Code Monkey home page Code Monkey logo

Comments (5)

soffokl avatar soffokl commented on July 28, 2024
  1. Singing of artifacts should be processed using owner private key. Only user have this key. If we are planning sing artifacts, it should be implemented on user side. After that user should upload file and signature to gorjun.
  2. Another option is sing all artifact using gorjun node key. It will just allow to validate that file was downloaded from gorjun CDN and it's valid.

@tzununbekov @akarasulu @dilshat

from cdn.

tzununbekov avatar tzununbekov commented on July 28, 2024

Ask user to sign artifacts before upload is extremely unfriendly way I think, meanwhile signing file with our own key allow us to validate only file integrity but not the ownership and using signatures is overkill for this purpose

In my point of view, we should think about two things:

  • using browser plugin for signing artifacts
  • need to figure out how those artifacts will be created and, if possible, add signing mechanism to generation step. Since for deb and raw files signatures are useless, we need to think how user will create custom template before uploading

Need to thoroughly discuss this topic all together

from cdn.

akarasulu avatar akarasulu commented on July 28, 2024

@soffokl The second option is not sufficient to authenticate the artifact. It just verifies that the artifact was transferred without tampering from the CDN->User. The first option handles the full path Owner->CDN->User. @tzununbekov has the right idea here to use the e2e plugin. More thoughts below ...

We can implement the first option easily. The signatures are applied to the file's checksum right? So before uploading an artifact, the application (SS, Hub) should require the owner/uploader to sign the checksum. I think this can be delegated to the e2e plugin to handle in both UI's. It's being done now already for signing various documents. It would be very easy to do this.

SS and the Hub should support automated via e2e plugin and manual mechanisms to produce and upload the signature into the CDN.

Subos will need to simply pull down the artifact and it's signature then verify the signature against the public key of the owner to authenticate the artifact.

Does this clarify?

from cdn.

tzununbekov avatar tzununbekov commented on July 28, 2024

@akarasulu yes, this clarifies lots of questions
In described workflow we should include @dilshat and @samsonbek to assist with e2e integration from SS and Hub sides
As I see it now, we'll need to add one additional step for both - upload and import operations: signing hash during upload from Hub and checking signature while importing to SS
I'll review kurjun and subos source code to recall current algorithm and to prepare changes

from cdn.

tzununbekov avatar tzununbekov commented on July 28, 2024

Merged in production

from cdn.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.