Skip to content

How to force composer audit to rely non-dynamic TUF-protectable resources #99

@tedbow

Description

@tedbow

The Packagist API allows providing a URl to dynamically fetching security advisories. https://packagist.org/apidoc#list-security-advisories. I believe this is used by Composer Audit

From a TUF perspective this is not good because the dynamic nature of the possible query arguments probably makes it impossible to protect as a TUF resource.

We should determine if it possible to make composer audit rely on resources that can be TUF protected

  1. When does Composer call dynamic security advisories query?
  2. Is possible to tell Composer not to use these requests on certain repos?
  3. If 2) is not possible, is it possible to intercept and forid these call on TUF protect resources?
  4. If we do 3) will audit and any other Composer operation fallback to using the security advisories in the .json files for packages? Is this the same information in just different form?

related drupal.org issue https://www.drupal.org/project/project_composer/issues/3301876

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions