Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ntfy: Add version 1.25.2 #3594

Merged
merged 3 commits into from
Jun 4, 2022
Merged

ntfy: Add version 1.25.2 #3594

merged 3 commits into from
Jun 4, 2022

Conversation

kzshantonu
Copy link
Contributor

@rashil2000
Copy link
Member

rashil2000 commented May 21, 2022

Manifest is fine but the archive is giving me a Trojan alert (Windows Defender)

image

@binwiederhier
Copy link

Oh my. Why would that be?! I just built this today (https://github.com/binwiederhier/ntfy/releases). Maybe because Windows hasn't seen it before? It's not signed or anything, maybe that's it?

@binwiederhier
Copy link

Okay, so the description is actually correct: It does allow executing commands (https://ntfy.sh/docs/subscribe/cli/#run-command-for-every-message), which is part of the appeal. So I'm not quite sure how to "fix" this...

@kzshantonu
Copy link
Contributor Author

@binwiederhier
Copy link

This is the code that's likely causing this alert: https://github.com/binwiederhier/ntfy/blob/main/cmd/subscribe.go

@rashil2000
Copy link
Member

You could try signing the release binaries, though I'm not sure if that'll fix the problem entirely

@tech189
Copy link
Member

tech189 commented May 25, 2022

Microsoft Defender isn't flagging the zip or the exe for me. Even when manually scanning them.

@rashil2000
Copy link
Member

It's still flagging for me on Windows 11 Build 22621.1

@binwiederhier
Copy link

I can look at this when I have some time, maybe later this week. I opened a ticket to track it. binwiederhier/ntfy#269

However, fundamentally this is what the subscribe command does. Idk how to overcome this, since it's a feature

@issaclin32 issaclin32 added the upstream Waiting for upstream (the developers of the software) to fix the problem label May 26, 2022
@binwiederhier
Copy link

Apparently it is common for Go binaries to be flagged by virus scanners, so common that they dedicated a FAQ item to it: https://go.dev/doc/faq#virus

There's also a 5 months young Reddit post about it: https://www.reddit.com/r/golang/comments/rism9x/why_does_windows_defender_still_flag_gobinaries/

The bottom line is: There's nothing I can do about it. I manually re-read the code of subscribe.go, and it's injecting the environment variables from the remote message, NOT the command. So those scanners are all wrong.

I understand if that means you cannot accept the binary, and I'm okay with that. It's sad, but I'll like (and so will the ntfy users). You've certainly had this case before, what do you suggest?

@rashil2000
Copy link
Member

rashil2000 commented May 30, 2022

Thank you for taking the time to look into this.

Just as an info, Scoop's installation of this package proceeds successfully. The warning arises when you try to run the binary after installation.

I built the binary locally (make cli-windows-amd64) and it works fine.

In these cases we usually ask users to just add an exception for the particular package in the antivirus settings. Users still require a baseline level of trust in order to add the exception, and hence I'd ask the authors to set up a CD/workflow in the repo to create and upload release binaries transparently and automatically (I see currently the releases are created and uploaded by the author himself).

@binwiederhier
Copy link

I can add a CI pipeline to build and upload. I wanted to do that anyway (binwiederhier/ntfy#36), so this is just one more reason to do it.

@binwiederhier
Copy link

The latest release is now entirely deployed from GitHub Actions:

If you scroll down there's a step "Print build results and checksums" which will contain the checksums from the built artifacts.

@rashil2000
Copy link
Member

rashil2000 commented Jun 4, 2022

Turns out the latest release doesn't get flagged; the 1.24.0 release stopped getting flagged too. It's a bit intermittent:
image

@kzshantonu can you update the PR to the latest release?

@kzshantonu kzshantonu changed the title ntfy: Add version 1.23.0 ntfy: Add version 1.25.2 Jun 4, 2022
@rashil2000
Copy link
Member

/verify

@github-actions
Copy link
Contributor

github-actions bot commented Jun 4, 2022

All changes look good.

Wait for review from human collaborators.

ntfy

  • Description
  • License
  • Hashes
  • Checkver
  • Autoupdate
  • Autoupdate Hash Extraction

@rashil2000 rashil2000 merged commit 85e8154 into ScoopInstaller:master Jun 4, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
review-needed upstream Waiting for upstream (the developers of the software) to fix the problem
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants