You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If I install systemd service then every environment variable defined in config file is available to any user on server.
How to reproduce:
Config file /etc/restic/profiles.yaml:
This issue was mentioned in #211 (comment), but since then #212 was implemented and all passwords are added from private config file to public service unit by default.
Is there a way to hide RESTIC_REPOSITORY, RESTIC_PASSWORD and AWS_SECRET_ACCESS_KEY for other users?
The text was updated successfully, but these errors were encountered:
Thanks a lot for the report. It is caused by the environment capture function.
As a workaround it can be configured not to capture env variables (see schedule-capture-environment). But we should actually fix it by encrypting the values.
If I install systemd service then every environment variable defined in config file is available to any user on server.
How to reproduce:
Config file
/etc/restic/profiles.yaml
:Install systemd service:
resticprofile schedule.schedule
.Run as any user:
systemctl cat [email protected]
:I expect the same issue with
AWS_ACCESS_KEY_ID
,AWS_SECRET_ACCESS_KEY
and any other environment variables:resticprofile/schedule/handler_systemd.go
Line 111 in 0598026
This issue was mentioned in #211 (comment), but since then #212 was implemented and all passwords are added from private config file to public service unit by default.
Is there a way to hide
RESTIC_REPOSITORY
,RESTIC_PASSWORD
andAWS_SECRET_ACCESS_KEY
for other users?The text was updated successfully, but these errors were encountered: