Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow HTTP binary cache to request absolute uris #3981

Merged

Conversation

domenkozar
Copy link
Member

@edolstra I'm not sure if this opens up any security concerns, but I'd like narinfo to point to nar url that doesn't match binary cache uri prefix.

My thinking is if you trust the binary cache you can also trust uri requests it returns.

@edolstra
Copy link
Member

edolstra commented Sep 1, 2020

Yeah I don't think this is a major security concern since we're checking the NAR hash.

@Kloenk
Copy link
Member

Kloenk commented Sep 1, 2020

I wouldn't say I trust my binary store. I only trust the signature from it.

@domenkozar domenkozar force-pushed the http-binary-cache-allow-absolute-urls branch from a02ff51 to dd4b56c Compare September 1, 2020 19:35
@domenkozar
Copy link
Member Author

@Kloenk if you use the signing mechanism then it doesn't matter where the files are coming from, you trust the person that signed the contents. If you don't use signing, then you trust the binary cache. Either way it doesn't matter much where the content is coming from.

@edolstra ready for re-review.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants