From patchwork Fri Jul 4 17:11:05 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Scott Murray X-Patchwork-Id: 66262 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 39DEEC83F0D for ; Fri, 4 Jul 2025 17:11:58 +0000 (UTC) Received: from mail-qt1-f172.google.com (mail-qt1-f172.google.com [209.85.160.172]) by mx.groups.io with SMTP id smtpd.web10.1065.1751649110175814723 for ; Fri, 04 Jul 2025 10:11:50 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@konsulko.com header.s=google header.b=L9r7i/Ek; spf=pass (domain: konsulko.com, ip: 209.85.160.172, mailfrom: scott.murray@konsulko.com) Received: by mail-qt1-f172.google.com with SMTP id d75a77b69052e-4a97a67aa97so7559071cf.2 for ; Fri, 04 Jul 2025 10:11:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=konsulko.com; s=google; t=1751649109; x=1752253909; darn=lists.yoctoproject.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=0GOrU3ip1pxDrG2G1U/soFYT2NqYOVBsbg+B2vEBuGo=; b=L9r7i/EkzhdCB+N7/YbqtpOKYCDBXkZ0VB5b9uAQokbzn7hNVUiiCWlncsWkCuSsKI SfUJ84Psa4RSiYgntYbI1AbPRwQ5ZBvJsTg7y25E6H/GqEzaZi+fnl2sD3CcGgmMPnRZ TE0cZC7jlFhbF0gJMXI1GYtY2jTggJV9zBTms= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1751649109; x=1752253909; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=0GOrU3ip1pxDrG2G1U/soFYT2NqYOVBsbg+B2vEBuGo=; b=NDYw2kHHbRbMZr8nZO/v8oArwYRw8oNy1mOZLyWTB3u7D23SrisrBKg032VhW8O8uE FjZG6H+FzjmrmgBvs2W/HZtFmewaiecXJbbFDbvQSEreECZ7P6TM2H8pu1sJ9Br3GCp/ q5liomWa/r9FZWGljTr1UeKSgwM5BS64CxSwSa2BmqPhtXt1VH7yRk50dRVmN55nDcUE lK/YcDrBoR2HZwAMg8nA+pwDSf4iPXOMRIm1dhRpthubi46GzroPKW2M3xmj0NPk9nGi 2ud4HlJor11xfZLTt8wNjqyeVyFP5OIKtHxF+OU7GLYpNoZ7nxq+rQUsrTH2eYAaZVjO REpQ== X-Gm-Message-State: AOJu0YweiH0E5oPLUiiR2ASDSiSYyZRcpIpBqzyoHLAvY4rFejwuVX2Q +6TaNymLscmnhZxrhLIOY/3b9ELupr9ChzbKwRltaKZPaR9cdbL5Uo1yMgD6D5uC++2g59lGwIa W2+43 X-Gm-Gg: ASbGnctjqrwwcz3v63z4a3JYwMT9xCpqtCiL/Z3/SMnnIBMZAeASb/baHl+t7feRL3b 7tU9yzInMfGZu21BCga5L51c3APIZYg4DjAzccH4B3Rp8Ak5c9j59SlDlzEAkGerbfOdqvLnGnQ eiCRFYPSpLanY6icdklLu0L0QAb+DTr6jlBOkAa9ahsewcZhzz/Pj/sWh8wulCo93h3ZdbDwpv8 dbbFuoDxyFxsafZjstSZHcUvvPYCDe3yP7JQXEnFsZzX2XeYn7BbK5Gp1yCVMBM47/21Y7EtG5O 89ipTwMZK2Du99r+0Q/i/eE0lW9gCjNrEHgcZ6xCkXW3bbhfixxTZmfGSdlS/COsjvY9DD1nfq4 iDMue8SH7RxyUlL2PpiR4xdEiIvP/aQqI1zmjew== X-Google-Smtp-Source: AGHT+IEPD1qu1nKwU5qcaSi0vUm0M5hrx65RdqYuCHOvYmbx5qg6NrbtrwUpwiz9sEfK0vihieHJgA== X-Received: by 2002:ac8:59c8:0:b0:4a4:3171:b942 with SMTP id d75a77b69052e-4a99882053fmr42451151cf.39.1751649108793; Fri, 04 Jul 2025 10:11:48 -0700 (PDT) Received: from ghidorah.spiteful.org (107-179-213-3.cpe.teksavvy.com. [107.179.213.3]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-4a9949f99dcsm17249611cf.19.2025.07.04.10.11.47 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 04 Jul 2025 10:11:48 -0700 (PDT) From: Scott Murray To: yocto-patches@lists.yoctoproject.org Cc: "J. S." , Scott Murray Subject: [meta-security][PATCH 01/12] Fix warning : lack of whitespace around assignment Date: Fri, 4 Jul 2025 13:11:05 -0400 Message-ID: <4e2b318a86d1d4a799c4b609d4b626716fe6935e.1751647559.git.scott.murray@konsulko.com> X-Mailer: git-send-email 2.50.