Skip to content

RFC: Scoped secret store for system-managed tokens#56

Merged
amirejaz merged 4 commits intomainfrom
rfc/scoped-secret-store
Mar 18, 2026
Merged

RFC: Scoped secret store for system-managed tokens#56
amirejaz merged 4 commits intomainfrom
rfc/scoped-secret-store

Conversation

@amirejaz
Copy link
Contributor

Summary

  • Why: System-managed tokens (registry OAuth tokens, workload auth tokens) are currently stored in the same flat namespace as user secrets, making them visible via thv secret list and vulnerable to accidental deletion. This RFC proposes isolating them under a reserved thv_sys/<scope>/ prefix using new ScopedProvider and UserProvider wrappers. This is also a prerequisite for enterprise CLI/Desktop login (stacklok-enterprise-platform#69).
  • What: Defines the ScopedProvider and UserProvider wrapper design, named scopes (registry, workloads, auth), factory helpers, caller migration plan, and a key migration strategy for existing installations.

Type of change

  • New feature

Test plan

  • RFC only — implementation tracked in toolhive#4192

Generated with Claude Code

@amirejaz amirejaz merged commit 9a55a90 into main Mar 18, 2026
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants