-
Notifications
You must be signed in to change notification settings - Fork 55
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AB#2533 Pin terraform provider hashes #361
Conversation
✅ Deploy Preview for constellation-docs canceled.
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think we also talked about pinning the terraform binary version, not sure if we can provide a hash, though
a58fd61
to
8d6c9e2
Compare
I looked through the source of terraform-exec. Our installation method already verifies the hashes of the terraform binary. The hashes are not pinned but signed by hashicorp instead. Installer.Ensure calls Downloader.DownloadAndUnpack which internally performs the verification. |
Signed vs. pinned hashes has the issue though that supply chain attacks by Hashicorp are possible. If the signing key is compromised, someone can upload a maliciously signed hash and achieve unintended code execution. Of course it's a more advanced attack, but this issue exists with signed hashes. |
There is no option for hash pinning in terraform-exec so I don't believe that this is feasible for now. I can open an issue on their Git and ask if such a feature can be added. |
True... We could build a wrapper but that's likely going to be ugly, especially since the terraform-exec / install package also checks for already existing installations so execution paths can vary. Maybe we can ask. The Terraform package also already supports defining your own PGP key for verification, which is something we could (ab)use for that but would mean we also would need to redistribute their packages signed by us. But if they have this option, it shows that they might care about providing a list of pinned hashes, too. Another question related, do we want to pin the used Terraform version here?:
|
As long as we don't pin hashes it is not required to pin this version. Hashicorp can always modify existing or future binaries to include malware. From all other perspectives, a newer terraform version should fix bugs and security vulnerabilities. |
Tracking: hashicorp/hc-install#72 |
I moved hash validation of the terraform binary into a separate ticket AB#2534 to unblock this PR. |
* Implement call-back loop to clean up GPU resources * Fix disk name in just target --------- Signed-off-by: Daniel Weiße <[email protected]>
Proposed change(s)
Additional info
Manually created using:
Checklist