New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RPC credentials exposure #9
Comments
-----BEGIN PGP SIGNED MESSAGE----- On 03/06/2016 05:46 AM, Klaus Alexander Seistrup wrote:
Related: implementing support for Namecoin Core's REST API would make Are there use cases where RPC is actually needed for these tools? I iQIcBAEBCAAGBQJXHudoAAoJEAHN/EbZ1y06YZIP/0hE9wCT+mWFV2rN3hMEgEzU |
@hlandau is there a reason why |
@JeremyRand I wrote it as a command line tool, so intended for manual invocation without the flexibility of configuration that daemons require, for which easyconfig is used. But I don't see an issue with migrating it to easyconfig. |
#76 solves this for ncdumpzone. |
Taking RPC credentials on the commandline potentially make these credentials available to any user that is able to run the
ps(1)
[or similar] command.ncdt
andncdumpzone
ought to be able to find the necessary values in a config file or in environment variables.The text was updated successfully, but these errors were encountered: