Package alterator-net-domain: Repocop

Status
Test name
Message
alterator-net-domain-0.7.3-alt4x86_64
ok
buildrootApr 16, 2024, 02:28 AM-
alterator-net-domain-0.7.3-alt4x86_64
error
unsafe-tmp-usage-in-scriptsApr 16, 2024, 02:28 AMThe test discovered scripts with errors which may be used by a user for damaging important system files. For example if a script uses in its work a temp file which is created in /tmp directory, then every user can create symlinks with the same name (pattern) in this directory in order to destroy or rewrite some system or another user's files. Scripts _must_ _use_ mktemp/tempfile or must use $TMPDIR. mktemp/tempfile is safest. $TMPDIR is safer than /tmp/ because libpam-tmpdir creates a subdirectory of /tmp that is only accessible by that user, and then sets TMPDIR and other variables to that. Hence, it doesn't matter nearly as much if you create a non-random filename, because nobody but you can access it. Found error in /usr/lib/alterator/backend3/net-domain: $ grep /tmp/ /usr/lib/alterator/backend3/net-domain ## https://www.altlinux.org/ActiveDirectory/DC ad_provision_domain() { local domain_name="$1" shift local log="/tmp/samba-dc-provision-$(date +%d.%m.%Y-%H:%M:%S)-$domain_name.log" # Begin log date > "$log" echo "Domain: $domain_name" >> "$log" echo >> "$log" if [ "$in_domain_type" = 'ad' ]; then if ipa_install_running; then ipa_install_stop fi env > /tmp/net-domain.txt ad_current_domain="$($samba_tool domain info '127.0.0.1' | sed 's/ *: /:/' | sed -n 's/^Domain://p')" # Check creation of existing domain if [ "$ad_current_domain" != "$in_domain" ]; then write_domain "$in_domain" "1";
alterator-net-domain-0.7.3-alt4x86_64
skip
iconsdirApr 16, 2024, 02:28 AM-
alterator-net-domain-0.7.3-alt4x86_64
ok
checkbashismsApr 16, 2024, 02:28 AM-
alterator-net-domain-0.7.3-alt4x86_64
ok
sisyphus_checkApr 16, 2024, 02:28 AM-
alterator-net-domain-0.7.3-alt4x86_64
skip
init-condrestartApr 16, 2024, 02:28 AM-