diff options
| author | Maximilian Bosch <maximilian@mbosch.me> | 2022-10-09 09:31:48 +0200 |
|---|---|---|
| committer | Maximilian Bosch <maximilian@mbosch.me> | 2022-10-09 09:31:48 +0200 |
| commit | 4fd75277dd383abfa0d8719306b1fbe18c024366 (patch) | |
| tree | 553922ffb4d3079c806ea63e66bd0f8ceea83066 /pkgs/development/python-modules/rangehttpserver | |
| parent | d052fcf0eda1c13715d6eec87b017c14d753b17a (diff) | |
nixos/coturn: refactor secret injection
The original implementation had a few issues:
* The secret was briefly leaked since it is part of the cmdline for
`sed(1)` and on Linux `cmdline` is world-readable.
* If the secret would contain either a `,` or a `"` it would mess with
the `sed(1)` expression itself unless you apply messy escape hacks.
To circumvent all of that, I decided to use `replace-secret` which
allows you to replace a string inside a file (in this case
`#static-auth-secret#`) with the contents of a file, i.e.
`cfg.static-auth-secret-file` without any of these issues.
Diffstat (limited to 'pkgs/development/python-modules/rangehttpserver')
0 files changed, 0 insertions, 0 deletions
