Replies: 14 comments 1 reply
-
As this is linked to asciinema/asciinema#178 I'm closing it too. |
Beta Was this translation helpful? Give feedback.
-
this issue was never fixed it needs to be reopened. The PR it was linked to was closed without merging and so this issue is lost to the void. |
Beta Was this translation helpful? Give feedback.
-
@sickill Could you reopen this issue as @saxophonicle said? |
Beta Was this translation helpful? Give feedback.
-
My comments in the referenced PR were never addressed, and I never heard back from cbarcenas. Thus both PR and issue were closed. |
Beta Was this translation helpful? Give feedback.
-
If you'd like to completely prevent uploads today you can put this in the config file, as a temporary workaround: [api]
url = http://nope |
Beta Was this translation helpful? Give feedback.
-
We're having the same issue as @cbarcenas: We deal with sensitive data on a daily basis and the risk of automatically uploading screen casts is so significant that we are currently refraining from using asciinema, even though it's a really useful tool. Therefore I'd offer to implement a solution. I would suggest re-implementing asciinema/asciinema#178 (re)based on the current state of the repository, i.e. a configuration option that can be used to disable uploading. Additionally, I would also have asciinema look for the configuration at @sickill Does that sound okay to you? |
Beta Was this translation helpful? Give feedback.
-
I frequently use this tool for tutorials, examples, etc.; and it's pretty awesome. That being said, I too was very concerned about accidental data leakage (i.e. there are use cases where this tool couldn't be used for legal reasons, solely due to the potential for accidental data leakage by inexperienced users) or a simple mis-configuration problem resulting in sensitive data being leaked (i.e. default behaviour is to allow uploads, so mis-configuration results in potential for uploads in the worst case, or the app just not launching in the best case scenario). In my own use case, the solution was to put all of the tooling needed for This might help others aiming to lock down output options for the tool without going so far as to patch + repackage/re-deploy it. Cheers! |
Beta Was this translation helpful? Give feedback.
-
Duplicated by:
|
Beta Was this translation helpful? Give feedback.
-
This totally works for me :) Perhaps this could just be added to the docs, to make it easier to find for people? |
Beta Was this translation helpful? Give feedback.
-
Proper fix, asciinema/asciinema#576, is coming in v2.4.0, which is around the corner. |
Beta Was this translation helpful? Give feedback.
-
Just released 2.4.0 with improved prompt which requires explicit choice: https://github.com/asciinema/asciinema/releases/tag/v2.4.0 |
Beta Was this translation helpful? Give feedback.
-
I have reworked the upload related behavior for the upcoming asciinema 3.0:
I hope this addresses most of the concerns. You won't be able to accidentally upload anything anywhere, because it will require intent ( When presented with a prompt you would confirm the use of asciinema.org or you would enter the URL of your self-hosted asciinema server instance. You will still be able to pre-configure the server URL in the config file via 3.0 hasn't been released yet, but it's close. If you'd like to test it then here's a release candidate (also providing binary downloads for Linux and macOS): https://github.com/asciinema/asciinema/releases/tag/v3.0.0-rc.1 Let me know if this looks like a good solution. Thanks! |
Beta Was this translation helpful? Give feedback.
-
@ku1ik That sounds good to me! |
Beta Was this translation helpful? Give feedback.
-
And thanks for doing this. |
Beta Was this translation helpful? Give feedback.
-
Currently, it's too easy for users to accidentally publish sensitive screencasts to asciinema.org: all you need to do is accidentally omit a filename argument and then press at the upload confirmation prompt.
At many security-minded organizations, particularly those that regularly deal with sensitive information, the automatic upload feature of
asciinema rec
would turn asciinema into a data leakage risk. This may in turn prevent its use at such organizations.I propose that a configuration option,
upload
, be added to the[record]
section of the config file. This option, which would default toyes
, could be used to control the automatic upload functionality ofasciinema rec
. If set tono
, automatic upload functionality would be disabled and the filename argument toasciinema rec
would become mandatory.I have implemented this proposal and will submit a PR for review.
Beta Was this translation helpful? Give feedback.
All reactions