-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
commonhealth-cloud-client feedback #12
Comments
One more important one that I forgot to mention:
It would be super handy if we could launch user servers with some environment variables defined and the client objects would initialize with the right values. We can work around this easily enough in the short term by initializing objects in startup files and/or providing custom subclasses that load defaults from our own known locations, but since these classes needs lots of input arguments that need to come from the Hub, providing it to users so they don't have to enter them all will be valuable. |
Good point. We could provide default values that could be updated via passed in environment variables. |
I also noticed that the Python package pins exact dependencies. This is generally fine for applications, but can be a problem for libraries that may share an env with other packages. Usually, the best way to do this is to specify your loose version requirements in the package (e.g. This pinning is an impediment to packaging on conda-forge, where it would create conflicts. It's easier for pip to ignore dependencies, but conda tries harder to ensure requirements are satisfied. |
I've tested the commonhealth cloud client and it seems to be working fine. I found these points of feedback in using it:
Minor API refinements:
host
,scheme
, andport
separately, with no default values for scheme or port (which will ~always be https, 443, I imagine). I think it probably makes more sense for this to accept a single URL argument, or at least have default values forscheme
andport
.secrets.token_urlsafe(32)
). There is no added entropy by passing 32 random bytes through a KDF to get 32 bytes out - that only guards against lower entropy passphrases. Similarly, I don't think the use cases for salt apply here, because if the passphrase is generated and random, salt doesn't add any entropy or help protect the encrypted data. Adding salt for a KDF is mainly for memorized keys like a password, or otherwise aren't trusted to have good entropy. Asking for passphrase and salt from the same input source is really the same as asking for one actually random passphrase with no salt.The text was updated successfully, but these errors were encountered: