-
Notifications
You must be signed in to change notification settings - Fork 18k
sum.golang.org: go-get gitern.com/xxx/repo.git 410 gone #40358
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
You have This is a strange one. It seems to be failing very consistently. Offhand the only thing I can think is that |
cc @huumn |
I’m not blocking any ips explicitly. If they’re being blocked on my end they’re being blocked by AWS. |
All repos are private on gitern which could require additional config for go get? Edit: Ah gitern only supports git over ssh to the repos. I suspect go get uses http. |
Would go-get be falling back to |
@arnottcr gitern does not support git over http currently (only ssh). I think go get defaults to http and might need to be told to use ssh. |
The .git suffix causes the toolchain to try http and ssh (maybe git:// too), so i can confirm that part is working. It would be nice to get meta header support for gitern, but that is out of scope here, and I still think there might be a go-get bug. |
For private repositories, please see this instruction. |
@arnottcr I just saw you already tried I will close this since this is working as intended. |
This ux is really confusing. Can we have the toolchain detect these failurse and suggest |
No, especially since I still don't know why it's failing. Connection refused isn't a reasonable error to get for a private repository; it can't possibly know whether we can authenticate without accepting the connection. My best guess is still a misconfiguration on the origin side. At the same time, there is no point spending time diagnosing it if it's just going to fail later, so I'm not going to investigate any further. |
I guess my ask is when the module proxy falls back to Since gitern may be making things more confusing, i am happy to repro with a private github repo. |
Automatically disabling sumdb lookup would destroy the security model; any attacker that controlled the network could disable sumdb lookup by blocking access to Again, this is not a general problem with private modules. For example, I believe GitHub returns a warning about authentication that helps avoid confusion. The problem here is that network connectivity between |
If you are concerned about this why even have the Furthermore, if you are concerned with network level interception, you likely have larger problems.
The ux for github private repos is not better, but this may be the anti-discovery mechanism at work:
Also the toolchain disallows the use of
|
What version of Go are you using (
go version
)?Does this issue reproduce with the latest release?
yes
What operating system and processor architecture are you using (
go env
)?go env
OutputWhat did you do?
What did you expect to see?
What did you see instead?
The repo appears correctly populated in
~/go/pkg/mod/cache
, implying thatproxy.golang.org
is working, plus hitting vcs directly, viaGOPRIVATE=gitern.com
, works as expected.The text was updated successfully, but these errors were encountered: