-
Notifications
You must be signed in to change notification settings - Fork 73
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Compatibility with recent cloud-run-proxy changes #54
Comments
Same issue. Any update on this? |
@nielm ? |
In the short term, use cloud-run-proxy v0.3.0 -- which it already does Cloud-run-proxy have been reluctant to add new features to support my use of their tool... |
Hi, thank you for your answer. I'm failing to understand how their new header |
As we don't use 0.4, it doesn't affect it at all!
However if we did try to use 0.4 cloud-run-proxy would not work to proxy
freshclam's http requests to authenticated cloud storage URLs.
0.3 has a variety of critical CVEs in golang standard libraries, so I am
looking at implementing my own authenticating reverse proxy in node.js,
specifically for this use case
…
Message ID:
<GoogleCloudPlatform/docker-clamav-malware-scanner/issues/54/1824790751@
github.com>
|
@ntang86 The Cloud Storage API expects an access token in the Some time before the original post, Even though I am still using |
Thank you for your explanation ! Indeed, we are also facing some CVEs security issue, using the |
Freshclam - which downloads updates and applies them to the clamav database
- only supports http(s) targets for the clamav database update servers.
That's why I had to use cloud-run-proxy to add the authentication headers
so that it could use non-public GCS buckets.
It may be possible to simply copy the cvd files to the clamav database
location, but I have not tried it, preferring to use freshclam which
verifies DB integrity...
|
Fix in progress in #60 |
Thank you, that's awesome, less dependency to worry about! Looking forward to the fix to be merged ! |
Hello,
A recent commit in cloud-run-proxy switches from the
Authorization
header toX-Serverless-Authorization
to prevent conflicts with authentication/authorization flows from actual Cloud Run applications.While this change is technically correct, it breaks how the proxy is used for the local FreshClam database mirror. Since the Cloud Storage API expects regular authentication (vs service-to-service auth with either header), an Forbidden error is returned during container startup.
I'm actually not sure if this issue should be opened here or in the
cloud-run-proxy
repository... My understanding is that the proxy is being used in an unusual way by the malware scanner, but please let me know if it should be supported in the long run.The text was updated successfully, but these errors were encountered: