Repocop reports by acl

  packager rpm id test status message
grenka python3-3.10.4-alt1.src specfile-url-permanent-https-redirect experimental Homepage link in URL is a permanent redirect to its HTTPS counterpart. Please, change URL protocol from http:// to https://. See https://repology.org/repository/altsisyphus/problems
grenka python3-tools-3.10.4-alt1.x86_64 freedesktop-desktop info desktop-file-validate utility printed the following message(s): /usr/share/applications/idle3.desktop: warning: value "Python 3 Integrated Development and Learning Environment" for key "Comment" in group "Desktop Entry" looks the same as that of key "GenericName"
/usr/share/applications/idle3.desktop: warning: value "??????????????? ????? ?????????? ? ???????? Python 3" for key "Comment[ru]" in group "Desktop Entry" looks the same as that of key "GenericName[ru]"
imz rpm-build-python-0.43.2-alt1.src altlinux-python-obsolete-buildreq-python-dev warn python-dev is obsolete according to Python Policy (http://www.altlinux.org/Python_Policy). Please, use BuildRequires: python-devel.
imz tests-for-installed-python3-pkgs-0.1.18-alt1.noarch missing-url info Missing Url: in a package.
manowar afl-2.56-alt4.b.git.f10d601.x86_64 checkbashisms experimental checkbashisms utility found possible bashisms in: /usr/bin/afl-whatsup
mike gammu-1.42.0-alt1.src specfile-url-permanent-https-redirect experimental Homepage link in URL is a permanent redirect to its HTTPS counterpart. Please, change URL protocol from http:// to https://. See https://repology.org/repository/altsisyphus/problems
Homepage link in URL is a permanent redirect to its HTTPS counterpart. Please, change URL protocol from http:// to https://. See https://repology.org/repository/altsisyphus/problems
Homepage link in URL is a permanent redirect to its HTTPS counterpart. Please, change URL protocol from http:// to https://. See https://repology.org/repository/altsisyphus/problems
Homepage link in URL is a permanent redirect to its HTTPS counterpart. Please, change URL protocol from http:// to https://. See https://repology.org/repository/altsisyphus/problems
Homepage link in URL is a permanent redirect to its HTTPS counterpart. Please, change URL protocol from http:// to https://. See https://repology.org/repository/altsisyphus/problems
Homepage link in URL is a permanent redirect to its HTTPS counterpart. Please, change URL protocol from http:// to https://. See https://repology.org/repository/altsisyphus/problems
Homepage link in URL is a permanent redirect to its HTTPS counterpart. Please, change URL protocol from http:// to https://. See https://repology.org/repository/altsisyphus/problems
Homepage link in URL is a permanent redirect to its HTTPS counterpart. Please, change URL protocol from http:// to https://. See https://repology.org/repository/altsisyphus/problems
Homepage link in URL is a permanent redirect to its HTTPS counterpart. Please, change URL protocol from http:// to https://. See https://repology.org/repository/altsisyphus/problems
Homepage link in URL is a permanent redirect to its HTTPS counterpart. Please, change URL protocol from http:// to https://. See https://repology.org/repository/altsisyphus/problems
Homepage link in URL is a permanent redirect to its HTTPS counterpart. Please, change URL protocol from http:// to https://. See https://repology.org/repository/altsisyphus/problems
Homepage link in URL is a permanent redirect to its HTTPS counterpart. Please, change URL protocol from http:// to https://. See https://repology.org/repository/altsisyphus/problems
Homepage link in URL is a permanent redirect to its HTTPS counterpart. Please, change URL protocol from http:// to https://. See https://repology.org/repository/altsisyphus/problems
Homepage link in URL is a permanent redirect to its HTTPS counterpart. Please, change URL protocol from http:// to https://. See https://repology.org/repository/altsisyphus/problems
mike gammu-1.42.0-alt1.x86_64 big-changelog info Package contains big ChangeLog. Gzip it.
mike gammu-1.42.0-alt1.x86_64 checkbashisms experimental checkbashisms utility found possible bashisms in: /usr/bin/gammu-config
mike mgetty-sendfax-1.2.1-alt1.x86_64 checkbashisms experimental checkbashisms utility found possible bashisms in: /usr/bin/faxspool
mike recoll-1.32.0-alt1.src requires-ImageMagick info Dependency on ImageMagick (compat package) found. It probably should be replaced with more specific dependency like /usr/bin/convert or ImageMagick-tools, or it can be already autodetected by findreq-shell.
