Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vault merge conflicts and vault pull/clone edge cases #162

Closed
scottmmorris opened this issue May 27, 2021 · 3 comments
Closed

Vault merge conflicts and vault pull/clone edge cases #162

scottmmorris opened this issue May 27, 2021 · 3 comments
Assignees
Labels
development Standard development r&d:polykey:core activity 1 Secret Vault Sharing and Secret History Management

Comments

@scottmmorris
Copy link
Contributor

scottmmorris commented May 27, 2021

When pulling changes for a vault, if merge conflicts arise, they need to be rejected at this stage as there is no ability for users to resolve the merge conflicts

Also, the edge cases for vault cloning and pulling need to be considered. For example, if a user clones a vault and while pulling from the vault the git history does not match the expected results this should be rejected

Additional Context

@CMCDragonkai CMCDragonkai added design Requires design development Standard development and removed development Standard development design Requires design labels Jul 3, 2021
@CMCDragonkai
Copy link
Member

CMCDragonkai commented Aug 25, 2021

Regarding the COW idea for mutating pulled vaults. I want to point to these relevant links:

We won't be able to do this feature before release, but we can go into a new epic.

First we have to decide if we are using branches or "forks". I reckon forks makes more sense here, since it's not expected that the changes are merged back to the same git repository or in this case vault. Branches by itself seems to have limited usecase to secrets management, and it's unclear whether there would ever be a need to create a branch for a vault. Unless it was a matter of trying out a different secret but even then this would be strange.

Then once you have a "fork", the opposite would be a "join". One could imagine vault joining which could be useful as a way to merge separate vaults together into one vault.

Note that however forking and joining are sort of one-off operations, history isn't automatically synchronised unlike branches. Since we are expecting zero merge conflicts #172, it eliminating branches and enforcing this COW idea is correct for single vaults. But once you have forked, the ability to auto sync is not possible. And neither is a vault join sort of operation going to create a vault that always updates based on changes of its upstream vaults. But this is something worth testing with respect to secret-management workflows.

@CMCDragonkai
Copy link
Member

Done by the merging of vaultsrefactoring: https://gitlab.com/MatrixAI/Engineering/Polykey/js-polykey/-/merge_requests/205

@CMCDragonkai
Copy link
Member

Reference docs to be updated here: https://github.com/MatrixAI/js-polykey/issues/258

@CMCDragonkai CMCDragonkai added the r&d:polykey:core activity 1 Secret Vault Sharing and Secret History Management label Jul 24, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
development Standard development r&d:polykey:core activity 1 Secret Vault Sharing and Secret History Management
Development

No branches or pull requests

3 participants