docs/trustmanager
Aaron Lehmann 20633e3e12 Make FileStore only allow operations on files inside the store
Paths that abuse .. shouldn't be able to escape from the filestore. This
is especially important when importing keys from zip files that could
have "creative" paths encoded in the zip.

Add test coverage for this protection.

Signed-off-by: Aaron Lehmann <aaron.lehmann@docker.com>
2015-07-15 17:14:56 -07:00
..
filestore.go Make FileStore only allow operations on files inside the store 2015-07-15 17:14:56 -07:00
filestore_test.go Make FileStore only allow operations on files inside the store 2015-07-15 17:14:56 -07:00
keyfilestore.go Added root key creation if non-existing to notary 2015-07-09 18:56:06 -07:00
keyfilestore_test.go Removing dangling temp test directories 2015-07-09 21:03:54 -07:00
x509filestore.go Make FileStore only allow operations on files inside the store 2015-07-15 17:14:56 -07:00
x509memstore.go Refactored fingerprint cert and added better debugging 2015-07-12 22:21:29 -07:00
x509memstore_test.go Refactored fingerprint cert and added better debugging 2015-07-12 22:21:29 -07:00
x509store.go Refactored fingerprint cert and added better debugging 2015-07-12 22:21:29 -07:00
x509store_test.go Added a keyfilestore with encrypted PEM support 2015-07-04 12:17:54 -07:00
x509utils.go Refactor crypto service 2015-07-13 13:53:47 -07:00