-
Notifications
You must be signed in to change notification settings - Fork 21
Open
Labels
yubihsmIssues related to the YubiHSMIssues related to the YubiHSM
Description
Summary
When importing a key that already exists in a vault, signatory-cli import should warn or prevent the duplicate import.
Current Behavior
YubiHSM (and potentially other backends) allows importing the same secret multiple times with different IDs:
Public Key Hash: tz1TfGsL6o754mfxcntSzDDTh9RrjZVNocjP
Vault: YubiHSM
ID: bce7
Status: ACTIVE
Public Key Hash: tz1TfGsL6o754mfxcntSzDDTh9RrjZVNocjP
Vault: YubiHSM
ID: caa0
Status: ACTIVE
Proposed Solution
Add a pre-import check to signatory-cli import that:
- Lists existing keys in the target vault
- Compares the public key hash of the key being imported
- Warns user if duplicate exists, with option to proceed or abort
This check should be implemented for all backends, not just YubiHSM.
Related
- Key/Backend paring config #106 - Key/Backend pairing config (inconsistency in ID semantics across vaults)
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
yubihsmIssues related to the YubiHSMIssues related to the YubiHSM
Type
Projects
Status
Planning