Hi Stefan,

On Fri, 2023-11-10 at 15:21 -0500, Stefan Berger wrote:
> Address issues raised by shellcheck SC2320:
>   "This $? refers to echo/printf, not a previous command.
>    Assign to variable to avoid it being overwritten."
> 
> Signed-off-by: Stefan Berger <[email protected]>
> ---
>  tests/Makefile.am              | 2 +-
>  tests/mmap_check.test          | 8 +++-----
>  tests/portable_signatures.test | 9 +++------
>  3 files changed, 7 insertions(+), 12 deletions(-)
> 
> diff --git a/tests/Makefile.am b/tests/Makefile.am
> index bcc1ee4..babfa7a 100644
> --- a/tests/Makefile.am
> +++ b/tests/Makefile.am
> @@ -26,7 +26,7 @@ clean-local:
>  distclean: distclean-keys
>  
>  shellcheck:
> -     shellcheck -i SC2086,SC2181,SC2046 \
> +     shellcheck -i SC2086,SC2181,SC2046,SC2320 \
>               functions.sh gen-keys.sh install-fsverity.sh \
>               install-mount-idmapped.sh install-openssl3.sh \
>               install-swtpm.sh install-tss.sh softhsm_setup \
> diff --git a/tests/mmap_check.test b/tests/mmap_check.test
> index 2dd3433..3d2e1b1 100755
> --- a/tests/mmap_check.test
> +++ b/tests/mmap_check.test
> @@ -97,11 +97,9 @@ check_load_ima_rule() {
>  
>       new_policy=$(mktemp -p "$g_mountpoint")
>       echo "$1" > "$new_policy"
> -     echo "$new_policy" > /sys/kernel/security/ima/policy
> -     result=$?
> -     rm -f "$new_policy"
> -
> -     if [ "$result" -ne 0 ]; then
> +     if echo "$new_policy" > /sys/kernel/security/ima/policy; then
> +             rm -f "$new_policy"
> +     else
>               echo "${RED}Failed to set IMA policy${NORM}"
>               return "$HARDFAIL"
>       fi

This isn't equiavlent.  $new_policy was previously always removed.

> diff --git a/tests/portable_signatures.test b/tests/portable_signatures.test
> index 9f3339b..5251211 100755
> --- a/tests/portable_signatures.test
> +++ b/tests/portable_signatures.test
> @@ -80,7 +80,6 @@ METADATA_CHANGE_FOWNER_2=3002
>  
>  check_load_ima_rule() {
>       local rule_loaded
> -     local result
>       local new_policy
>  
>       rule_loaded=$(grep "$1" /sys/kernel/security/ima/policy)
> @@ -88,11 +87,9 @@ check_load_ima_rule() {
>               new_policy=$(mktemp -p "$g_mountpoint")
>               echo "$1" > "$new_policy"
>               evmctl sign -o -a sha256 --imasig --key "$key_path" 
> "$new_policy" &> /dev/null
> -             echo "$new_policy" > /sys/kernel/security/ima/policy
> -             result=$?
> -             rm -f "$new_policy"
> -
> -             if [ "$result" -ne 0 ]; then
> +             if echo "$new_policy" > /sys/kernel/security/ima/policy; then
> +                     rm -f "$new_policy"
> +             else
>                       echo "${RED}Failed to set IMA policy${NORM}"
>                       return "$FAIL"
>               fi

Same here.

-- 
thanks,

Mimi


Reply via email to