mike recoll-1.32.0-alt1.x86_64 freedesktop-desktop info desktop-file-validate utility printed the following message(s): /usr/share/applications/recoll-searchgui.desktop: hint: value item "Filesystem" in key "Categories" in group "Desktop Entry" can be extended with another category among the following categories: System
/usr/share/applications/recoll-searchgui.desktop: hint: value item "Database" in key "Categories" in group "Desktop Entry" can be extended with another category among the following categories: Office, or Development, or AudioVideo
rider clickhouse-lts-server-21.8.15.7-alt1.x86_64 systemd-but-no-native-init experimental The package have native systemd file(s) but no SysV init scripts.
rider clickhouse-lts-test-21.8.15.7-alt1.x86_64 arch-dep-package-has-big-usr-share info The package has a significant amount of architecture-independent data in /usr/share, while it is an architecture-dependent package. This is wasteful of mirror space and bandwidth, as we then end up with multiple copies of this data, one for each architecture. If the data in /usr/share is not architecture-independent, it is a policy violation, and in this case, you should move that data elsewhere.
rider clickhouse-lts-test-21.8.15.7-alt1.x86_64 unsafe-tmp-usage-in-scripts fail The test discovered scripts with errors which may be used by a user for damaging important system files. For example if a script uses in its work a temp file which is created in /tmp directory, then every user can create symlinks with the same name (pattern) in this directory in order to destroy or rewrite some system or another user's files. Scripts _must_ _use_ mktemp/tempfile or must use $TMPDIR. mktemp/tempfile is safest. $TMPDIR is safer than /tmp/ because libpam-tmpdir creates a subdirectory of /tmp that is only accessible by that user, and then sets TMPDIR and other variables to that. Hence, it doesn't matter nearly as much if you create a non-random filename, because nobody but you can access it. Found error in /usr/share/clickhouse-test/queries/0_stateless/01658_read_file_to_stringcolumn.sh: $ grep /tmp/ /usr/share/clickhouse-test/queries/0_stateless/01658_read_file_to_stringcolumn.sh mkdir ${user_files_path}/ echo aaaaaaaaa > ${user_files_path}/a.txt echo bbbbbbbbb > ${user_files_path}/b.txt echo ccccccccc > ${user_files_path}/c.txt echo ccccccccc > /tmp/c.txt mkdir ${user_files_path}/dir ### 1st TEST in CLIENT mode. ${CLICKHOUSE_CLIENT} "drop table if exists data;" # Test non-exists file echo "clickhouse-client --query "'"select file('"'nonexist.txt'), file('${user_files_path}/b.txt')"'";echo :$?' | bash 2>/dev/null # Test isDir echo "clickhouse-client --query "'"select file('"'${user_files_path}/dir'), file('${user_files_path}/b.txt')"'";echo :$?' | bash 2>/dev/null # Test path out of the user_files directory. It's not allowed in client mode echo "clickhouse-client --query "'"select file('"'/tmp/c.txt'), file('${user_files_path}/b.txt')"'";echo :$?' | bash 2>/dev/null # Test relative path consists of ".." whose absolute path is out of the user_files directory. echo "clickhouse-client --query "'"select file('"'${user_files_path}/../../../../tmp/c.txt'), file('b.txt')"'";echo :$?' | bash 2>/dev/null echo "clickhouse-client --query "'"select file('"'../../../../a.txt'), file('${user_files_path}/b.txt')"'";echo :$?' | bash 2>/dev/null ### 2nd TEST in LOCAL mode. -- create table data (A String, B String) engine=MergeTree() order by A; select file('a.txt'), file('b.txt'); insert into data select file('a.txt'), file('b.txt'); insert into data select file('a.txt'), file('b.txt'); select file('c.txt'), usr from data; select file('/tmp/c.txt'), usr from data; select $c_count, $c_count -length(file('${CURDIR}/01518_nullable_aggregate_states2.reference')) " echo ":"$? -- # Restore rm -rf a.txt b.txt c.txt dir rm -rf ${user_files_path}/a.txt rm -rf ${user_files_path}/b.txt rm -rf ${user_files_path}/c.txt rm -rf /tmp/c.txt rm -rf ${user_files_path}/dir
rider clickhouse-test-22.3.6.5-alt1.x86_64 arch-dep-package-has-big-usr-share info The package has a significant amount of architecture-independent data in /usr/share, while it is an architecture-dependent package. This is wasteful of mirror space and bandwidth, as we then end up with multiple copies of this data, one for each architecture. If the data in /usr/share is not architecture-independent, it is a policy violation, and in this case, you should move that data elsewhere.
