Harden our HTTPS requirement

Created on 30 March 2023, over 1 year ago
Updated 27 April 2023, over 1 year ago

Problem/Motivation

In the core issue #3351190-3: [policy, no patch] Should Package Manager require Composer HTTPS? @catch pointed out that there is more we should be doing to ensure that requests are using HTTPS.

  1. Check the Composer config disable-tls. This is false by default but we should check
  2. → see #6 + #8 for why this was removed

Proposed resolution

  1. Update ComposerSettingsValidator to also check that disable-tls is not enabled.

    The good news is that this defaults to FALSE so a developer would have to manually test this to false right now for it to work

  2. → see #6 + #8 for why this was removed
    Instead we are relying on disable-tls

Remaining tasks

📌 Task
Status

Fixed

Version

3.0

Component

Code

Created by

🇺🇸United States tedbow Ithaca, NY, USA

Live updates comments and jobs are added and updated live.
  • Security improvements

    It makes Drupal less vulnerable to abuse or misuse. Note, this is the preferred tag, though the Security tag has a large body of issues tagged to it. Do NOT publicly disclose security vulnerabilities; contact the security team instead. Anyone (whether security team or not) can apply this tag to security improvements that do not directly present a vulnerability e.g. hardening an API to add filtering to reduce a common mistake in contributed modules.

Sign in to follow issues

Comments & Activities

Not all content is available!

It's likely this issue predates Contrib.social: some issue and comment data are missing.

Production build 0.71.5 2024