From 559f62353b002f8ea63072a753fb34adb0a6be1b Mon Sep 17 00:00:00 2001 From: David Festal Date: Mon, 13 Nov 2023 16:53:37 +0100 Subject: [PATCH] Increase max entry size for dynamic plugins (#766) in order to avoid triggering a zip-bomb error during installation for plugins delivered as part of the showcase docker image. Signed-off-by: David Festal --- docker/install-dynamic-plugins.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docker/install-dynamic-plugins.py b/docker/install-dynamic-plugins.py index 36e46312c..ee7909da5 100755 --- a/docker/install-dynamic-plugins.py +++ b/docker/install-dynamic-plugins.py @@ -29,7 +29,7 @@ # the dynamic plugins will be installed. # # Additionally, the MAX_ENTRY_SIZE environment variable can be defined to set -# the maximum size of a file in the archive (default: 10MB). +# the maximum size of a file in the archive (default: 20MB). # # The SKIP_INTEGRITY_CHECK environment variable can be defined with ("true") to skip the integrity check of remote packages # @@ -112,7 +112,7 @@ def verify_package_integrity(plugin: dict, archive: str, working_directory: str) def main(): dynamicPluginsRoot = sys.argv[1] - maxEntrySize = int(os.environ.get('MAX_ENTRY_SIZE', 10000000)) + maxEntrySize = int(os.environ.get('MAX_ENTRY_SIZE', 20000000)) skipIntegrityCheck = os.environ.get("SKIP_INTEGRITY_CHECK", "").lower() == "true" dynamicPluginsFile = 'dynamic-plugins.yaml'