Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Accept Datatype Sensitive for Secrets #668

Closed

Conversation

cocker-cc
Copy link

No description provided.

@lbetz lbetz added this to the v3.2.0 milestone Aug 20, 2021
@cla-bot
Copy link

cla-bot bot commented Sep 6, 2021

Thank you for your pull request. Before we can look at it, you'll need to sign a Contributor License Agreement (CLA).

Please follow instructions at https://icinga.com/company/contributor-agreement to sign the CLA.

After that, please reply here with a comment and we'll verify.

Contributors that have not signed yet: @cocker-cc

  • If you've already signed a CLA, it's possible we don't have your GitHub username or you're using a different email address. Please contact us if you think this is the case.

  • If you signed the CLA as a corporation, your GitHub username may not have been submitted to us. Please reach out to the responsible person in your organization.

@lbetz lbetz removed the enhancement label Sep 13, 2021
@lbetz lbetz removed this from the v3.2.0 milestone Sep 13, 2021
@lbetz
Copy link
Contributor

lbetz commented Sep 18, 2021

In these cases the data type Sensitive is superfluous because the passwords are made visible again with show_diff.

@cocker-cc
Copy link
Author

cocker-cc commented Sep 18, 2021

In these cases the data type Sensitive is superfluous because the passwords are made visible again with show_diff.

What do you mean by "in these cases"?

To make it clear: My main Goal is not to make Passwords invisible – although this is nice.

My Effort to make many Component-Modules sensitive-aware is: As an Author of Profile-Modules I do not want to fiddle with Sensitive and unwrap at all. My Passwords come out of Vault, and Vault returns Passwords as Sensitive[String]. I just want to pass over these Passwords to the Component-Modules without any further ado. I my World the Component-Modules "just have to work".

In an ideal World even the Component-Module should never use unwrap. In most Cases EPP-Files should be used instead of ERB-Files, because EPP itself is able to handle Sensitive natively.

@cla-bot
Copy link

cla-bot bot commented Sep 18, 2021

Thank you for your pull request. Before we can look at it, you'll need to sign a Contributor License Agreement (CLA).

Please follow instructions at https://icinga.com/company/contributor-agreement to sign the CLA.

After that, please reply here with a comment and we'll verify.

Contributors that have not signed yet: @cocker-cc

  • If you've already signed a CLA, it's possible we don't have your GitHub username or you're using a different email address. Please contact us if you think this is the case.

  • If you signed the CLA as a corporation, your GitHub username may not have been submitted to us. Please reach out to the responsible person in your organization.

@cocker-cc
Copy link
Author

I did a git rebase upstream/master && git push -f.

@lbetz
Copy link
Contributor

lbetz commented Sep 21, 2021

Thanks for your detailed explanation. Now I understand and will add your changes to the upcoming release. Fortunately I was able to hold myself back from a release.

@lbetz
Copy link
Contributor

lbetz commented Oct 22, 2021

What's about keys and certificates for TLS?

@cocker-cc
Copy link
Author

What's about keys and certificates for TLS?

I created this PR for the regsubst of SSL-Keys.

@lbetz
Copy link
Contributor

lbetz commented Oct 22, 2021

refs #689

@lbetz lbetz closed this Oct 22, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants