Page MenuHomePhabricator

Improve consistency of file access policies, particularly for LFS
ClosedPublic

Authored by epriestley on Apr 22 2016, 11:45 AM.
Tags
None
Referenced Files
Unknown Object (File)
Tue, May 27, 11:05 AM
Unknown Object (File)
Apr 21 2025, 9:42 AM
Unknown Object (File)
Apr 20 2025, 4:27 AM
Unknown Object (File)
Apr 19 2025, 12:36 PM
Unknown Object (File)
Apr 18 2025, 12:50 PM
Unknown Object (File)
Apr 17 2025, 12:59 PM
Unknown Object (File)
Apr 16 2025, 5:49 PM
Unknown Object (File)
Apr 16 2025, 10:42 AM
Subscribers
None

Details

Summary

Ref T7789. Currently, we use different viewers if you have security.alternate-file-domain configured vs if you do not.

This is largely residual from the days of one-time-tokens, and can cause messy configuration-dependent bugs like the one in T7789#172057.

Instead, always use the omnipotent viewer. Knowledge of the secret key alone is sufficient to access a file.

Test Plan
  • Disabled security.alternate-file-domain.
  • Reproduced an issue similar to the one described on T7789.
  • Applied change.
  • Clean LFS interaction.

Diff Detail

Repository
rP Phabricator
Lint
Lint Not Applicable
Unit
Tests Not Applicable

Event Timeline

epriestley retitled this revision from to Improve consistency of file access policies, particularly for LFS.
epriestley updated this object.
epriestley edited the test plan for this revision. (Show Details)
epriestley added a reviewer: chad.
chad edited edge metadata.
This revision is now accepted and ready to land.Apr 22 2016, 2:33 PM
This revision was automatically updated to reflect the committed changes.