Skip to content

Server Explorer #119

@mvhenderson

Description

@mvhenderson

I would prefer not to store username/password in plain text files, especially ones that could get checked into source control by accident.

This isn't an issue specific to this extension - most extensions needing credentials or API tokens face this issue. (A notable exception is the git extension which is able to leverage the ssh-agent) The VSCode issues list has many items related to this, but no consensus on a "secure token" API.

As a stop-gap I propose adding a "server manager" node to vscode-objectscript settings. Something like this:

{
	"objectscript.servers": {
		"REMOTE": {
			"host": "example.com",
			"port": 50443,
			"username": "devel",
			"password": "secret",
			"https": true
		},
		"LOCAL": {
			"host": "localhost",
			"port": 57772,
			"username": "_SYSTEM",
			"password": "SYS",
			"https": false
		}
	}
}

If this is limited to core ~/.vscode/settings.json and not overridable by workspace/folder it would reduce the chance of credentials leaking via SCM. Then .code-workspace files could reference these servers:

{
	"folders": [
		{
			"name": "local",
			"path": "."
		},{
			"uri": "isfs://${REMOTE}?ns=USER",   //pseudo template string
			"name": "remote"
		}
	],
	"settings": {
		"objectscript.conn": {
			"active": true,
			"ns": "USER",
			"server": "LOCAL"   //explicit server name key
		}
	}
}

Metadata

Metadata

Assignees

Labels

No labels
No labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions