You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently there's a manual process that requires exec ing into the docker container. Would be helpful to have an endpoint for this, although it would require also dealing with some kind of authentication so may be low priority.
It's possible we could do this by requiring a higher-level API key that is still manually authored so we don't need a full auth system.
The text was updated successfully, but these errors were encountered:
Maybe a docker exec w/o /bin/bash would still feel easier/more robust
does it need a real endpoint, and if so, how do we get it secured, with our limited security knowledge?
Can we see how other similar systems are secured and how API keys are managed?
Note: we are thinking about how to make this easier to restore in event of a failure and to simplify the steps so they are as self-documenting as possible (avoid errors when trying to follow steps). But also we think we're going to have at most 3-4 new API keys deployed in a year.
Currently there's a manual process that requires
exec
ing into the docker container. Would be helpful to have an endpoint for this, although it would require also dealing with some kind of authentication so may be low priority.It's possible we could do this by requiring a higher-level API key that is still manually authored so we don't need a full auth system.
The text was updated successfully, but these errors were encountered: