-
Notifications
You must be signed in to change notification settings - Fork 510
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cleanup import-export and key architecture #806
Comments
Maybe we should put on a label like But since it was not on a v1.0 yet, it's fine to do so. |
@HuKeping great idea! Will create and add the label now |
@HuKeping @andrewhsu I've been talking with the team here at Docker and we think an easy way to re-implement import/export is to use Export will pack all the keys being exported into a single I propose the following command formats:
All |
Sounds good and I also think the scenario that wants to export all keys of one gun and one/two keys of another is not that common. |
#806 Part 3: Reimplement import export
Thought there was an issue, apparently not. As discussed in the past, key storage should be cleaned up to have clear logical divisions. At the top level, a
CryptoService
should deal in operations: sign, create, etc...trustmanager.KeyStore
should speak Public/PrivateKey objects, and thetrustmanager.Storage
interface should speak in[]byte
.Import/Export should then operate against a either the
KeyStore
, orStorage
interface (TBD, based on password requirements).We're going to go about cleaning this up in 3 steps as trying to do it all at once turned into a big mess that prevented me getting it commited last time. In order the steps are:
The text was updated successfully, but these errors were encountered: