On 04-Dec-17 13:34, James E Keenan wrote:
> On 12/04/2017 09:08 AM, Nigel Horne wrote:
>> I received a bunch of these today.  It may be blacklisting doit - in
>> case it's doing it to something you really don't want it to
>>
>>
>> gateway.bandsman.co.uk : Dec 4 08:17:02 : njh : a password is
>> required ; TTY=pts/0 ; PWD=/home/njh/.cpan/build/Doit-0.022-21 ;
>> USER=root ; COMMAND=/bin/true
>>
>> -Nigel
>
> Have CPAN testers or, perhaps, the Perl Toolchain Gang, ever published
> a list of badly behaved distributions?
>
> I have been compiling my own list of distros that are either dangerous
> (as Doit now appears to be), badly behaved (defaulting to invasive
> tests; rigged to require a response to a command prompt), defectively
> packaged (won't untar properly), or inappropriate for a given OS.
>
> That list has been built up through painful experience.  I think it
> would be beneficial to be able to share such a list with others and
> others' lists with mine.  Something perhaps less official than an
> official CPAN distro, but something to which trusted people could
> contribute.
>
> Thoughts?
>
> Thank you very much.
> Jim Keenan
I have no stake in Doit - but I did look at the documentation, and it
provides a documented "sudo" function.

I might not wish to run it - but how dangerous it is depends on what
user the test sudo's to.  E.g., sudo to NOBODY (the NFS "world" account
on many distributions) or the user running the test wouldn't upset me
greatly - but 'root' certainly would.

From your description, the test doesn't understand that a password may
be required to sudo.  Or that the installer may not have sudo privs -
but the other methods (not requiring privs) are available.

In any case, various OS privileges (e.g.  execute as sudo (and to which
users); files owned by root; setuid files; etc) probably ought to be
represented as dependencies - in which case test environments could
decide whether to allow them, and ordinary users could know if a module
is installable/usable by them.  You might want to take that up with the
meta spec folks.

The other items you've listed for "badly behaved" distributions seem to
be bugs that should be reported to & fixed by the distributions.  I can
see why you might like a blacklist while waiting for a fix - but I'd
hesitate to make it seem like an official escape clause for these behaviors.


Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to