On Sat, Jul 29, 2006 at 01:15:27PM +0100, Stephen Gran wrote: > > > > Please could you apply the attached patch to disable the checks? (or > > rewrite > > the checks in some way that doesn't break relative paths) > > Or just use something like: > > sub which { > my $progname = $_ ; > for my $dir (split /:/, $ENV{"PATH"}) { > if (-x "$dir/$progname" ) { > return "$dir/$progname"; > } > } > return 0; > } > > And then use constructs like > > if (which($postinst_hook)) { > ... > } > > I can't remember if you use taint mode and warnings and so forth, but if > you do, substitute an array of known good paths for ENV{"PATH"}.
I think it's better (asides from easier) to just not check that, and let scripts fail if something is indeed broken in /etc/kernel-img.conf. Silently skipping broken commands in /etc/kernel-img.conf is not better than failing and letting the user know about it, IMHO. > In any event, I am not sure this is RC, but I'll let manoj deal with > that. It's release critical only on the basis that, without fixing this, a release critical bug in another package (#361929) can't be properly addressed. -- Robert Millan My spam trap is [EMAIL PROTECTED] Note: this address is only intended for spam harvesters. Writing to it will get you added to my black list. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]