Re: [ima-evm-utils PATCH 04/14] tests: Address issues raised by shellcheck SC2320

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 





On 11/21/23 18:03, Mimi Zohar wrote:
Hi Stefan,

On Fri, 2023-11-10 at 15:21 -0500, Stefan Berger wrote:
Address issues raised by shellcheck SC2320:
   "This $? refers to echo/printf, not a previous command.
    Assign to variable to avoid it being overwritten."

Signed-off-by: Stefan Berger <stefanb@xxxxxxxxxxxxx>
---
  tests/Makefile.am              | 2 +-
  tests/mmap_check.test          | 8 +++-----
  tests/portable_signatures.test | 9 +++------
  3 files changed, 7 insertions(+), 12 deletions(-)

diff --git a/tests/Makefile.am b/tests/Makefile.am
index bcc1ee4..babfa7a 100644
--- a/tests/Makefile.am
+++ b/tests/Makefile.am
@@ -26,7 +26,7 @@ clean-local:
  distclean: distclean-keys
shellcheck:
-	shellcheck -i SC2086,SC2181,SC2046 \
+	shellcheck -i SC2086,SC2181,SC2046,SC2320 \
  		functions.sh gen-keys.sh install-fsverity.sh \
  		install-mount-idmapped.sh install-openssl3.sh \
  		install-swtpm.sh install-tss.sh softhsm_setup \
diff --git a/tests/mmap_check.test b/tests/mmap_check.test
index 2dd3433..3d2e1b1 100755
--- a/tests/mmap_check.test
+++ b/tests/mmap_check.test
@@ -97,11 +97,9 @@ check_load_ima_rule() {
new_policy=$(mktemp -p "$g_mountpoint")
  	echo "$1" > "$new_policy"
-	echo "$new_policy" > /sys/kernel/security/ima/policy
-	result=$?
-	rm -f "$new_policy"
-
-	if [ "$result" -ne 0 ]; then
+	if echo "$new_policy" > /sys/kernel/security/ima/policy; then
+		rm -f "$new_policy"
+	else
  		echo "${RED}Failed to set IMA policy${NORM}"
  		return "$HARDFAIL"
  	fi

This isn't equiavlent.  $new_policy was previously always removed.

Uuuh, thanks. Fixed.


diff --git a/tests/portable_signatures.test b/tests/portable_signatures.test
index 9f3339b..5251211 100755
--- a/tests/portable_signatures.test
+++ b/tests/portable_signatures.test
@@ -80,7 +80,6 @@ METADATA_CHANGE_FOWNER_2=3002
check_load_ima_rule() {
  	local rule_loaded
-	local result
  	local new_policy
rule_loaded=$(grep "$1" /sys/kernel/security/ima/policy)
@@ -88,11 +87,9 @@ check_load_ima_rule() {
  		new_policy=$(mktemp -p "$g_mountpoint")
  		echo "$1" > "$new_policy"
  		evmctl sign -o -a sha256 --imasig --key "$key_path" "$new_policy" &> /dev/null
-		echo "$new_policy" > /sys/kernel/security/ima/policy
-		result=$?
-		rm -f "$new_policy"
-
-		if [ "$result" -ne 0 ]; then
+		if echo "$new_policy" > /sys/kernel/security/ima/policy; then
+			rm -f "$new_policy"
+		else
  			echo "${RED}Failed to set IMA policy${NORM}"
  			return "$FAIL"
  		fi

Same here.





[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Linux Kernel]     [Linux Kernel Hardening]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux SCSI]

  Powered by Linux