rider clickhouse-test-22.3.6.5-alt1.x86_64 unsafe-tmp-usage-in-scripts fail The test discovered scripts with errors which may be used by a user for damaging important system files. For example if a script uses in its work a temp file which is created in /tmp directory, then every user can create symlinks with the same name (pattern) in this directory in order to destroy or rewrite some system or another user's files. Scripts _must_ _use_ mktemp/tempfile or must use $TMPDIR. mktemp/tempfile is safest. $TMPDIR is safer than /tmp/ because libpam-tmpdir creates a subdirectory of /tmp that is only accessible by that user, and then sets TMPDIR and other variables to that. Hence, it doesn't matter nearly as much if you create a non-random filename, because nobody but you can access it. Found error in /usr/share/clickhouse-test/queries/0_stateless/01658_read_file_to_stringcolumn.sh: $ grep /tmp/ /usr/share/clickhouse-test/queries/0_stateless/01658_read_file_to_stringcolumn.sh mkdir ${CLICKHOUSE_USER_FILES_PATH}/ echo aaaaaaaaa > ${CLICKHOUSE_USER_FILES_PATH}/a.txt echo bbbbbbbbb > ${CLICKHOUSE_USER_FILES_PATH}/b.txt echo ccccccccc > ${CLICKHOUSE_USER_FILES_PATH}/c.txt echo ccccccccc > /tmp/c.txt mkdir ${CLICKHOUSE_USER_FILES_PATH}/dir ### 1st TEST in CLIENT mode. ${CLICKHOUSE_CLIENT} "drop table if exists data;" # Test non-exists file echo "${CLICKHOUSE_CLIENT} --query "'"select file('"'nonexist.txt'), file('b.txt')"'";echo :$?' | bash 2>/dev/null # Test isDir echo "${CLICKHOUSE_CLIENT} --query "'"select file('"'dir'), file('b.txt')"'";echo :$?' | bash 2>/dev/null # Test path out of the user_files directory. It's not allowed in client mode echo "${CLICKHOUSE_CLIENT} --query "'"select file('"'/tmp/c.txt'), file('b.txt')"'";echo :$?' | bash 2>/dev/null # Test relative path consists of ".." whose absolute path is out of the user_files directory. echo "${CLICKHOUSE_CLIENT} --query "'"select file('"'../../../../../../../../../../../../../../../../../../../tmp/c.txt'), file('b.txt')"'";echo :$?' | bash 2>/dev/null echo "${CLICKHOUSE_CLIENT} --query "'"select file('"'../../../../a.txt'), file('b.txt')"'";echo :$?' | bash 2>/dev/null ### 2nd TEST in LOCAL mode. -- create table data (A String, B String) engine=MergeTree() order by A; select file('a.txt'), file('b.txt'); insert into data select file('a.txt'), file('b.txt'); insert into data select file('a.txt'), file('b.txt'); select file('c.txt'), usr from data; select file('/tmp/c.txt'), usr from data; select $c_count, $c_count -length(file('${CURDIR}/01518_nullable_aggregate_states2.reference')) " echo ":"$? -- ${CLICKHOUSE_CLIENT} --query "SELECT s, count() FROM file('?', TSV, 's String') GROUP BY s ORDER BY s" # Restore rm ${CLICKHOUSE_USER_FILES_PATH}/{a,b,c}.txt rm ${CLICKHOUSE_USER_FILES_PATH}/{a,b,c} rm /tmp/c.txt rm -rf ${CLICKHOUSE_USER_FILES_PATH}/dir
rider fbreader-0.99.5-alt6.x86_64 freedesktop-desktop info desktop-file-validate utility printed the following message(s): /usr/share/applications/FBReader.desktop: warning: value "???? ????? ???????????" for key "Comment[ar]" in group "Desktop Entry" looks redundant with value "???? ????? ???????????" of key "GenericName[ar]"
/usr/share/applications/FBReader.desktop: hint: value item "Literature" in key "Categories" in group "Desktop Entry" can be extended with another category among the following categories: Education, or Science
rider libselinux-3.2-alt2.x86_64 subdir-in-var-run info Found a subdir in /var/run or /var/lock. /var/run and /var/lock may be mounted as temporary filesystems, so the init.d scripts must handle this correctly. This will typically amount to creating any required subdirectories dynamically when the init.d script is run, rather than including them in the package and relying on rpm to create them.
