-
Notifications
You must be signed in to change notification settings - Fork 54
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Using Alexandrie as private #93
Comments
@Hirevo I'm willing to contribute code to make this use case possible. Specifically, I'm thinking about two separate features each represented by a default-disabled configuration option:
|
Hello ! Sorry for my long absence about this. In the current state of affairs, it is possible to have the index be private by passing an SSH link to it in Cargo's config. Within the implementation of I think we can indeed at least do:
The rest of Cargo-related endpoints (like those related to owners and publication) are already authenticated. That said, I don't know if the Cargo team is planning anything regarding this. |
Also, we can maybe do it as an option within the config, rather than it being a cargo feature-flag, because it doesn't make us save on dependencies when not used, and having to recompile just to change an option could be annoying. |
How is this going? If the registry cannot be made private, then why is it being advertised as such? If anyone can do I don't understand how in the cargo's RFC, I think for now i'll try to disable registrations, disable the frontend, and disable |
Hi, I've now created PR #164 to allow disallowing anonymous browsing in the frontend (by setting a I am not exactly sure why this issue of the unauthenticated Cargo endpoint is still unaddressed, I am not aware of what is the Cargo team rationale on not sending the configured authorization token for all endpoints, and let the registries decide whether to ignore it (to make it public) or not (to make it private) when responding. Although, to be fair, they have accepted and implemented an RFC (rust-lang/rfcs#3139) to address this, but issues around how it interacts with how registries are uniquely identified (by the git repo URL of the crate index for When I used the word "private" in the README, it was more in the sense of "self-operated" than in the "confidential" (or "privacy") sense. But the fact that it is "self-operated" means it is also possible to hide it from the outside using techniques like private networks and SSH tunnels. While disabling the endpoint used by |
Hello,
Thanks for this initiative, very usefull project !!!
I wanna to deploy in my company but I have some issues to deploy as a private crate repository.
I maybe possible for us to contribute☺️
Thank you a lot,
Marc-Antoine
The text was updated successfully, but these errors were encountered: