-
Notifications
You must be signed in to change notification settings - Fork 228
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[FR] Improve how we resolve packages between different hosts #4534
Comments
Changing hosts is the same as changing package names. The same package name on two different hosts should always be treated as unrelated.
We could consider this. I think if we should do proper mirror support we should do it in a manner that is secure. The fundamental problem here is that In the ideal world, when using a
We could imagine:
And However, I think allowing such mirror logic is dangerous without some security features in place, specifically we should be able to prove:
(i) aims to ensure that the mirror isn't modifying packages. (ii) aims to ensure that the mirror is not used to facilitate replay-attacks by only serving old versions that have known security vulnerabilities. I think that (i) requires that pub server have a mechanism for signing packages. A simple approach would ofcourse be to simply sign the versioning listing response, and let the signature expire within 24 hours. I'm quite sure how scalable such a solution is, but it's possibly an option. But signing probably requires a bit of work to standup, notably we'd have to make sure that we can have an offline root key, to replace whatever key pub.dev then uses. And probably some very complicated procedures for handling such root key, so we don't loose it 🙈 |
Please upvote this issue, if this is important. IMO, proper mirror support needs to be able to prove that the mirror produces the same resolutions as the mirrored package repository. |
Totally agreed. But isn't the
We have some offline discussions in our groups, and we think it would be a bit overkill, but if you want to achieve the goal once for all, it sounds like a better choice, that might decrease the priority however. |
Yes, for the case where you have an existing lockfile sha256 is enough. If you use What @jonasfj is discussing if a way to guarantee that a new resolution is the same as what you would get on pub.dev Not sure we want to build extra conveniences around using a mirror for only the purpose of |
Okay, that sounds like a workaround. But you won't see it from editors AFAIK, and you don't always use cli in these modern years. :) I'm not sure if pub should take the responsibility to make sure a mirror is valid, or verified as a safe. There are already some warnings when you've specified the host environment (like in Flutter), I'm also not sure if any of the package management tools have done that. Regardless of switching between hosts, I think the structure of pubspec.lock can be tailored appropriately. |
I'm using our cn mirror (
pub.flutter-io.cn
) when developing some projects that don't use the mirror and have a lock file withpub.dev
resolved.Now, say we have
package:a
that has version 1.0.0 and 1.1.0 that can both be resolved with the current project, the lock file specifiedpackage:a
resolved as version 1.0.0 frompub.dev
host. When I runpub get
and after it finishes, the resolved version becomes 1.1.0 along with the changed hostpub.flutter-io.cn
.Before:
After:
I'd raise at least 3 unexpected behaviors:
package > description > url
should be removed or only present when explicitly specified. Thesha256
has already covered the identification of the resolved package, we don't need a host to identify. There is a related improvement that takes place in other popular package management tools: pnpm. See https://github.com/pnpm/pnpm/releases/tag/v10.0.0package > description > name
, it's redundant nowadays.Expected results
My idea about
pubspec.lock
:Host-based ref
The text was updated successfully, but these errors were encountered: