-
Notifications
You must be signed in to change notification settings - Fork 141
feat: don't forward requests for unknown repos #1164
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: don't forward requests for unknown repos #1164
Conversation
✅ Deploy Preview for endearing-brigadeiros-63f9d0 canceled.
|
Codecov Report❌ Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #1164 +/- ##
==========================================
- Coverage 82.83% 82.70% -0.13%
==========================================
Files 66 66
Lines 2784 2781 -3
Branches 334 333 -1
==========================================
- Hits 2306 2300 -6
- Misses 431 432 +1
- Partials 47 49 +2 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
@finos/git-proxy-maintainers I figured out several reasons why the proxy will apparently forward requests for unknown repos:
I've tried to address each of these different issues, resulting in a new default action chain that only contains CheckRepoInAuthList (so that git-proxy will not forward requests for repos that it isn't aware of, of any type). I also switched the response code on error/block to 403 (forbidden). |
@finos/git-proxy-maintainers I believe this and #1167 MUST both be merged before we issue another release candidate. @jescalada is there anything else that you are aware of that MUST be in the next RC? Perhaps the latest round of renovate PRs? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good to me! I did some experiments with removing the sinon
restore/reset calls but it seems they're necessary (or our tests in testProxyRoute
might need some adjustment).
@kriswest I believe this and the PR you mentioned should be enough! In fact, I was thinking about making an We can always make new |
resolves #1163 by ensuring that requests are never forwarded on for unknown repositories: