-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Close the loop: less privileged keys #5
Comments
I second this. If there's an API support, I will implement it in the secrets plugin. |
This question has been relayed to the Packet API engineering team for review. Thanks for the detailed use case - I'll update as I have news. |
Here is a slightly more specific example of my workflow:
|
Reviewing this again as a part of our audit of Packet integrations. |
🙏 🙏 🙏 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Right now, Packet has a very limited set of ACL options for keys.
A read-write API key can make new read-write API keys.
As it is, this secrets engine is already valuable by making my secrets dynamic, and I can easily identify keys which shouldn't exist.
To fully close the loop and make this engine really good:
Maybe this could look like the Packet API accepting a basic "policy document" which I can provide to the secret engine. To start with:
The text was updated successfully, but these errors were encountered: