Max Rees 297de93aef abuild-sudo: don't allow --keys-dir
Not allowing --allow-untrusted is obviously a good idea, but it can be
trivially bypassed if --keys-dir is allowed:

$ abuild-apk add foo-1-r0.apk
ERROR: foo-1-r0.apk: UNTRUSTED signature
$ abuild-apk --allow-untrusted add foo-1-r0.apk
abuild-apk: --allow-untrusted: not allowed option
$ cp -rp /etc/apk/keys /tmp/keys
$ cp untrusted.pub /tmp/keys
$ abuild-apk --keys-dir /tmp/keys add foo-1-r0.apk
(1/1) Installing foo (1-r0)
OK: 4319 MiB in 806 packages

If both --allow-untrusted and --keys-dir are not allowed, then it should
no longer be possible for an unprivileged member of the abuild group to
add an untrusted package.

$ abuild-apk --keys-dir /tmp/keys add foo-1-r0.apk
abuild-apk: --keys-dir: not allowed option
2019-06-20 11:36:40 +02:00
2016-05-20 10:19:08 +02:00
2017-06-27 14:52:50 +03:00
2017-09-19 11:59:18 +00:00
2016-08-12 15:26:06 +02:00
2016-08-12 15:26:06 +02:00
2019-06-14 12:13:23 +00:00
2018-10-03 08:24:18 +00:00
2016-06-13 12:34:05 +00:00
Description
Build script to build Alpine packages (forked to remove busybox dependency)
1.2 MiB
Languages
Shell 61.4%
Roff 12%
C 10.4%
Perl 9.4%
Ruby 4.9%
Other 1.9%