Eric Schrock wrote:

>> This definitel shouldn't be mandatory, and it really shouldn't even be
>> suggested except as a hacky workaround.  It's dangerous -- you can end up
>> running untrusted code as yourself just by accessing someone else's
>> mercurial workspace.
> 
> So what is the internal policy w.r.t. access to elpaso.eng?  The flag
> day said to use NFS, but that seems to raise a few issues, and the
> workarounds don't seem to be viable - either you have to put up with
> annoying noise or you open yourself up to security risks.

It's worse than that - you'll see those warnings using SSH as well:

anthrax[17]% time hg clone ssh://thurlow at elpaso.eng//export/gate-hg
destination directory: gate-hg
requesting all changes
adding changesets
adding manifests
adding file changes
added 7109 changesets with 97569 changes to 50605 files
updating working directory
45608 files updated, 0 files merged, 0 files removed, 0 files unresolved
remote: Warning: No xauth data; using fake authentication data for X11 
forwarding.
remote: Not trusting file /export/gate-hg/.hg/hgrc from untrusted user 
daemon, group other
remote: Not trusting file /export/gate-hg/.hg/hgrc from untrusted user 
daemon, group other
156.70u 91.47s 15:00.34 27.5%

Do we need the "Not trusting file" message?  If it happens every
time we do anything, it's beyond useless.  Or can someone explain
the intent and how to configure things so we only see it when it
matters?

Rob T

Reply via email to