rider packagekit-1.2.5-alt5.x86_64 systemd-but-no-native-init experimental The package have native systemd file(s) but no SysV init scripts.
rider policycoreutils-gui-3.2-alt5.x86_64 freedesktop-desktop info desktop-file-validate utility printed the following message(s): /usr/share/applications/selinux-polgengui.desktop: warning: value "Tool zur Erstellung von SELinux-Richtlinien" for key "Comment[de]" in group "Desktop Entry" looks redundant with value "Tool zur Erstellung von SELinux-Richtlinien" of key "Name[de]"
rider policycoreutils-mcstransd-3.2-alt5.x86_64 init-lsb warn /etc/rc.d/init.d/mcstrans: lsb init header missing. See http://www.altlinux.org/Services_Policy for details.
rider policycoreutils-restorecond-3.2-alt5.x86_64 checkbashisms experimental checkbashisms utility found possible bashisms in: /etc/rc.d/init.d/restorecond
rider policycoreutils-restorecond-3.2-alt5.x86_64 init-lsb warn /etc/rc.d/init.d/restorecond: lsb init header missing. See http://www.altlinux.org/Services_Policy for details.
rider policycoreutils-sandbox-3.2-alt5.x86_64 init-but-no-native-systemd info The package have SysV init script(s) but no native systemd files.
rider policycoreutils-sandbox-3.2-alt5.x86_64 init-condrestart warn /etc/rc.d/init.d/sandbox: missing condrestart target. Note: alt-specific script %_sbindir/post_service (used in %post_service macro) depends on condrestart. It is wise to add condrestart anyway./etc/rc.d/init.d/sandbox: missing condstop target. Note: alt-specific script %_sbindir/preun_service (used in %preun_service macro) depends on condstop. It is wise to add condstop anyway.
rider policycoreutils-sandbox-3.2-alt5.x86_64 init-lsb fail /etc/rc.d/init.d/sandbox: not systemd compatible: lsb init header missing and sandbox.service is not present. See http://www.altlinux.org/Services_Policy for details.
rider synaptic-0.58-alt28.x86_64 arch-dep-package-has-big-usr-share info The package has a significant amount of architecture-independent data in /usr/share, while it is an architecture-dependent package. This is wasteful of mirror space and bandwidth, as we then end up with multiple copies of this data, one for each architecture. If the data in /usr/share is not architecture-independent, it is a policy violation, and in this case, you should move that data elsewhere.
rider transmission-3.00-alt2.1.src altlinux-policy-obsolete-buildreq warn Build dependency on rpm-build-ubt is obsolete and should be dropped to get rid of rpm-build-ubt package.
rider transmission-common-3.00-alt2.1.x86_64 arch-dep-package-consists-of-usr-share info The package consists of architecture-independent data in /usr/share, while it is an architecture-dependent package. This is wasteful of mirror space and bandwidth, as we then end up with multiple copies of this data, one for each architecture. If the data in /usr/share is not architecture-independent, it is a policy violation, and in this case, you should move that data elsewhere.
rider transmission-daemon-3.00-alt2.1.x86_64 init-lsb warn /etc/rc.d/init.d/transmission-daemon: lsb init header missing. See http://www.altlinux.org/Services_Policy for details.
rider vlc-mini-3.0.16-alt3.x86_64 arch-dep-package-has-big-usr-share info The package has a significant amount of architecture-independent data in /usr/share, while it is an architecture-dependent package. This is wasteful of mirror space and bandwidth, as we then end up with multiple copies of this data, one for each architecture. If the data in /usr/share is not architecture-independent, it is a policy violation, and in this case, you should move that data elsewhere.
