Open nickfla1 opened 5 months ago
If you second this proposal I am more than open to directly contribute to its implementation!
Authentication: Bearer
![image](https://github.com/louislam/uptime-kuma/assets/26258709/236ad15a-753f-4fc1-a310-3681288c6fad)
Would accept a PR implementing Bearer Auth as an alternative to Basic Auth.
Authentication: Bearer
We already handle this for the auth methods we currently support Would accept a PR implementing Bearer Auth as an alternative to Basic Auth.
I can work on that in the next few days
About the url templating, I am not entirely sold. Don't think this solves your issue. I mean, if you want to protect the secrets from other people you share the password with.. They could simply change the url to be https://webhook.site and extract the secret via that.
About the url templating, I am not entirely sold. Don't think this solves your issue. I mean, if you want to protect the secrets from other people you share the password with.. They could simply change the url to be https://webhook.site and extract the secret via that.
I'm not sure I'm following, wouldn't the template be compiled when the Kuma is invoking my configured monitor? How could anyone intercept that?
I admin that I'm yet to figure out how I'd implement it within Kuma
Would accept a PR implementing Bearer Auth as an alternative to Basic Auth.
Also, reconsidering, this wouldn't work for my use-case as we use custom headers as API keys
Let's assume you first have a monitor pointing to https://example.com?key={{secret.key}}
then the attacker with your admin credentials changes it to webhook.site/...?key={{secret.key}}
.
Now the attacker has your secret, the same was as if he had read it in the UI.
Let's assume you first have a monitor pointing to
https://example.com?key={{secret.key}}
then the attacker with your admin credentials changes it towebhook.site/...?key={{secret.key}}
.Now the attacker has your secret, the same was as if he had read it in the UI.
Ah now I get it! Yes of course that could be an attack vector, thought if they have admin access that's not a lot we can do anyway.
To be more clear on our use case, we'd like read only users to not see some api keys in headers and query strings that now have to be set as plain text, it wouldn't solve any security issue in case of compromised admin access.
I think it might be useful to other Kuma's users as well
Readonly users is tracked in https://github.com/louislam/uptime-kuma/issues/1322 and at the moment quite gridlocked.
If you want to help said feature along, you can review https://github.com/louislam/uptime-kuma/pull/3571 or test said PR via this https://github.com/louislam/uptime-kuma/wiki/Test-Pull-Requests method
Even though they're in progress, do you think read-only users will be able to see URLs, request bodies and headers clearly? If so I think my question still applies!
I'll probably work on the "Bearer" authorization PR anyway as I think it will improve the project, even though we don't use that authentication mechanism
How fleshed out the permission system will be has not been defined. Fleshing it out does not really make sense spending maintainer time on unless we have #3571 reviewed and tested.
π I have found these related issues/pull requests
I was unable to find any related issue.
π·οΈ Feature Request Type
New monitor, Change to existing monitor
π Feature description
It should be possible to manage secret keys/values and use them inside URLs, headers and Authentication methods without showing them in the dashboard as plain text.
βοΈ Solution
We should be able to manage secrets via a dedicated settings section. I don't believe it would be necessary to allow for a full CRUD interface, Create and Delete should be enough.
Each key should have an unique name which can be referenced inside URLs and Headers:
or
β Alternatives
No response
π Additional Context
Showing plain text keys or secrets is always a security concern, sometimes even in the same organization you don't want to be so open about who can easily read those values.