Search Criteria
Package Details: pwsafe r5.3e23fa2-1
Package Actions
Git Clone URL: | https://aur.archlinux.org/pwsafe.git (read-only, click to copy) |
---|---|
Package Base: | pwsafe |
Description: | A commandline program for managing encrypted password databases |
Upstream URL: | https://github.com/nsd20463/pwsafe |
Licenses: | GPL |
Submitter: | Barthalion |
Maintainer: | graysky |
Last Packager: | graysky |
Votes: | 4 |
Popularity: | 0.000000 |
First Submitted: | 2018-01-07 16:39 (UTC) |
Last Updated: | 2022-03-19 12:02 (UTC) |
Dependencies (3)
- libxmu
- openssl (openssl-gitAUR, openssl-staticAUR)
- git (git-gitAUR, git-glAUR) (make)
Latest Comments
1 2 Next › Last »
rwd2 commented on 2020-09-07 10:39 (UTC)
yes.
graysky commented on 2020-09-07 10:33 (UTC)
So the package as-is works as expected?
rwd2 commented on 2020-09-07 06:00 (UTC)
The developer clarified it: "There is no rand file, and there won't be one. The difference is that with the patch, you no longer get randomly names files in the current directory after running pwsafe. And since you know why, you can safely ignore the warning."
So commit 7cf95579fd0c0849749b1f1dcbd67ca143f76b61 can apparently be safely run in setuid, it will still give the 'WARNING: pwsafe unable to seed rng. Check $RANDFILE' warning, but in this case it can be ignored.
rwd2 commented on 2020-09-06 16:12 (UTC)
Sorry I thought it worked, but it didn't. So I commented that in the bug report.
graysky commented on 2020-09-06 15:06 (UTC)
Is this true? I see you deleted the comment here so I assume 20200906-1 works?
graysky commented on 2020-09-06 10:24 (UTC)
@rwd2 - Thanks, try 20200906-1
rwd2 commented on 2020-09-06 06:35 (UTC)
The developer responded in https://github.com/nsd20463/pwsafe/issues/19 . He recommends to keep using setuid and added a patch to make it work.
rwd2 commented on 2020-09-05 17:35 (UTC)
Hi Graysky,
All I am saying is that if I remove setuid it works without the $RANDFILE error. I don't know if it was your choice to package it that way. Maybe check with the developer what the best solution is. I noted in the upstream bug that setuid combined with the secure_getenv function was the underlying problem.
graysky commented on 2020-09-05 17:25 (UTC) (edited on 2020-09-05 17:25 (UTC) by graysky)
@rwd2 - To be clear, you're asserting that I need to modify the PKGBUILD NOT to include the setuid flag?
1 2 Next › Last »