-
Notifications
You must be signed in to change notification settings - Fork 237
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Extension-generation needs adjustements #1957
Comments
One other thing here would be that the templates are becoming more dependent on the version of specter controlling the generation-process. It would be cool if we could get another cli-switch which would specify the version of specter, simply assuming that the dummy-repo has tags with that version (and maybe falling back to master if it doesn't). |
Hi @k9ert, I have a confusion... Like what data is encrypted and why encrypted data? |
It's here:
And it's not even true in the meantime. Because that flag is inherited, the current standard behaviour is, that the data is not encrypted. So making that optional and then setting the value somewhere here in the generation-process would be cool. For that, you would ask about that in the cli_ext.py and create an attribute in the extension_gen.py, adding it in the Environment (line 70) which will be relevant if the service.py (see link above) is rendered in line 107. It depends on whether you want to have encryption on how sensitive your data is. Labeling or something like that might not be that critical. In the Swan extension (where Keith invented the encryption), we obtained a token to swan which needed to kept secure as it's similiar to a password. So we encrypted the token with the password of the user. If the token is decrypted, it's only kept in memory. This has the disadvantage that if specter boots up anew, it doesn't have access to any of the encrypted data until the user is typing in his password. |
The extension-generation process is currently assuming you need encrypted userdata. That should get adjusted like this:
--encrypted-userdata
here: https://github.com/cryptoadvance/specter-desktop/blob/master/src/cryptoadvance/specter/cli/cli_ext.py#L39 (including adding it as a param to the method signature)ExtGen
instantiation and there ...Mind the different templating syntax. Those are "metatemplates" as they are creating templates which themself are later templates.
You can test it via using
--tmpl-fs-source
and checkout the dummy-project somewhere. Also i've created a small section about https://docs.specter.solutions/desktop/extensions/intro/#virtualenv-managementThe text was updated successfully, but these errors were encountered: