8000 Use secrets in operators by IyeOnline · Pull Request #5197 · tenzir/tenzir · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

Use secrets in operators #5197

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 27 commits into from
Jun 30, 2025
Merged

Use secrets in operators #5197

merged 27 commits into from
Jun 30, 2025

Conversation

IyeOnline
Copy link
Contributor
@IyeOnline IyeOnline commented May 14, 2025

This is the followup to #5065, actually making use of secrets in operators.

Outstanding operators/connectors:

@raxyte:

  • from_http
  • http (transform)
  • from_opensearch (nothing to be done)
  • from_velociraptor (nothing to be done)
  • AMQP (load/save)

@IyeOnline:

  • ABS (load/save)
  • CURL-based (http&ftp load/save)
  • save_email
  • google_cloud_pub_sub (load/save) (nothing to be done)
  • GCS (load/save)
  • S3 (load/save)
  • Kafka (options record may contain secrets)
  • from_file
  • fluent-bit (load/save)
  • to_asl
  • to_azure_log_analytics
  • to_clickhouse
  • to_google_secops
  • to_google_cloud_logging
  • to_opensearch
  • to_snowflake
  • to_splunk (done in the initial PR as a test)

Operators not currently considered:

  • to_hive (postponed because of upcomming rewrite)
  • load_file/save_file (local path)
  • SQS (queue name)
  • TCP/UDP (local endpoint)
  • ZMQ (local endpoint)

@IyeOnline IyeOnline added the connector Loader and saver label May 15, 2025
@IyeOnline IyeOnline force-pushed the topic/secrets branch 2 times, most recently from ed24e41 to 6709515 Compare May 19, 2025 10:22
@IyeOnline IyeOnline force-pushed the topic/secrets-in-operators branch from 8868984 to 6d62550 Compare May 20, 2025 15:22
@IyeOnline IyeOnline force-pushed the topic/secrets-in-operators branch from 6d62550 to 7046d7e Compare May 20, 2025 18:46
IyeOnline added a commit that referenced this pull request May 21, 2025
Since we merge secrets without any support in operators, we enable
`tenzir.legacy-secret-model` by default for now. This also reverts/hides
all docs and changelog entries, which will be in
#5197
@IyeOnline IyeOnline force-pushed the topic/secrets-in-operators branch from 7046d7e to 859c64d Compare May 21, 2025 08:14
Base automatically changed from topic/secrets to main May 21, 2025 10:26
IyeOnline added a commit that referenced this pull request May 21, 2025
This adds a first class `secret` type to the TQL language that can
"store" secrets.

- See tenzir/issues#2781

The feature is currently disabled by default, to be re-enabled
#5197
@IyeOnline IyeOnline force-pushed the topic/secrets-in-operators branch from 7d037b7 to 32a0298 Compare June 3, 2025 09:09
Copy link
github-actions bot commented Jun 3, 2025

📚 Documentation Preview

🧹 Preview deployment has been cleaned up

The documentation preview for this PR has been removed since the PR was closed.

@IyeOnline IyeOnline force-pushed the topic/secrets-in-operators branch from 2cf3c39 to eb7d4f0 Compare June 3, 2025 16:01
@raxyte raxyte force-pushed the topic/secrets-in-operators branch from eb7d4f0 to 4a492a0 Compare June 4, 2025 10:00
@IyeOnline IyeOnline force-pushed the topic/secrets-in-operators branch 10 times, most recently from 8a36350 to edf2377 Compare June 10, 2025 12:04
@raxyte raxyte force-pushed the topic/secrets-in-operators branch 2 times, most recently from c6c55bc to 481520b Compare June 10, 2025 14:24
@IyeOnline IyeOnline force-pushed the topic/secrets-in-operators branch 2 times, most recently from dab2787 to 943ae99 Compare June 11, 2025 11:31
@raxyte raxyte force-pushed the topic/secrets-in-operators branch from 943ae99 to 944e0d2 Compare June 11, 2025 12:49
IyeOnline and others added 12 commits June 26, 2025 17:42
Includes `save_azure_blob_storage`
A format expression containing a `secret` will yield a `secret`.
Secret censoring now happens in the execution node's diagnostic handler.
This has the advantage, that we cannot forget it. In order to not be
overly aggressive, it now only censors the full values of managed secrets,
ignoring incomplete parts.
This now enforces yielding and ensures the error cases are safe by not
re-scheduling if a callback fails.
@IyeOnline IyeOnline force-pushed the topic/secrets-in-operators branch 6 times, most recently from c34b0d6 to 7ce3dbb Compare June 27, 2025 13:45
This also removes the TQL1 `python` operator.
This also removes the TQL1 `shell` and `apply` operators and ports tests
that used these to TQL2.
@IyeOnline IyeOnline force-pushed the topic/secrets-in-operators branch from 7ce3dbb to 34a92dd Compare June 27, 2025 16:13
@IyeOnline IyeOnline enabled auto-merge June 30, 2025 11:36
@IyeOnline IyeOnline merged commit 9938a14 into main Jun 30, 2025
60 checks passed
@IyeOnline IyeOnline deleted the topic/secrets-in-operators branch June 30, 2025 21:52
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
connector Loader and saver
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants
0