-
-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Better non-signing implementation #2
Comments
I could also add an option to omit the secretKey and send the message to the server for signing. It would be a very simple view to write, and someone could probably write a dead-simple Nginx module to avoid the app server entirely. Whitelisting is definitely the easier choice for now, though. |
I went ahead and added a signatureUrl option to allow it to operate without a secretKey and hit a url to get the signature. I also added the option to configure it with a base64 string to obfuscate it. I added a note to the Readme explaining that this option was still insecure, but less obvious. Next week I'll try to send a pull request for Sentry to add whitelisting. |
This is now fixed |
…process from taking a shit, should fix #2
Modified one template to use the async function instead, as adding an additional variant to an already bloated integration test runner felt meh. Note that type from #7444 is incorrect. It should be: ```js const nextConfig = async () => { /** @type {import('next').NextConfig} */ return {}; } ``` and not: ```js /** @type {import('next').NextConfig} */ const nextConfig = async () => { return {}; } ``` Note #2: async function handling works for `next >= 12.1` only: https://nextjs.org/docs/app/api-reference/next-config-js/pageExtensions Verified the behavior locally using provided sample config from the original issue. Fixes #7444
We need to implement some behavior in Sentry (so this ticket applies to both raven-js and Sentry) that removes the need for Raven to send a signed request. The signed request in JS doesn't actually provide any benefit, as it exposes the signing key (secret key).
Two things we should do:
The text was updated successfully, but these errors were encountered: