Репозиторий Sisyphus
Последнее обновление: 1 октября 2023 | Пакетов: 18631 | Посещений: 37643715
en ru br
Репозитории ALT

Группа :: Разработка/Ruby
Пакет: gem-foreman-hooks

 Главная   Изменения   Спек   Патчи   Sources   Загрузить   Gear   Bugs and FR  Repocop 


id пакета статус тест сообщение
gem-foreman-hooks-0.3.17-alt1.noarch
fail
unsafe-tmp-usage-in-scripts The test discovered scripts with errors which may be used by a user for damaging important system files. For example if a script uses in its work a temp file which is created in /tmp directory, then every user can create symlinks with the same name (pattern) in this directory in order to destroy or rewrite some system or another user's files. Scripts _must_ _use_ mktemp/tempfile or must use $TMPDIR. mktemp/tempfile is safest. $TMPDIR is safer than /tmp/ because libpam-tmpdir creates a subdirectory of /tmp that is only accessible by that user, and then sets TMPDIR and other variables to that. Hence, it doesn't matter nearly as much if you create a non-random filename, because nobody but you can access it. Found error in /usr/lib/ruby/gemie/gems/foreman_hooks-0.3.17/examples/bash/log.sh: $ grep /tmp/ /usr/lib/ruby/gemie/gems/foreman_hooks-0.3.17/examples/bash/log.sh # Example of using hook_data to query the JSON representation of the object # passed by foreman_hooks. `cat $HOOK_OBJECT_FI... [the rest of the message is skipped]
gem-foreman-hooks-doc-0.3.17-alt1.noarch
ok
checkbashisms
gem-foreman-hooks-doc-0.3.17-alt1.noarch
ok
unsafe-tmp-usage-in-scripts
gem-foreman-hooks-doc-0.3.17-alt1.noarch
ok
sisyphus_check
gem-foreman-hooks-doc-0.3.17-alt1.noarch
ok
buildroot
gem-foreman-hooks-0.3.17-alt1.noarch
ok
checkbashisms
gem-foreman-hooks-0.3.17-alt1.noarch
ok
sisyphus_check
gem-foreman-hooks-0.3.17-alt1.noarch
ok
buildroot
 
дизайн и разработка: Vladimir Lettiev aka crux © 2004-2005, Andrew Avramenko aka liks © 2007-2008
текущий майнтейнер: Michael Shigorin