mirror of
https://we.phorge.it/source/phorge.git
synced 2024-11-29 02:02:41 +01:00
5e0f218fe4
Summary: Ref T6240. Some discussion in that task. In instance/cluster environments, daemons need to make Conduit calls that bypass policy checks. We can't just let anyone add SSH keys with this capability to the web directly, because then an adminstrator could just add a key they own and start signing requests with it, bypassing policy checks. Add a `bin/almanac trust-key --id <x>` workflow for trusting keys. Only trusted keys can sign requests. Test Plan: - Generated a user key. - Generated a device key. - Trusted a device key. - Untrusted a device key. - Hit the various errors on trust/untrust. - Tried to edit a trusted key. {F236010} Reviewers: btrahan Reviewed By: btrahan Subscribers: epriestley Maniphest Tasks: T6240 Differential Revision: https://secure.phabricator.com/D10878
20 lines
555 B
PHP
20 lines
555 B
PHP
<?php
|
|
|
|
interface PhabricatorSSHPublicKeyInterface {
|
|
|
|
/**
|
|
* Provide a URI for SSH key workflows to return to after completing.
|
|
*
|
|
* When an actor adds, edits or deletes a public key, they'll be returned to
|
|
* this URI. For example, editing user keys returns the actor to the settings
|
|
* panel. Editing device keys returns the actor to the device page.
|
|
*/
|
|
public function getSSHPublicKeyManagementURI(PhabricatorUser $viewer);
|
|
|
|
|
|
/**
|
|
* Provide a default name for generated SSH keys.
|
|
*/
|
|
public function getSSHKeyDefaultName();
|
|
|
|
}
|