Page MenuHomePhabricator

Allow device SSH keys to be trusted
ClosedPublic

Authored by epriestley on Nov 19 2014, 10:35 PM.
Tags
None
Referenced Files
F18815841: D10878.id.diff
Tue, Oct 21, 3:57 AM
F18746121: D10878.id26126.diff
Fri, Oct 3, 11:22 AM
F18730547: D10878.id26124.diff
Tue, Sep 30, 1:17 PM
F18702166: D10878.id26152.diff
Sat, Sep 27, 10:53 PM
F18701143: D10878.id26152.diff
Sat, Sep 27, 5:37 PM
F18651169: D10878.id26124.diff
Sep 21 2025, 3:20 AM
F18622717: D10878.diff
Sep 15 2025, 12:45 PM
F18621946: D10878.id.diff
Sep 15 2025, 9:59 AM
Subscribers

Details

Summary

Ref T6240. Some discussion in that task. In instance/cluster environments, daemons need to make Conduit calls that bypass policy checks.

We can't just let anyone add SSH keys with this capability to the web directly, because then an adminstrator could just add a key they own and start signing requests with it, bypassing policy checks.

Add a bin/almanac trust-key --id <x> workflow for trusting keys. Only trusted keys can sign requests.

Test Plan
  • Generated a user key.
  • Generated a device key.
  • Trusted a device key.
  • Untrusted a device key.
  • Hit the various errors on trust/untrust.
  • Tried to edit a trusted key.

Screen_Shot_2014-11-19_at_2.34.54_PM.png (143×976 px, 31 KB)

Diff Detail

Repository
rP Phabricator
Lint
Lint Not Applicable
Unit
Tests Not Applicable

Event Timeline

epriestley retitled this revision from to Allow device SSH keys to be trusted.
epriestley updated this object.
epriestley edited the test plan for this revision. (Show Details)
epriestley added a reviewer: btrahan.
  • Fix a pht() string to print information more clearly.
btrahan edited edge metadata.
This revision is now accepted and ready to land.Nov 19 2014, 10:43 PM
This revision was automatically updated to reflect the committed changes.