-
Notifications
You must be signed in to change notification settings - Fork 52
Description
I would prefer not to store username/password in plain text files, especially ones that could get checked into source control by accident.
This isn't an issue specific to this extension - most extensions needing credentials or API tokens face this issue. (A notable exception is the git extension which is able to leverage the ssh-agent) The VSCode issues list has many items related to this, but no consensus on a "secure token" API.
As a stop-gap I propose adding a "server manager" node to vscode-objectscript settings. Something like this:
{
"objectscript.servers": {
"REMOTE": {
"host": "example.com",
"port": 50443,
"username": "devel",
"password": "secret",
"https": true
},
"LOCAL": {
"host": "localhost",
"port": 57772,
"username": "_SYSTEM",
"password": "SYS",
"https": false
}
}
}If this is limited to core ~/.vscode/settings.json and not overridable by workspace/folder it would reduce the chance of credentials leaking via SCM. Then .code-workspace files could reference these servers:
{
"folders": [
{
"name": "local",
"path": "."
},{
"uri": "isfs://${REMOTE}?ns=USER", //pseudo template string
"name": "remote"
}
],
"settings": {
"objectscript.conn": {
"active": true,
"ns": "USER",
"server": "LOCAL" //explicit server name key
}
}
}