https://bz.apache.org/SpamAssassin/show_bug.cgi?id=8089

            Bug ID: 8089
           Summary: Failed tests on CPAN, Insecure dependency in mkdir
                    while running with -T switch at ... File/Temp.pm line
                    542
           Product: Spamassassin
           Version: unspecified
          Hardware: PC
                OS: All
            Status: NEW
          Severity: minor
          Priority: P2
         Component: Regression Tests
          Assignee: dev@spamassassin.apache.org
          Reporter: sid...@sidney.com
  Target Milestone: Undefined

The following links are to test runs on a CPAN tester for 4.0.0rc4 that failed 
all tests with the error

Insecure dependency in mkdir while running with -T switch at
/home/cpan/pit/thr/perl-5.XX.Y/lib/site_perl/5.XX.Y/File/Temp.pm line 542.

for various versions of perl 5.XX.Y

The test runners were various Linux and Solaris, but significantly are all set
up by the same person. It looks like they have some unusual detail in their
test machine setup that results in the failure.

Since this is a failure only in running tests and is not in any production
environment nor in any other test environments including other CPAN test
runners, I don't consider it a blocker for the 4.0.0 release. However, if we
are able to track this down quickly enough, it is likely to be a minor fix to
test-only code (probably in setting up the working directory in SATest.pm) and
so will be able to commit for 4.0.0.

The test failure report links:

https://www.cpantesters.org/cpan/report/02a9b03e-7669-11ed-aba6-9a79f339625c
https://www.cpantesters.org/cpan/report/0995af4e-76da-11ed-aba6-9a79f339625c
https://www.cpantesters.org/cpan/report/0c96b06c-7685-11ed-aba6-9a79f339625c
https://www.cpantesters.org/cpan/report/16743abc-76be-11ed-aba6-9a79f339625c
https://www.cpantesters.org/cpan/report/45bded24-771b-11ed-aba6-9a79f339625c
https://www.cpantesters.org/cpan/report/483b5488-7711-11ed-aba6-9a79f339625c
https://www.cpantesters.org/cpan/report/4b357c44-7663-11ed-aba6-9a79f339625c
https://www.cpantesters.org/cpan/report/528aa006-7671-11ed-aba6-9a79f339625c
https://www.cpantesters.org/cpan/report/60213958-76fa-11ed-aba6-9a79f339625c
https://www.cpantesters.org/cpan/report/7aa75f84-764e-11ed-aba6-9a79f339625c
https://www.cpantesters.org/cpan/report/927e203a-76a2-11ed-aba6-9a79f339625c
https://www.cpantesters.org/cpan/report/a0bd731e-76ff-11ed-aba6-9a79f339625c
https://www.cpantesters.org/cpan/report/afe48458-7642-11ed-aba6-9a79f339625c
https://www.cpantesters.org/cpan/report/b7368ce4-7677-11ed-beb6-cd036e8775ea
https://www.cpantesters.org/cpan/report/bcd0825a-7694-11ed-aba6-9a79f339625c
https://www.cpantesters.org/cpan/report/f60bfc30-76b6-11ed-aba6-9a79f339625c

-- 
You are receiving this mail because:
You are the assignee for the bug.

Reply via email to