You’re right, apparently amongst other things there are some hooks that are ran during the package’s lifecycle in something that is called the control archive.
Software developer interested into security and sustainability.
- 0 Posts
- 14 Comments
Actually it’s just an archive. It can be easily extracted using
dpkg -x *.deb ~/.local
for example.
ClemaX@lemm.eeto Programming@programming.dev•Make my application extendable by "mods"?17·3 months agoEval is bad for security boundaries and the string based approach is a pain to develop and maintain. An alternative that is equally bad for security but better for development would be dynamic imports using importlib.
If you want to support custom scripts while enforcing security boundaries, you could use an embeddable interpreter like lua, or create your own.
It all makes sense when you think about the way it will be parsed. I prefer to use newlines instead of semicolons to show the blocks more clearly.
for file in *.txt do cat "$file" done
The
do
anddone
serve as the loop block delimiters. Such as{
and}
in many other languages. The shell parser couldn’t know where stuff starts/ends.Edit: I agree that the
then
/fi
,do
/done
case
/esac
are very inconsistent.Also to fail early and raise errors on uninitialized variables, I recommend to add this to the beginning of your bash scripts:
set -euo pipefail
Or only this for regular sh scripts:
set -eu
-e
: Exit on error-u
: Error on access to undefined variable-o pipefail
: Abort pipeline early if any part of it fails.There is also
-x
that can be very useful for debugging as it shows a trace of every command and result as it is executed.
ClemaX@lemm.eeto Programming@programming.dev•Firebase alternative recommendation based on your experience?2·5 months agoWhat are you missing on Firebase?
ClemaX@lemm.eeto Asklemmy@lemmy.ml•What's a piece of advice you think everyone can benefit from?6·6 months agoThe quieter you become, the more you are able to hear – Rumi
I don’t think that browsers do that. There is HSTS but I think that it only checks if the connection is using TLS.
I think you may want to use
for device in /dev/disk/by-uuid/*
That doesn’t explain why you aren’t seeing messages. I see there is a shebang at the start of the script. Can you confirm that the script has the executable bit set for the root user?
It works with USB interfaces using passthrough. But yeah doesn’t make a lot of sense.
I think it helps to cool the drink and inot only satisfactory.
I do not have a lot of experience with commerce but you’re supposed to optimize the customer experience. If the customer needs an account to add something to the cart, he might abandon his purchase during the account creation process.
Only some percentage of all potential users will abandon the purchase due to something like this, but your goal is to reduce this percentage as much as possible.
That’s why analytics are used to understand which environment leads to the most purchases and prevent users from abandoning the process.
ClemaX@lemm.eeto Asklemmy@lemmy.ml•Which inedible substances/objects do you think might otherwise make for a delicious blended drink/smoothie?3·2 years agoPhosphorescent light-rods.
Maybe Firefox needs to add a new “Clipboard access” permission that can be granted on a site-per-site basis. When disabled, simple highlight and copy could still be enabled if hidden text cannot be added in between normal text.
The same permission model could be used system wide, but I do not think that such a feature exists on the X server or Wayland. Maybe using a wrapper that runs before the Desktop Environment?
It is an issue in a managed environment such as on corporation or school PCs.