rider vlc-mini-3.0.16-alt3.x86_64 unsafe-tmp-usage-in-scripts fail The test discovered scripts with errors which may be used by a user for damaging important system files. For example if a script uses in its work a temp file which is created in /tmp directory, then every user can create symlinks with the same name (pattern) in this directory in order to destroy or rewrite some system or another user's files. Scripts _must_ _use_ mktemp/tempfile or must use $TMPDIR. mktemp/tempfile is safest. $TMPDIR is safer than /tmp/ because libpam-tmpdir creates a subdirectory of /tmp that is only accessible by that user, and then sets TMPDIR and other variables to that. Hence, it doesn't matter nearly as much if you create a non-random filename, because nobody but you can access it. Found error in /usr/share/vlc/utils/audio-vlc-default.sh: $ grep -A5 -B5 /tmp/ /usr/share/vlc/utils/audio-vlc-default.sh MIME_FILE=~/.local/share/applications/defaults.list if [ ! -f $MIME_FILE ] then echo "[Default Applications]" > $MIME_FILE else grep -v 'audio/' $MIME_FILE > /tmp/vlc.defaults.list.tmp mv /tmp/vlc.defaults.list.tmp $MIME_FILE fi ls /usr/share/mime/audio/* | sed -e 's@/usr/share/mime/@@' -e 's/\.xml/=vlc.desktop/' >> $MIME_FILE Found error in /usr/share/vlc/utils/video-vlc-default.sh: $ grep -A5 -B5 /tmp/ /usr/share/vlc/utils/video-vlc-default.sh MIME_FILE=~/.local/share/applications/defaults.list if [ ! -f $MIME_FILE ] then echo "[Default Applications]" > $MIME_FILE else grep -v 'video/' $MIME_FILE > /tmp/vlc.defaults.list.tmp mv /tmp/vlc.defaults.list.tmp $MIME_FILE fi ls /usr/share/mime/video/* | sed -e 's@/usr/share/mime/@@' -e 's/\.xml/=vlc.desktop/' >> $MIME_FILE
zerg apt-indicator-0.3.20-alt2.src altlinux-policy-obsolete-buildreq warn Build dependency on rpm-build-ubt is obsolete and should be dropped to get rid of rpm-build-ubt package.
zerg apt-indicator-0.3.20-alt2.x86_64 freedesktop-categories warn Menu-related Additional Categories (http://standards.freedesktop.org/menu-spec/latest/apa.html) not found in /usr/share/applications/apt-indicator.desktop. Please add it or report a bug against this test if you already have registered one (not including menu unrelated ones as Core or Qt).
zerg kde5-digikam-7.6.0-alt2.src altlinux-policy-obsolete-buildreq warn Build dependency on rpm-build-ubt is obsolete and should be dropped to get rid of rpm-build-ubt package.
zerg kde5-digikam-7.6.0-alt2.src specfile-url-permanent-https-redirect experimental Homepage link in URL is a permanent redirect to its HTTPS counterpart. Please, change URL protocol from http:// to https://. See https://repology.org/repository/altsisyphus/problems
zerg kde5-digikam-7.6.0-alt2.x86_64 desktop-exec-fill-code warn org.kde.digikam.desktop: found MimeType= entry, but to handle it properly you have to declare one of %f,%F,%u,%U in Exec= entry. Note that %m is deprecated. See http://standards.freedesktop.org/desktop-entry-spec/desktop-entry-spec-1.0.html#exec-variables
zerg plasma5-discover-5.24.5-alt1.src altlinux-policy-obsolete-buildreq warn Build dependency on rpm-build-ubt is obsolete and should be dropped to get rid of rpm-build-ubt package.
zerg plasma5-discover-common-5.24.5-alt1.x86_64 arch-dep-package-consists-of-usr-share info The package consists of architecture-independent data in /usr/share, while it is an architecture-dependent package. This is wasteful of mirror space and bandwidth, as we then end up with multiple copies of this data, one for each architecture. If the data in /usr/share is not architecture-independent, it is a policy violation, and in this case, you should move that data elsewhere.
zerg plasma5-discover-packagekit-5.24.5-alt1.x86_64 arch-dep-package-has-big-usr-share info The package has a significant amount of architecture-independent data in /usr/share, while it is an architecture-dependent package. This is wasteful of mirror space and bandwidth, as we then end up with multiple copies of this data, one for each architecture. If the data in /usr/share is not architecture-independent, it is a policy violation, and in this case, you should move that data elsewhere.

generated by repocop at Mon May 23 05:06:32 2022