Hi Drago

On Tue, Mar 7, 2017 at 7:32 AM Drago Trusk <drago.tr...@gmail.com> wrote:

> Hi Pierre,
>
> it is understandable that people should use SSH keys, but if third party
> exposes non-SSH access then this becomes a problem.
>
Could you be more specific on this? I'd like to understand the exact use
case in order to see how we can support it the best.
Since we are currently designing the secret manager
<https://github.com/buildbot/buildbot/pull/2660/files>, and we need to
understand the usecases in details in order to implement it best.

Obfuscation of command (e.g. password) is nice, but if for whatever reason
> this command fails and writes sensitive information into stderr/stdout it
> will still be visible. Of course if worker is on Linux that can be piped
> and replaced (or through code itself).
>
Again, I am not sure what  you suggest as a solution for that?


> Since I'm provisioning my workers with SSH keys anyway I have sensitive
> information in gitconfig, but I just wanted to point out that use cases can
> happen in situations when someone doesn't have another choice.
>

I would be interrested to see what kind of gitconfig do you have, could you
please publish it (obviously with the sensitive information redacted) ?

Regards,
Pierre
_______________________________________________
users mailing list
users@buildbot.net
https://lists.buildbot.net/mailman/listinfo/users

Reply via email to