remote.name.annex-security-allow-unverified-downloads

Added remote.name.annex-security-allow-unverified-downloads, a per-remote
setting for annex.security.allow-unverified-downloads.

This commit was sponsored by Brock Spratlen on Patreon.
This commit is contained in:
Joey Hess 2018-09-25 15:32:50 -04:00
parent 177e45517f
commit bc31b93c77
No known key found for this signature in database
GPG key ID: DB12DB0FF05F8F38
8 changed files with 27 additions and 6 deletions

View file

@ -1450,7 +1450,7 @@ Here are all the supported configuration settings.
these IP address restrictions to be enforced, curl and youtube-dl will
never be used unless annex.security.allowed-http-addresses=all.
* `annex.security.allow-unverified-downloads`,
* `annex.security.allow-unverified-downloads`
For security reasons, git-annex refuses to download content from
most special remotes when it cannot check a hash to verify
@ -1487,6 +1487,10 @@ Here are all the supported configuration settings.
It would be a good idea to check that it downloaded the file you expected,
too.
* `remote.name.annex-security-allow-unverified-downloads`
Per-remote configuration of annex.security.allow-unverified-downloads.
* `annex.secure-erase-command`
This can be set to a command that should be run whenever git-annex

View file

@ -3,3 +3,5 @@ Sometimes I _know_ that a given external special remote doesn't do redirects, or
git -c annex.security.allow-unverified-downloads=ACKTHPPT annex get myfile
every time is another thing to think about, when the whole point of git-annex is to not have to think about where things are :) While configuring
annex.security.allow-unverified-downloads=ACKTHPPT permanently opens security holes.
> [[done]] --[[Joey]]