-
Notifications
You must be signed in to change notification settings - Fork 5.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Please support 'pillar:' URIs as source #18406
Comments
This would take so much pain out of distributing binary content, SSL/SSH keys or license files via pillars. |
Great idea. Thanks for the input. |
Just inlined a few long ssl certificates. Would be really nice to be able to keep them in the crt file and just handling them like salt:/// source files! +1 |
Nobody @saltstack is interested in bringing this to the community? |
+111111 |
I think the biggest reservation about this is the missing access restrictions as described here: #9569 (comment) We basically would need to have a way to selectively choose the directories allowed to be served to a particular minion. |
You would naturally still need a top file in which you grant access to files to specific minions/targets. |
@BABILEN I would restrict this to directories as the effort to do this for all specific file might be enormous and wouldn't scale very well. |
Another scenario covered here I'd like to see:
Currently, encrypting and inlining an SSL key produces a huge amount of lines within my YAML structure, which makes the YAML file rather unpleasant to manage/edit/handle. Once distributing SSL keys etc. is doable in the way suggested here, I'd also like to be able to use GPG encrypted files which are then encrypted by the renderer first. This is a similar way other protocols (e.g. |
@eliasp, yes. That would be quite nice indeed. In fact that's a wonderful idea! |
I do really need this functionality, please! What @eliasp said is exactly what is happening in reality and guess what i have 50 different password i need to share, a gpg key for each turns the YAML into an ugly file to look at. |
Any update on this? I'd also love to use such feature. |
This is a much better alternative:
IMHO this issue should be closed. |
The file_tree pillar conflates targeting and data unfortunately. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. If this issue is closed prematurely, please leave a comment and we will gladly reopen the issue. |
It is very common that one wants to distribute sensitive files to minions and not make that information available to all minions that are connected to the master. The only way to achieve that is to use something like:
and to reference that via
contents_pillar
. It would be absolutely fantastic if salt would supportpillar:
as source and a direct mapping from those URIs to a standardised location on the filesystem (with configurable prefix, git pillar support, .... naturally). Access to the files would be controlled via a top file again and the content of the file simply becomes the value of the dictionary that is returned.So, a location like
PILLAR_FILE_ROOT/foo/bar/private_key
could be accessed viapillar:///foo/bar/private_key
.Thank you!
The text was updated successfully, but these errors were encountered: