Repocop reports by srpm

  rpm id test status message
environment-modules-4.4.1-alt1_2.src beehive-log-unpackaged-files-found-i586 info warning: Installed (but unpackaged) file(s) found:
/etc/profile.d/modules.csh
/etc/profile.d/modules.sh
/usr/bin/modulecmd
/usr/lib/rpm/macros.d/environment-modules
/usr/share/doc/environment-modules/CONTRIBUTING.txt
/usr/share/doc/environment-modules/ChangeLog
/usr/share/doc/environment-modules/MIGRATING.txt
/usr/share/doc/environment-modules/NEWS.txt
/usr/share/doc/environment-modules/README
/usr/share/doc/environment-modules/diff_v3_v4.txt
/usr/share/doc/environment-modules/example.txt
environment-modules-4.4.1-alt1_2.src beehive-log-unpackaged-files-found-x86_64 info warning: Installed (but unpackaged) file(s) found:
/etc/profile.d/modules.csh
/etc/profile.d/modules.sh
/usr/bin/modulecmd
/usr/lib/rpm/macros.d/environment-modules
/usr/share/doc/environment-modules/CONTRIBUTING.txt
/usr/share/doc/environment-modules/ChangeLog
/usr/share/doc/environment-modules/MIGRATING.txt
/usr/share/doc/environment-modules/NEWS.txt
/usr/share/doc/environment-modules/README
/usr/share/doc/environment-modules/diff_v3_v4.txt
/usr/share/doc/environment-modules/example.txt
environment-modules-4.4.1-alt1_2.x86_64 big-changelog info Package contains big ChangeLog. Gzip it.
environment-modules-4.4.1-alt1_2.x86_64 unsafe-tmp-usage-in-scripts fail The test discovered scripts with errors which may be used by a user for damaging important system files. For example if a script uses in its work a temp file which is created in /tmp directory, then every user can create symlinks with the same name (pattern) in this directory in order to destroy or rewrite some system or another user's files. Scripts _must_ _use_ mktemp/tempfile or must use $TMPDIR. mktemp/tempfile is safest. $TMPDIR is safer than /tmp/ because libpam-tmpdir creates a subdirectory of /tmp that is only accessible by that user, and then sets TMPDIR and other variables to that. Hence, it doesn't matter nearly as much if you create a non-random filename, because nobody but you can access it. Found error in /usr/share/Modules/bin/add.modules: $ grep -A5 -B5 /tmp/ /usr/share/Modules/bin/add.modules $3 > $2 } # find if certain of the dot files have load lines already findload() { grep "^[ ]*module[ ]*load" $1 > /tmp/load.$$ } # put common stuff derivatives here $1=.dot_file $2=action $3=shell(csh,sh) $4=skel alternative shdot() { if [ -f $1 ] then /bin/cat <> $1 else /bin/cat >> $1 < $1 <> $1 else /bin/cat >> $1 <> $1 <> $1 && /bin/rm /tmp/$1.$$ elif [ x$2 = xalias ] then /bin/cat <> $1 && /bin/rm /tmp/$1.$$ fi else /bin/echo "Had problems with your $1" fi else /bin/cat < /dev/null } # process files in $HOME cd $HOME if [ -r .bash_profile ]; then

generated by repocop at Mon Jul 13 04:22:35 2020