From: "Lukas Wagner" <l.wagner@proxmox.com>
To: "Proxmox Datacenter Manager development discussion"
<pdm-devel@lists.proxmox.com>,
"Fabian Grünbichler" <f.gruenbichler@proxmox.com>
Subject: Re: [pdm-devel] [PATCH datacenter-manager 3/3] remote config: shadow token secrets when saving
Date: Mon, 01 Dec 2025 15:39:57 +0100 [thread overview]
Message-ID: <DEMYHRJSNFEW.34855FZSQ14GS@proxmox.com> (raw)
In-Reply-To: <20251201092941.291325-4-f.gruenbichler@proxmox.com>
On Mon Dec 1, 2025 at 10:29 AM CET, Fabian Grünbichler wrote:
> but only if the to-be-saved config contains at least one non-shadowed entry, to
> avoid unnecessary work.
>
> Signed-off-by: Fabian Grünbichler <f.gruenbichler@proxmox.com>
> ---
> lib/pdm-config/src/remotes.rs | 39 +++++++++++++++++++++++++++++++++--
> 1 file changed, 37 insertions(+), 2 deletions(-)
>
> diff --git a/lib/pdm-config/src/remotes.rs b/lib/pdm-config/src/remotes.rs
> index 93f80eb..677981f 100644
> --- a/lib/pdm-config/src/remotes.rs
> +++ b/lib/pdm-config/src/remotes.rs
> @@ -3,7 +3,7 @@
> //! Make sure to call [`init`] to inject a concrete `RemoteConfig` instance
> //! before calling the [`lock_config`], [`config`] or [`save_config`] functions.
>
> -use std::sync::OnceLock;
> +use std::{collections::HashMap, sync::OnceLock};
>
> use anyhow::{bail, Error};
>
> @@ -86,7 +86,42 @@ impl RemoteConfig for DefaultRemoteConfig {
> Ok((data, digest.into()))
> }
>
> - fn save_config(&self, config: SectionConfigData<Remote>) -> Result<(), Error> {
> + fn save_config(&self, mut config: SectionConfigData<Remote>) -> Result<(), Error> {
> + let mut new_shadow_entries = HashMap::new();
> + for (id, remote) in config.iter() {
> + if remote.token != "-" {
> + new_shadow_entries.insert(
> + id.to_string(),
> + RemoteShadow {
> + ty: remote.ty,
> + id: remote.id.clone(),
> + token: remote.token.clone(),
> + },
> + );
> + }
> + }
> +
> + // only read and modify shadow config if needed
> + if !new_shadow_entries.is_empty() {
> + let shadow_content =
> + proxmox_sys::fs::file_read_optional_string(REMOTES_SHADOW_FILENAME)?
> + .unwrap_or_default();
> +
> + let mut shadow_config =
> + RemoteShadow::parse_section_config(REMOTES_SHADOW_FILENAME, &shadow_content)?;
> +
> + for (id, shadow_entry) in new_shadow_entries.into_iter() {
> + if let Some(remote) = config.get_mut(&id) {
> + remote.token = '-'.to_string();
> + }
> + shadow_config.insert(id, shadow_entry);
> + }
> + let raw = RemoteShadow::write_section_config(REMOTES_SHADOW_FILENAME, &shadow_config)?;
> + replace_config(REMOTES_SHADOW_FILENAME, raw.as_bytes())?;
> + }
> +
> + // only write out remote.cfg with potentially new shadowed entries
> + // if shadow file was successfully written!
> let raw = Remote::write_section_config(REMOTES_CFG_FILENAME, &config)?;
> replace_config(REMOTES_CFG_FILENAME, raw.as_bytes())
> }
Right we don't clean up tokens secrets for remotes that have been
removed. I guess we could 'garbage-collect' the shadow file when saving,
removing all entries that don't have a matching section in remotes.cfg?
_______________________________________________
pdm-devel mailing list
pdm-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pdm-devel
next prev parent reply other threads:[~2025-12-01 14:40 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-12-01 9:29 [pdm-devel] [PATCH datacenter-manager 0/3] token secret shadow config Fabian Grünbichler
2025-12-01 9:29 ` [pdm-devel] [PATCH datacenter-manager 1/3] remote config: let save_config take ownership Fabian Grünbichler
2025-12-01 9:29 ` [pdm-devel] [PATCH datacenter-manager 2/3] remote config: get token secret from shadow file if shadowed Fabian Grünbichler
2025-12-01 9:29 ` [pdm-devel] [PATCH datacenter-manager 3/3] remote config: shadow token secrets when saving Fabian Grünbichler
2025-12-01 14:39 ` Lukas Wagner [this message]
2025-12-01 14:46 ` [pdm-devel] [PATCH datacenter-manager 0/3] token secret shadow config Lukas Wagner
2025-12-01 16:44 ` [pdm-devel] applied: " Thomas Lamprecht
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=DEMYHRJSNFEW.34855FZSQ14GS@proxmox.com \
--to=l.wagner@proxmox.com \
--cc=f.gruenbichler@proxmox.com \
--cc=pdm-devel@lists.proxmox.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox