Skip to content

feat: support secret references and secret provider integrations for provider configs #58

@coderabbitai

Description

@coderabbitai

Overview

This issue tracks future enhancements to improve how sensitive credentials (e.g., api_key, AWS secret_access_key) are managed in provider configurations.

Background

Currently, the Admin API intentionally stores and returns raw credential values for provider configs (e.g., api_key for OpenAI-compatible providers and secret_access_key for Bedrock). This issue tracks improvements to support more secure credential management patterns.

Proposed Enhancements

1. Secret References

Support environment variable and secret manager reference syntax so credentials can be stored as references and resolved at runtime, e.g.:

  • $env://MY_API_KEY — resolved from environment variables
  • $secret://my-vault/api-key — resolved from a secret manager (e.g., HashiCorp Vault, AWS Secrets Manager)

2. Secret Provider Integrations

Integrate with external secret management systems to allow credentials to be fetched securely at runtime rather than stored directly in the config store.

References

Requested by @bzp2010

Metadata

Metadata

Assignees

Labels

No labels
No labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions