So, serde seems to be downloading and running a binary on the system without informing the user and without any user consent. Does anyone have any background information on why this is, and how this is supposed to be a good idea?
dtolnay seems like a smart guy, so I assume there is a reason for this, but it doesn’t feel ok at all.
You can read a
build.rs
script.Then there’s this: http://cm.bell-labs.co/who/ken/trust.html
I’m not sure I follow what that link has to do with this, though.
serde
is open source, anyone can go compile it themselves. In fact, from what I can tell, to get the precompiled version ofserde_derive
, you need to compile it yourself anyway. Compiling these proc-macros to binaries before executing the code isn’t new, this is what Cargo does with all proc macros.Also, I might be misreading the source here, but it looks like the executable needs to be manually compiled by the user on their own (by running the
precompiled/build.sh
script), and they need to manually add the precompiled variant ofserde_derive
as a dependency instead of using the version that’s on crates.io. Am I missing something here? Is this automatically used by the published version ofserde
somewhere?No,
serde_derive
contains the binary and if you are on linux it will try to run it without asking the user. In fact there’s no way to make it so it won’t run.You can read the source of build.rs and and proc macros executed during a build, but do you? Does anyone do that every time they add a new dependency?
When adding a new dependency I almost always go over the source code to see what kind of performance to expect. If
build.rs
is there - checking it takes a single click so yes to that too. Derive macro - less frequently, but you have to do it when documentation is non existent.