Consider allowing clients to push encrypted secrets via ssh #18
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
If I want to have something that can be wrapped by podman's secret system, then an ability to create secrets directly on the client would be nice.
This however breaks the current assumptions since those secrets will not be available on the admin interface or in the password database.
I don't want to connect the ssh interface to the admin interface either.
Some further thoughts:
This should be implemented, and would require the following model changes:
Client Secrets should have an external ID
Client Secrets should have some sort of foreign key to bind them to a secret in the admin interface.
This will allow us to differentiate them on the admin interface.
Clients should be viewed in a tree-view in admin frontend.
client1 | | - secret1 | - secret2 client2 | | - secret1 | - secret7Clients should be versioned
Clients should not be deleted. When the ssh key changes, a new client should be created and the old one marked obsolete.
They should still be available in the admin interface. The secrets should be retrievable somehow also.
The ssh key commands should be extended.
If following the podman shelldriver format, the commands should be this:
This seems doable too.
Provide example podman driver
In addition to the example client, an example podman driver should be provided.
The example client is not yet checked in, but should.
These could also be fetched via the ssh interface for easy bootstrap.
Scope of work
It's quite a big change, and involves changing quite a bit of the fundamentals.