of configuration yaml files are (`$FOO` is replaced by the value of the `FOO` environment variable, `$$FOO` is replaced by `$FOO`, `$$$FOO` is replaced by `$`followed by the contents of `FOO`). For instance, if `CreateDefaultConfig` of a component returns: ``` &Config{ ... TagsConfig: &TagsConfig{ Env: "$DD_ENV", } ... } ``` and the `DD_ENV` environment variable is set to `prod`, then the resulting struct will contain: ``` &Config{ ... TagsConfig: &TagsConfig{ Env: "prod", } ... } ``` **Note:** The default config is expanded _before_ it's merged with the user-provided config, so as to not mess with the latter. **Link to tracking Issue:** n/a **Testing:** Added unit tests to check that the variable expansion works, and that it doesn't crash in edge cases (unexported private fields that can't be modified, uninitialised config object). Tested behavior with the Datadog exporter.
Is your feature request related to a problem? Please describe.
When using the the dynatraceexporter to connect with the vendor backend service the user has to input API tokens in plain text which is exposed at rest. This is a security exposure that needs to be communicated to the user.
Describe the solution you'd like
The solution proposed includes -
Additional context
Unit tests exist for checking unauthorized access but these tests are not enough for an user to understand this security risk. See related unit test -
https://github.com/open-telemetry/opentelemetry-collector-contrib/blob/main/exporter/dynatraceexporter/metrics_exporter_test.go#L29
The text was updated successfully, but these errors were encountered: