Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow unecrypted API keys in nuget.config #12354

Closed
wants to merge 7 commits into from

Conversation

zivkan
Copy link
Member

@zivkan zivkan commented Jan 10, 2023

Without this API keys saved in nuget.config files can't work on Linux and Mac, unless #1851 is implemented.

@zivkan zivkan requested a review from a team as a code owner January 10, 2023 13:18
@JonDouglas JonDouglas self-requested a review January 18, 2023 15:28
Copy link
Contributor

@JonDouglas JonDouglas left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Great spec. Straight to the point and unblocks other platforms. 🚢

@ghost ghost added the Status:No recent activity No recent activity. label Feb 19, 2023
@ghost
Copy link

ghost commented Feb 19, 2023

This PR has been automatically marked as stale because it has no activity for 30 days. It will be closed if no further activity occurs within another 15 days of this comment, unless it has a "Status:Do not auto close" label. If it is closed, you may reopen it anytime when you're ready again, as long as you don't delete the branch.

@ghost ghost closed this Mar 6, 2023
@zivkan zivkan reopened this Apr 3, 2023
@ghost ghost removed the Status:No recent activity No recent activity. label Apr 3, 2023
### Unencrypted secrets

Since the API key is a secret, providing a way to reduce security might not be desirable.
However, at the time that this design spec is being written, there is no alternative on Linux and Mac, making API keys in the `nuget.config` file a Windows-only feature, which is also not desirable.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is the Apple Keyring usable from the command line, or without user interaction? If that is possible then on an MacOS device put the credentials in the keyring, and allow the expanded spec to include something like location in the key syntax, and require either a value or a location.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Oops, I forgot to respond to this earlier. Perhaps I should change the "there are no alternatives" wording, but unfortunately I have zero experience with Mac since I was in high school, which was before OSX ever came out. All this to say I know nothing about Apple Keyring.

As the spec says elsewhere, we have a different issue to add encryption for Mac and Linux, and I hope that whoever researches/implements that will take Apple's Keyring into account: #1851


Enable unencrypted API keys in `nuget.config` files, so that they can be used on platforms other than Windows.

## Motivation
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Last week I had an idea which probably means that the benefit of allowing unencrypted API keys in nuget.config becomes close to zero. It would still be useful for customers who use Mac and Linux (until #1851 is implemented) and push packages with APIs from their dev box. But most of the feedback we got was from customers pushing in CI scripts and docker containers, so I think this will satisfy most people:

@ghost ghost added the Status:No recent activity No recent activity. label May 12, 2023
@ghost
Copy link

ghost commented May 12, 2023

This PR has been automatically marked as stale because it has no activity for 30 days. It will be closed if no further activity occurs within another 15 days of this comment, unless it has a "Status:Do not auto close" label. If it is closed, you may reopen it anytime when you're ready again, as long as you don't delete the branch.

@ghost ghost closed this May 27, 2023
This pull request was closed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Status:No recent activity No recent activity.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants