-
Notifications
You must be signed in to change notification settings - Fork 138
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Replication secret encrypted in Web-UI #2759
Comments
Ongoing progress with this issue: We already special case our auto-created But for out |
Special-case our internal cliapp re secret availability. Indicate all non-internal Access Key secrets as only available during creation. ## Includes - Surfacing our pass/PGP encrypted raw secret to authenticated Web-UI logins. - Indicate all other API credentials as not available. - Brevity improvements re deletion attempt on cliapp message.
…pted-in-Web-UI Replication secret encrypted in Web-UI #2759
Closing as: |
Prior to "Update django-oauth-toolkit #2710" #2727 we stored our CLI app secret in the database: and exposed that value within the Web-UI (to admin Web-UI users) for use in replication. However the linked PR introduced a replication regression contextualised in "Replication regressions #2748".
It is proposed that, given the recent resolution of:
Issue: "Adopt dedicated secrets management library" #2728
PR: "Adopt dedicated secrets management library #2728" #2758
has again returned us to an install static CLIENT_SERCRET, we can approach the issue of surfacing this secret within the Web-UI again, and not in its current hashed form: an artifact of upstream changes in django-oauth-toolkit.
The text was updated successfully, but these errors were encountered: