[PATCH] plattform: OpenBSD does no longer support kern.usermount sysctl
david.dahlberg at fkie.fraunhofer.de
david.dahlberg at fkie.fraunhofer.de
Wed Jul 5 10:08:04 CEST 2017
From: David Dahlberg <david.dahlberg at fkie.fraunhofer.de>
---
src/platform/openbsd.sh | 34 ----------------------------------
1 file changed, 34 deletions(-)
diff --git a/src/platform/openbsd.sh b/src/platform/openbsd.sh
index b66b32f..ace9a7b 100644
--- a/src/platform/openbsd.sh
+++ b/src/platform/openbsd.sh
@@ -2,39 +2,5 @@
# Copyright (C) 2015 David Dahlberg <david.dahlberg at fkie.fraunhofer.de>. All Rights Reserved.
# This file is licensed under the GPLv2+. Please see COPYING for more information.
-tmpdir() {
- [[ -n $SECURE_TMPDIR ]] && return
- local warn=1
- [[ $1 == "nowarn" ]] && warn=0
- local template="$PROGRAM.XXXXXXXXXXXXX"
- if [[ $(sysctl -n kern.usermount) == 1 ]]; then
- SECURE_TMPDIR="$(mktemp -d "${TMPDIR:-/tmp}/$template")"
- mount -t tmpfs -o -s16M tmpfs "$SECURE_TMPDIR" || die "Error: could not create tmpfs."
- unmount_tmpdir() {
- [[ -n $SECURE_TMPDIR && -d $SECURE_TMPDIR ]] || return
- umount "$SECURE_TMPDIR"
- rm -rf "$SECURE_TMPDIR"
- }
- trap unmount_tmpdir INT TERM EXIT
- else
- [[ $warn -eq 1 ]] && yesno "$(cat <<-_EOF
- The sysctl kern.usermount is disabled, therefore it is not
- possible to create a tmpfs for temporary storage of files
- in memory.
- This means that it may be difficult to entirely erase
- the temporary non-encrypted password file after editing.
-
- Are you sure you would like to continue?
- _EOF
- )"
- SECURE_TMPDIR="$(mktemp -d "${TMPDIR:-/tmp}/$template")"
- shred_tmpfile() {
- find "$SECURE_TMPDIR" -type f -exec $SHRED {} +
- rm -rf "$SECURE_TMPDIR"
- }
- trap shred_tmpfile INT TERM EXIT
- fi
-}
-
GETOPT="gnugetopt"
SHRED="rm -P -f"
--
2.13.2
More information about the Password-Store
mailing list