Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

copr-cli command to renew API token #2034

Open
fedora-copr-github-bot opened this issue Nov 18, 2022 · 1 comment
Open

copr-cli command to renew API token #2034

fedora-copr-github-bot opened this issue Nov 18, 2022 · 1 comment
Labels
RFE Enhancement, feature requests

Comments

@fedora-copr-github-bot
Copy link
Collaborator

fedora-copr-github-bot commented Nov 18, 2022

Original issue: https://pagure.io/copr/copr/issue/2034
Opened: 2022-01-11 23:09:29
Opened by: brianjmurrell

For automated build systems, it's a pain for an admin to have to stop what he is doing and renew the COPR API token every 6 months. But I can appreciate you wanting to cycle them with some frequency and allow tokens that are not still in use to expire.

Given those requirements, it would be useful if there were a copr-cli command to renew a token given a valid token.

Automated build systems then could simply copr-cli renew the token every (i.e. 5 months) using the existing valid token.


praiskup commented at 2022-01-17 13:37:29:

Per discussion on the meeting today:

  • using the kerberos AUTH, this would be pretty trivial (once krb is implemented)
  • we could alternatively allow API tokens with longer validity (using a web form), as we manually did several times before

Also, as a security feature, we should display the token only once in web-UI, when created (this is a pretty common thing in other services).

@fedora-copr-github-bot fedora-copr-github-bot added the RFE Enhancement, feature requests label Nov 22, 2022
@brianjmurrell
Copy link

using the kerberos AUTH, this would be pretty trivial (once krb is implemented)

Could you elaborate on this? AFAIU, kerberos tickets have a finite lifetime also. Typically one gets a ticket with a relatively short life-time (say, 24h) but with a renewal period that is longer (say, 30 days). But ultimately, once the renewal life-time is up, kerberos requires the user to enter their password again to start the process over again.

Unless you are referring to service tickets, but then I'm not sure why those would be any better than ...

we could alternatively allow API tokens with longer validity (using a web form), as we manually did several times before

Why not a possible infinite expiry like other services do with their access tokens. GitHub for example understand that these tokens can go into automated (i.e. CI) systems and having those systems break simply because a token has expired is just not nice at all.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
RFE Enhancement, feature requests
Projects
Status: In 2 years
Development

No branches or pull requests

2 participants