Closed hvisage closed 1 year ago
This is an upstream issue with PackageCloud and should be taken up them, as we are not the people providing the script that is causing your issue.
Additionally, our packages are not currently signed (we plan to do this eventually, you can track the status of this in #7773), so it is recommended that at least for the upstream connection from your local mirror/apt-cacher instance you use HTTPS (not that PackageCloud appears to provide non-HTTPS access to their repositories).
I've sent an upstream report to PackageCloud, and will post here when there are any updates.
I'm also going to update our install documentation to indicate what's required to use PackageCloud with apt-cacher-ng.
Still have not heard back from PackageCloud on this. There's been some internal discussion of moving to self-hosting our own repos (though that's kind of stalled at the moment pending upcoming changes to how we handle binary packages) which will likely functionally resolve this.
Still have not heard back from PackageCloud on this. There's been some internal discussion of moving to self-hosting our own repos (though that's kind of stalled at the moment pending upcoming changes to how we handle binary packages) which will likely functionally resolve this.
Actually I don't think its terribly hard to do this even now. I might work on this after we fix all the bugs in our backlog!
Indeed, it should theoretically be doable now, it's just not currently top priority. It doesn't matter much for this issue though until we get #7773 dealt with, because we should still be enforcing HTTPS until we have signed packages to prevent trivial MitM attacks.
Yeah I actually built a repo with a really nice tool, HTTPS enabled and GPG signed. So I'll share this with you on Monday and we can implement it and start hosting our packages (behind Cloudflare) say say pkgs.netdata.cloud
We’re in the process of (finally) migrating to self-hosted package repositories, which will provide unencrypted HTTP access.
This should no longer be an issue, as our new self-hosted repositories are the default and they provide unencrypted HTTP access. Details on manual setup of these new repositories can be found in our documentation.
Bug report summary
In my environment, I've setup apt-cacher-ng for all my hosts, and any https:// repos are broken when not changing the urls to https://HTTPS///
OS / Environment
Netdata version
Current online installation script
Component Name
Installation scripts
Steps To Reproduce
Expected behavior
To install the repos to fetch from HTTP:// as the .deb, being already signed, doesn't need a secure download channel, especially when using apt-cacher-ng for caching packages inside closed/semi-closed environments.