an option to check that commands are signed with a trusted GPG key before execut... #11
Labels
No Label
bug
documentation
duplicate
enhancement
good first issue
help wanted
invalid
question
todo
wontfix
No Milestone
No project
No Assignees
1 Participants
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: suzanne.soy/filesystem-fuse#11
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
This would allow the user to run this on a filesystem containing a mix of trusted and
untrusted files (e.g. tar -zxf untrusted-downloaded-file.tar.gz is dangerous). In order to
prevent replay attacks, the signed data should include things like the path to the
symlink-command (otherwise re-using that signed symlink-command in another location with
different files could be used to change the semantics of the command), and/or the inputs
the command itself and the hash of the input files
2043072a87/fs.py (L209)