Important notice: do not execute this script directly from an automatic checkout
of plat/al. It would be extremely unwise to execute it with root privileges from
-a place where everybody can change it !
+a place where everybody can change it!
Usage (-w updates the local .htaccess to disable guilty working copies):
- check_security_fixes.py [-w] -b REFERENCE_PLATAL PLATAL_TO_CHECK ...
+ check_security_fixes.py [-w] -b REFERENCE_PLATAL PLATAL_TO_CHECK...
"""
import optparse
ref_file = os.path.join(self.reference_path, security_file)
wc_file = os.path.join(self.checkout_path, security_file)
- diff = os.popen('diff -NBwu0 %s %s' % (ref_file, wc_file))
+ diff = os.popen('diff -NBw -U 0 %s %s' % (ref_file, wc_file))
for line in diff.readlines():
if self.SECURITY_FIX_RE.match(line):
yield line[1:-1]
most deployment will want to execute this script with root privileges,
which implies that this script is deployed in a safe directory, and not
just executed from an automatically updated checkout of plat/al (how
- unsafe would that be ...)."""
+ unsafe would that be...)."""
base_script = os.path.join(base_path, 'bin/check_security_fixes.py')
local_script = os.path.abspath(sys.argv[0])