Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cryptographically verify manifests #18

Closed
edolstra opened this issue May 10, 2012 · 4 comments
Closed

Cryptographically verify manifests #18

edolstra opened this issue May 10, 2012 · 4 comments
Assignees
Labels
feature Feature request or proposal
Milestone

Comments

@edolstra
Copy link
Member

We should cryptographically sign channel manifests, and nix-pull should verify them against a set of allowed keys. This way even non-root users could be allowed to do a nix-pull.

@ghost ghost assigned edolstra May 10, 2012
@iljah
Copy link

iljah commented Aug 5, 2012

0install style signatures could be a good start.

@joeyh
Copy link

joeyh commented Feb 9, 2014

I agree. I can't use nix until it's cryptographically secure.

@edolstra
Copy link
Member Author

Mostly irrelevant now that we have signed binary caches (#75).

@edolstra
Copy link
Member Author

edolstra commented Feb 4, 2015

Closing, no longer relevant. We don't rely on manifests anymore, and everything uses https now.

@edolstra edolstra closed this as completed Feb 4, 2015
aszlig pushed a commit to aszlig/nix that referenced this issue Aug 18, 2018
meditans referenced this issue in Ericson2314/nix Aug 28, 2020
zolodev pushed a commit to zolodev/nix that referenced this issue Jan 1, 2024
…ents

Tutorial: ad hoc developer environments
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature Feature request or proposal
Projects
None yet
Development

No branches or pull requests

3 participants