Skip to content

feat: use UDS instead of port for openvscode-server#18

Merged
Vtec234 merged 6 commits into
mainfrom
uds
May 11, 2026
Merged

feat: use UDS instead of port for openvscode-server#18
Vtec234 merged 6 commits into
mainfrom
uds

Conversation

@Vtec234
Copy link
Copy Markdown
Member

@Vtec234 Vtec234 commented May 7, 2026

This PR makes it impossible for openvscode-server instances to make requests against other instances (see #16).

They are still able to make requests for Next.js: this is blocked by vercel/next.js#26424 (which has been open for seven years, so unlikely to get resolved). This is somewhat lower risk since Next.js does enforce authentication on all routes. However, it does mean we should not be trusting headers that Nginx sets (because we don't know the request really is coming from Nginx).

Depends on #17.

@Vtec234 Vtec234 requested a review from jcreedcmu May 7, 2026 22:51
Comment thread nginx.conf.template
pid $NGINX_PID_PATH;
error_log $NGINX_ERROR_LOG_PATH;
# Run worker processes as root so that they can access root-owned Unix domain sockets.
user root;
Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is a bit scary. On the other hand restricting nginx workers only feels a bit security-theater to me: if we do that, we should make all processes (next.js, the nginx root process, the bwraps) run as unprivileged users as well.

@Vtec234 Vtec234 merged commit ddcef93 into main May 11, 2026
1 check passed
@Vtec234 Vtec234 deleted the uds branch May 11, 2026 15:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants