Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Backport staging-24.05] stdenv: make sure the env-vars file created is not world readable #332347

Merged
merged 2 commits into from
Aug 29, 2024

Conversation

github-actions[bot]
Copy link
Contributor

@github-actions github-actions bot commented Aug 4, 2024

Bot-based backport to staging-24.05, triggered by a label in #331576.

Also backported #335593

  • Before merging, ensure that this backport is acceptable for the release.
    • Even as a non-commiter, if you find that it is not acceptable, leave a comment.

Under some circumstances this file might contain private information
that should not be accessible to everybody.

(cherry picked from commit c47a1e7)
@LeSuisse
Copy link
Contributor

Converting to draft, it causes an issue on Darwin, see #335016

This fixes the regression introduced by c47a1e7
on Darwin. The creation of the file using `install` and process
substitution does not work on Darwin, you get the following complain:
```
install: skipping file '/dev/fd/63', as it was replaced while being copied
```

Fixes #335016

(cherry picked from commit d00775c)
@github-actions github-actions bot added the 6.topic: stdenv Standard environment label Aug 22, 2024
@LeSuisse
Copy link
Contributor

Backported ##335593 for the Darwin issue, this should be good to go.

@LeSuisse LeSuisse marked this pull request as ready for review August 22, 2024 19:43
@smancill
Copy link
Contributor

Merging since this is the same change as approved #335593

@smancill smancill merged commit 2487134 into staging-24.05 Aug 29, 2024
27 of 29 checks passed
@pbsds pbsds deleted the backport-331576-to-staging-24.05 branch August 29, 2024 01:49
@nixos-discourse
Copy link

This pull request has been mentioned on NixOS Discourse. There might be relevant details there:

https://discourse.nixos.org/t/security-advisory-environment-variables-accessible-during-a-build-might-be-world-readable/52601/1

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants