diff -r 382f89c11e27 -r 646742c260bd eric6/Plugins/CheckerPlugins/CodeStyleChecker/Security/Checks/generalHardcodedTmp.py --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/eric6/Plugins/CheckerPlugins/CodeStyleChecker/Security/Checks/generalHardcodedTmp.py Tue Jun 09 20:10:59 2020 +0200 @@ -0,0 +1,57 @@ +# -*- coding: utf-8 -*- + +# Copyright (c) 2020 Detlev Offenbach <detlev@die-offenbachs.de> +# + +""" +Module implementing a check for insecure usage of tmp file/directory. +""" + +# +# This is a modified version of the one found in the bandit package. +# +# Original Copyright 2014 Hewlett-Packard Development Company, L.P. +# +# SPDX-License-Identifier: Apache-2.0 +# + + +def getChecks(): + """ + Public method to get a dictionary with checks handled by this module. + + @return dictionary containing checker lists containing checker function and + list of codes + @rtype dict + """ + return { + "Str": [ + (checkHardcodedTmpDirectory, ("S108",)), + ], + } + + +def checkHardcodedTmpDirectory(reportError, context, config): + """ + Function to check for insecure usage of tmp file/directory. + + @param reportError function to be used to report errors + @type func + @param context security context object + @type SecurityContext + @param config dictionary with configuration data + @type dict + """ + if config and "hardcoded_tmp_directories" in config: + tmpDirs = config["hardcoded_tmp_directories"] + else: + tmpDirs = ["/tmp", "/var/tmp", "/dev/shm", "~/tmp"] + + if any(context.stringVal.startswith(s) for s in tmpDirs): + reportError( + context.node.lineno - 1, + context.node.col_offset, + "S108", + "M", + "M", + )