[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v6 2/5] Change remaining xenbits.xen.org link to HTTPS


  • To: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Wed, 22 Mar 2023 09:36:56 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=gt2I6FLif50/FCRCNDZAKGgefhqwWH03i4HGUDAO/YY=; b=HwJq4rwvCqyLPFo6jd3hEGfKdmU/e2tH/zj8hrgYiiIKEoFhsQCZnO8iv3Mb7GOgJ0ik3brpmuMHKd4Y69D2uURID9WRATxrk1Aq/DwGn1jSwJX9PR0W5kIbu08VFiqrn9xTAVlFnI/wIqpaQF1hH1VuNqBJjMTZx5HSE9IEvapfnLOMdXWhzOqnc+PqOJZzoVpZtCLhmWCNUviXZBX/O9koEF5iELNAWLXxVBRDvVMIqp/DXwf/61ZZoR/jVGGOkSLtJkDmpJVacFlaikv9+CUGZunKW2ftDUc5HpRfzQAmgciMZGWLaHZz3NoaeE+GYNXPEkIcTV4QJDZ6NscoKg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=bG/KMTTarxW3Id+DDQtIJI9QVYzMiYBRRf9bjTnVy/EenEqRRGRtWyEbhp7qDKiMFjhpJqCR6EbJYsw7yNhAHrR2DWQnmKbCQ84dYf46S2xUtr+NjQXUdCf7lYSTAXLV2UH9Gte0Mz24iSrjRCiGO7mp6MS2Fm+qEwvZZ+jf12L4e70pzFQIQbmR55KD85MhPcQPO1XHOKDC0CAfqWU2Iwo1LqWr8gZCA4Xom4xjVfm0oTKm6PsC5MnaUgZoEjueFc1flF5dFyEvn8QpjszYTmj0DGsjma7S1i6mNx7lGkJbAyDZ5qENgT2GQrqPLw7Sfn2gXA0NvQ8XiHv+wr55kQ==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
  • Delivery-date: Wed, 22 Mar 2023 08:37:16 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 21.03.2023 18:33, Demi Marie Obenour wrote:
> Obtaining code over an insecure transport is a terrible idea for
> blatently obvious reasons.  Even for non-executable data, insecure
> transports are considered deprecated.
> 
> This patch enforces the use of secure transports for all xenbits.xen.org
> URLs.  All altered links have been tested and are known to work.
> 
> Signed-off-by: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>

A patch of (almost) this title was already committed and then partly reverted,
as it had become clear that ...

> --- a/Config.mk
> +++ b/Config.mk
> @@ -191,7 +191,7 @@ APPEND_CFLAGS += $(foreach i, $(APPEND_INCLUDES), -I$(i))
>  EMBEDDED_EXTRA_CFLAGS := -fno-pie -fno-stack-protector 
> -fno-stack-protector-all
>  EMBEDDED_EXTRA_CFLAGS += -fno-exceptions -fno-asynchronous-unwind-tables
>  
> -XEN_EXTFILES_URL ?= http://xenbits.xen.org/xen-extfiles
> +XEN_EXTFILES_URL ?= https://xenbits.xen.org/xen-extfiles

... this really is part of the build system. Hence I wonder why this wasn't
folded into patch 4 (as it should have been from the beginning, which then
also would have avoided the noise about committing the patch too early).

Jan



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.