[aur-general] Issue a warning while (re)packaging a binary package?
Jan Kohnert
nospam001-lists at jan-kohnert.de
Fri Jun 18 20:09:11 UTC 2021
Hi,
Am Freitag, 18. Juni 2021, 17:21:43 CEST schrieb alad via aur-general:
> On 18/06/2021 16:43, Jonathon Fernyhough via aur-general wrote:
> > On 18/06/2021 14:05, Jan Kohnert via aur-general wrote:
> >> a new version of a (binary) package I'm maintaining (clockify-desktop)
> >> requires an executable /tmp directory to run.
> >
> > My immediate questions would be why, and is this an upstream issue?
I really don't know. Upstream changed their version 2.0.2 by a new upload They
use S3 storage and have a unique filename for all versions; so I only figure out
changes by automatic nightly builds on my GitlLab that fails when the hash
changes. I contacted them and the answer I got was "the dev team works on a
new version". They promised to notify me when a new version is available, but I
can't tell when this will by the case.
> > Or, is an executable /tmp a reasonable assumption? 🤔
>
> I don't see anything in file-hierarchy(7) that mandates an executable
> /tmp. That said, it contains a hint that some programs might break:
>
> /tmp/, /var/tmp/ and /dev/shm/ should be mounted nosuid and
> nodev, which means that set-user-id mode and character or block
> special devices are not interpreted on those file systems. In
> general it is not possible to mount them noexec, because various
> programs use those directories for dynamically generated or
> optimized code, and with that flag those use cases would break.
> Using this flag is OK on special-purpose installations or systems
> where all software that may be installed is known and doesn't
> require such functionality. See the discussion of
> nosuid/nodev/noexec in mount(8) and PROT_EXEC in mmap(2).
Based on this, my setup seems a bit outdated. AFAIR the info to use noexec on /
tmp is from the time I switched to Gentoo at around 2004 to remove a possible
attack vector. There were even advices to mount /home and /var/tmp noexec to
prevent users from executing arbitary code, as then all user-writeable directories
whould be noexec. I never changed that setup at least for /tmp and /var/tmp for
newer machines, but I do get some errors for some python-related packages from
the AUR that require an executable /tmp for building.
So maybe I'll just change my setup and push the new version without adding a
warning.
Thanks for clearification. :)
--
MfG Jan
More information about the aur-general
mailing list