Willkommen bei WordPress. Dies ist dein erster Beitrag. Bearbeite oder lösche ihn und beginne mit dem Schreiben!
Hallo Welt!
von raredesign | Dez 3, 2019 | Allgemein | 0 Kommentare
Cokiee Shell
Current Path : /proc/self/root/usr/share/apport/package-hooks/ |
Current File : //proc/self/root/usr/share/apport/package-hooks/source_grub2.py |
'''apport package hook for grub2 Author: Jean-Baptiste Lallement <jeanbaptiste.lallement@gmail.com> This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. See http://www.gnu.org/copyleft/gpl.html for the full text of the license. ''' from __future__ import print_function from apport.hookutils import * import os import subprocess import re def check_shell_syntax(path): ''' Check the syntax of a shell script ''' try: subprocess.check_call(['/bin/sh', '-n', path], stderr=open(os.devnull,'w')) except subprocess.CalledProcessError: return False return True def check_shell_syntax_harder(path): ''' Check the syntax of a shell script ''' try: # sh -n is tempting, but not good enough. Consider this case: # # GRUB_CMDLINE_LINUX_DEFAULT=”quiet splash nomodeset” # # The quotes are Unicode quotes, not valid in the shell and probably # caused by copying a line out of a web page. This is parsed as an # instruction to run the 'splash' command with argument 'nomodeset”' # and with the GRUB_CMDLINE_LINUX_DEFAULT environment variable set # to '”quiet'. 'sh -n' allows this because this is a valid parse # and it's possible that the command 'splash' might exist, but what # we need to know is whether sourcing the file will fail. # # Unfortunately this test may involve executing code. However, this # file is already sourced as root when running update-grub, so it # seems unlikely that this could do any further harm. subprocess.check_call(['/bin/sh', '-ec', '. %s' % re.escape(path)], stderr=open(os.devnull,'w')) except subprocess.CalledProcessError: return False return True def _attach_file_filtered(report, path, key=None): '''filter out password from grub configuration''' if not key: key = path_to_key(path) if os.path.exists(path): with open(path,'r') as f: filtered = [l if not l.startswith('password') else '### PASSWORD LINE REMOVED ###' for l in f.readlines()] report[key] = ''.join(filtered) def add_info(report): if report['ProblemType'] == 'Package': # To detect if root fs is a loop device attach_file(report, '/proc/cmdline','ProcCmdLine') _attach_file_filtered(report, '/etc/default/grub','EtcDefaultGrub') attach_file_if_exists(report, '/boot/grub/device.map', 'DeviceMap') invalid_grub_script = [] if not check_shell_syntax_harder('/etc/default/grub'): invalid_grub_script.append('/etc/default/grub') # Check scripts in /etc/grub.d since some users directly change # configuration there grubdir='/etc/grub.d' for f in os.listdir(grubdir): fullpath=os.path.join(grubdir, f) if f != 'README' and os.access(fullpath, os.X_OK) \ and not check_shell_syntax(fullpath): invalid_grub_script.append(fullpath) attach_file(report, fullpath) # TODO: Add some UI to ask if the user modified the invalid script # and if he still wants to report it if invalid_grub_script: report['InvalidGrubScript'] = ' '.join(invalid_grub_script) if __name__ == '__main__': r = {} r['ProblemType'] = 'Package' add_info(r) for k, v in r.items(): print('%s: "%s"' % (k, v)) print("========================================")
Cokiee Shell Web 1.0, Coded By Razor
Neueste Kommentare