Repocop reports by srpm

  rpm id test status message
menu-2.1.41-alt22.qa1.src beehive-log-unpackaged-files-found-i586 info warning: Installed (but unpackaged) file(s) found:
/etc/menu-methods/xdg-desktop-entry-spec-dirs
/etc/menu-methods/xdg-menu-spec
/usr/share/doc/menu/BUGS
/usr/share/doc/menu/README
/usr/share/doc/menu/README.translations
/usr/share/doc/menu/examples/9wm
/usr/share/doc/menu/examples/README
/usr/share/doc/menu/examples/afterstep
/usr/share/doc/menu/examples/afterstep-joost
/usr/share/doc/menu/examples/cat
/usr/share/doc/menu/examples/ctwm
/usr/share/doc/menu/examples/dwww
/usr/share/doc/menu/examples/example_executable_menufile
/usr/share/doc/menu/examples/fvwm
/usr/share/doc/menu/examples/fvwm2
/usr/share/doc/menu/examples/fvwm95
/usr/share/doc/menu/examples/gnome-panel
/usr/share/doc/menu/examples/menu.config
/usr/share/doc/menu/examples/menu.h
/usr/share/doc/menu/examples/menu.h.translate
/usr/share/doc/menu/examples/pdmenu
/usr/share/doc/menu/examples/system.9wmrc-menu
/usr/share/doc/menu/examples/system.ctwmrc-menu
/usr/share/doc/menu/examples/system.fvwm2rc
/usr/share/doc/menu/examples/system.fvwm2rc95
/usr/share/doc/menu/examples/system.fvwmrc-menu
/usr/share/doc/menu/examples/system.steprc-menu
/usr/share/doc/menu/examples/system.twmrc-menu
/usr/share/doc/menu/examples/translate_menus
/usr/share/doc/menu/examples/twm
/usr/share/doc/menu/html/ch1.html
/usr/share/doc/menu/html/ch2.html
/usr/share/doc/menu/html/ch3.html
/usr/share/doc/menu/html/ch4.html
/usr/share/doc/menu/html/ch5.html
/usr/share/doc/menu/html/ch6.html
/usr/share/doc/menu/html/ch7.html
/usr/share/doc/menu/html/ch8.html
/usr/share/doc/menu/html/index.html
/usr/share/doc/menu/menu.sgml
/usr/share/doc/menu/menu.txt.gz
menu-2.1.41-alt22.qa1.src beehive-log-unpackaged-files-found-x86_64 info warning: Installed (but unpackaged) file(s) found:
/etc/menu-methods/xdg-desktop-entry-spec-dirs
/etc/menu-methods/xdg-menu-spec
/usr/share/doc/menu/BUGS
/usr/share/doc/menu/README
/usr/share/doc/menu/README.translations
/usr/share/doc/menu/examples/9wm
/usr/share/doc/menu/examples/README
/usr/share/doc/menu/examples/afterstep
/usr/share/doc/menu/examples/afterstep-joost
/usr/share/doc/menu/examples/cat
/usr/share/doc/menu/examples/ctwm
/usr/share/doc/menu/examples/dwww
/usr/share/doc/menu/examples/example_executable_menufile
/usr/share/doc/menu/examples/fvwm
/usr/share/doc/menu/examples/fvwm2
/usr/share/doc/menu/examples/fvwm95
/usr/share/doc/menu/examples/gnome-panel
/usr/share/doc/menu/examples/menu.config
/usr/share/doc/menu/examples/menu.h
/usr/share/doc/menu/examples/menu.h.translate
/usr/share/doc/menu/examples/pdmenu
/usr/share/doc/menu/examples/system.9wmrc-menu
/usr/share/doc/menu/examples/system.ctwmrc-menu
/usr/share/doc/menu/examples/system.fvwm2rc
/usr/share/doc/menu/examples/system.fvwm2rc95
/usr/share/doc/menu/examples/system.fvwmrc-menu
/usr/share/doc/menu/examples/system.steprc-menu
/usr/share/doc/menu/examples/system.twmrc-menu
/usr/share/doc/menu/examples/translate_menus
/usr/share/doc/menu/examples/twm
/usr/share/doc/menu/html/ch1.html
/usr/share/doc/menu/html/ch2.html
/usr/share/doc/menu/html/ch3.html
/usr/share/doc/menu/html/ch4.html
/usr/share/doc/menu/html/ch5.html
/usr/share/doc/menu/html/ch6.html
/usr/share/doc/menu/html/ch7.html
/usr/share/doc/menu/html/ch8.html
/usr/share/doc/menu/html/index.html
/usr/share/doc/menu/menu.sgml
/usr/share/doc/menu/menu.txt.gz
menu-2.1.41-alt22.qa1.x86_64 checkbashisms experimental checkbashisms utility found possible bashisms in: /usr/bin/xdg-desktop-entry-spec-apps-postrun /usr/sbin/update-menus
menu-2.1.41-alt22.qa1.x86_64 unsafe-tmp-usage-in-scripts info The test discovered scripts with errors which may be used by a user for damaging important system files. For example if a script uses in its work a temp file which is created in /tmp directory, then every user can create symlinks with the same name (pattern) in this directory in order to destroy or rewrite some system or another user's files. Scripts _must_ _use_ mktemp/tempfile or must use $TMPDIR. mktemp/tempfile is safest. $TMPDIR is safer than /tmp/ because libpam-tmpdir creates a subdirectory of /tmp that is only accessible by that user, and then sets TMPDIR and other variables to that. Hence, it doesn't matter nearly as much if you create a non-random filename, because nobody but you can access it. Found error in /usr/share/doc/menu-2.1.41/examples/cat: $ grep -A5 -B5 /tmp/ /usr/share/doc/menu-2.1.41/examples/cat #!/bin/sh cat > /tmp/menu-stdin exit 0 #In the good old days of menu-0 compatibility, one had to use: -- # #This file can be very usefull when you want to run one particular # #menu-method file several times, without running any of the others. # #In order to do so, do: # # - cp ./cat /etc/menu-methods/ # # - run update-menus so that the "cat" menu-method gets executed. # # Now you've got /tmp/menu-stdin. # # - With this file, you don't need update-menus at all any more, and you # # can symply run your hand-written "menu-test" menu-method by typing: # # ./menu-test < /tmp/menu-stdin # # # # The advantage of doing this is # # - none of the other menu-method files get excecuted (speedup) # # - update-menus doesn't need to open some hundred menu-entry files # # every time you test a change in your menu-method file. # # (speedup) # compat="menu-1" # command="cat > /tmp/menu-stdin"

generated by repocop at Sun Feb 23 04:27:10 2020