-
-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cryptographically verify manifests #18
Comments
ghost
assigned edolstra
May 10, 2012
0install style signatures could be a good start. |
I agree. I can't use nix until it's cryptographically secure. |
Mostly irrelevant now that we have signed binary caches (#75). |
Closing, no longer relevant. We don't rely on manifests anymore, and everything uses https now. |
meditans
referenced
this issue
in Ericson2314/nix
Aug 28, 2020
…-check Check IPFS version on startup
3 tasks
3 tasks
zolodev
pushed a commit
to zolodev/nix
that referenced
this issue
Jan 1, 2024
…ents Tutorial: ad hoc developer environments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
We should cryptographically sign channel manifests, and nix-pull should verify them against a set of allowed keys. This way even non-root users could be allowed to do a nix-pull.
The text was updated successfully, but these errors were encountered: