-
Notifications
You must be signed in to change notification settings - Fork 0
Security
Because sink has the possibility of getting sooooo popular, we need to think a little bit about the possibility of someone doing something malicious. The good news is that sink really shouldn't do anything unexpected. The only action it can take is resetting a folder that you have configured to match what is on a GitHub repository already. At the very least you should thank your attacker for bringing everything up to date for you. But, nonetheless, people are creative, so here are some security precautions you can/should take.
-
Change the
SECRET_PHRASE
in yourconfig.ini
. The script actually makes you do it (unless you change the script...), so just do it. It can't hurt. -
Protect your
config.ini
. We don't want someone to be able to make a request tohttp://yourhost/sink/config.ini
and see all of your tokens/keys/accounts in plaintext. The repository comes with a.htaccess
file that will take care of this for you if you're on Apache. If you're on IIS, I'm sure there is some other way to make this work, I just have no idea how.Similarly, don't commit your config.ini if you are putting this on GitHub. The repo also comes with a
.gitignore
to help you with that. If you made a boo-boo and did that you probably should take down your sensitive data. -
Double-check your
RESET_MODE
on each sink. By default, the webhook action won't actually call agit reset
on a directory. Sometimes it's useful to perform a reset before pulling though, in case a bad (read: lazy) user changed a file directly on the server, rather than committing and pushing like a good boy.