-
Notifications
You must be signed in to change notification settings - Fork 36
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
rad-profile: the rad-profile CLI library #728
Conversation
f4d94d2
to
fb03315
Compare
e4686e1
to
00e5d03
Compare
00e5d03
to
4c24357
Compare
4c24357
to
3a3196d
Compare
This is ready for some inspection 🕵️♀️ |
oh lol, what do we do for Windows? 😆 |
thrussh has no implementation for not(unix)
Is this because std doesn't export UNIX domain sockets under windows? That's
more a matter of policy it seems [0]. Oh look, a yak!
[0]: rust-lang/rust#56533
|
get tokio and smol to add the Windows support
Yeah right.
I think this is probably the point in time where we no longer pretend we could
support Windows eventually (outside WSL, that is). Or else, someone steps up to
become a maintainer for Windows-compat.
|
I think we can at least punt on this for now with a04a954, but ya it doesn't seem feasible with all of us working on unix based machines as well. The only other option I see is hiding all ssh-agent functionality behind a |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cool beans! Are we concerned that there are no destructive actions at the moment, e.g. profile delete
or ssh remove
?
Very good point. Aside: it's funny |
it's funny ssh-add can also delete a key
From the agent, which is ephemeral storage. Think of it more as "unload key".
I believe it was mentioned in RFC #682 that secure long term storage of key
material is still a concern.
|
Ya, good way of putting it. I was just musing about the name of
Long-term storage as well as rotation I would imagine |
a04a954
to
dd6af72
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🎤 🗑 📏 🛎
d232958
to
aa94d58
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This yak looks sufficiently shaved.
⛏ 📘 📙 🎠
aa94d58
to
5965a80
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
⚱ 🖨 🏺 🍂
Signed-off-by: Fintan Halpenny <fintan.halpenny@gmail.com>
Signed-off-by: Fintan Halpenny <fintan.halpenny@gmail.com>
Signed-off-by: Fintan Halpenny <fintan.halpenny@gmail.com>
With the changes to thrussh and radicle-keystore, we can now add a key to the ssh-agent. Signed-off-by: Fintan Halpenny <fintan.halpenny@gmail.com>
Using the clib library for getting a prompt and keystore. Signed-off-by: Fintan Halpenny <fintan.halpenny@gmail.com>
Signed-off-by: Fintan Halpenny <fintan.halpenny@gmail.com>
We punt on what runtime should be used in the library and leave it to the caller to decide. Signed-off-by: Fintan Halpenny <fintan.halpenny@gmail.com>
Signed-off-by: Fintan Halpenny <fintan.halpenny@gmail.com>
We add the rad-profile Args to the subcommands of rad-exe allowing the binary to call into the rad-profile functionality. Signed-off-by: Fintan Halpenny <fintan.halpenny@gmail.com>
5965a80
to
719b594
Compare
Currently
ssh_add
is a stub since there is some reworking inthrussh
required to get radicle-dev/radicle-keystore#17 in.