-
Notifications
You must be signed in to change notification settings - Fork 783
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add --no-gpg-mirror option #444
base: master
Are you sure you want to change the base?
Conversation
bffc1f7
to
4854e51
Compare
This came up when we maintainers at https://mirrors.ustc.edu.cn discussed if we should we sync the GPG key, which we aren't as for now due to security concerns. Adding this option would give us the ability to modify our help page at https://mirrors.ustc.edu.cn/help/docker-ce.html for a clearer guidance. thx. |
Hi @thaJeztah can I get a review or update here? seems to be buried in ur inboxes. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for contributing!
So, I'm a bit on the fence; to my understanding, most users using the mirror would do so because they may not have access to the upstream (download.docker.com
); would using the GPG key from that location work?
I wonder if instead, we should bring back the actual GPG key into this script.
We used to have the GPG key in the script itself; ISTR this was partially because the keyserver we were using was known to not be that stable, but also to spread risk; i.e. instead of having the GPG key AND the packages on the same location, they would be separate. I think that approach was changed in relation to (at the time) "docker enterprise", because the same script (or a variant thereof) was also used to install "docker enterprise" packages, which used a different GPG key.
There's some discussion on this PR, which (as part of it) removed the key from the script; #39
Yeah I just double checked from my laptop & VPS,
I actually recommend against changing the security model just for GFW, provided that normal user won't gain from this shift(to my understanding). For now our guide recommends tl;dr: impossible for a method to be both "secure enough" and easy to access. The current impl to mirror the whole
thx, will look into it. I'm thinking about another solution: using Apologies in advance if this looks a little paranoia to you, since we are basically assuming a mirror site we host being a factor of supply chain attack. |
4854e51
to
e821323
Compare
somehow this shortens the PR... |
This allows user to choose where to download the gpg key from, original source (default) or a trusted mirror site. Signed-off-by: Tiankai Ma <tiankaima@163.com>
e821323
to
c0a0c4b
Compare
force pushed again to update the commit message |
Hi @thaJeztah Got a minute? |
This ensures that the GPG key is always downloaded from a trusted source.
- What I did
add --no-gpg-mirror option to ensure GPG key is downloaded from a trusted source
- How I did it
< 10 lines of code I guess...
- How to verify it
try
./install.sh --no-gpg-mirror --mirror Aliyun --dry-run
should be:
- Description for the changelog
add --no-gpg-mirror option to ensure GPG key is downloaded from a trusted source
- A picture of a cute animal (not mandatory but encouraged)