On Sat, Jul 29, 2006 at 01:15:27PM +0100, Stephen Gran wrote:
> > 
> > Please could you apply the attached patch to disable the checks?  (or 
> > rewrite
> > the checks in some way that doesn't break relative paths)
> 
> Or just use something like:
> 
> sub which {
>     my $progname = $_ ;
>     for my $dir (split /:/, $ENV{"PATH"}) {
>         if (-x "$dir/$progname" ) {
>             return "$dir/$progname";
>         }
>     }
>     return 0;
> }
> 
> And then use constructs like
> 
> if (which($postinst_hook)) {
>   ...
> }
> 
> I can't remember if you use taint mode and warnings and so forth, but if
> you do, substitute an array of known good paths for ENV{"PATH"}.

I think it's better (asides from easier) to just not check that, and let
scripts fail if something is indeed broken in /etc/kernel-img.conf.

Silently skipping broken commands in /etc/kernel-img.conf is not better than
failing and letting the user know about it, IMHO.

> In any event, I am not sure this is RC, but I'll let manoj deal with
> that.

It's release critical only on the basis that, without fixing this, a release
critical bug in another package (#361929) can't be properly addressed.

-- 
Robert Millan

My spam trap is [EMAIL PROTECTED]  Note: this address is only intended for
spam harvesters.  Writing to it will get you added to my black list.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to