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 04 Jul 2025 17:11:58 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/yocto-patches/message/1753 From: "J. S." v2 : also fix some typos while we are here. v3 : add fixes for isic and checksecurity Signed-off-by: Jason Schonberg [removed already applied change] Signed-off-by: Scott Murray --- .../recipes-scanners/checksecurity/checksecurity_2.0.16.bb | 2 +- .../recipes-devtools/python/python3-json2html_1.3.0.bb | 2 +- .../recipes-devtools/python/python3-xmldiff_2.7.0.bb | 2 +- .../scap-security-guide/scap-security-guide_0.1.76.bb | 6 +++--- recipes-ids/aide/aide_0.18.8.bb | 2 +- recipes-ids/ossec/ossec-hids_3.7.0.bb | 2 +- recipes-ids/tripwire/tripwire_2.4.3.7.bb | 2 +- recipes-kernel/lkrg/lkrg-module_0.9.7.bb | 2 +- recipes-mac/ccs-tools/ccs-tools_1.8.9.bb | 4 ++-- recipes-perl/perl/libwhisker2-perl_2.5.bb | 2 +- recipes-scanners/checksec/checksec_2.6.0.bb | 2 +- recipes-security/cryptmount/cryptmount_6.2.0.bb | 2 +- recipes-security/isic/isic_0.07.bb | 2 +- recipes-security/sshguard/sshguard_2.4.3.bb | 4 ++-- 14 files changed, 18 insertions(+), 18 deletions(-) diff --git a/dynamic-layers/meta-perl/recipes-scanners/checksecurity/checksecurity_2.0.16.bb b/dynamic-layers/meta-perl/recipes-scanners/checksecurity/checksecurity_2.0.16.bb index 8006c9f..bc146a9 100644 --- a/dynamic-layers/meta-perl/recipes-scanners/checksecurity/checksecurity_2.0.16.bb +++ b/dynamic-layers/meta-perl/recipes-scanners/checksecurity/checksecurity_2.0.16.bb @@ -14,7 +14,7 @@ S = "${WORKDIR}/checksecurity-${PV}+nmu1" # allow for anylocal, no need to patch -LOGDIR="/etc/checksecurity" +LOGDIR = "/etc/checksecurity" do_compile() { sed -i -e "s;LOGDIR=/var/log/setuid;LOGDIR=${LOGDIR};g" ${B}/etc/check-setuid.conf diff --git a/dynamic-layers/meta-python/recipes-devtools/python/python3-json2html_1.3.0.bb b/dynamic-layers/meta-python/recipes-devtools/python/python3-json2html_1.3.0.bb index 3d7e897..baf3156 100644 --- a/dynamic-layers/meta-python/recipes-devtools/python/python3-json2html_1.3.0.bb +++ b/dynamic-layers/meta-python/recipes-devtools/python/python3-json2html_1.3.0.bb @@ -1,4 +1,4 @@ -DESCRIPTION="Python wrapper to convert JSON into a human readable HTML Table representation." +DESCRIPTION = "Python wrapper to convert JSON into a human readable HTML Table representation." LICENSE = "MIT" LIC_FILES_CHKSUM = "file://LICENSE.txt;md5=8065590663ea0c10aa131841ea806767" diff --git a/dynamic-layers/meta-python/recipes-devtools/python/python3-xmldiff_2.7.0.bb b/dynamic-layers/meta-python/recipes-devtools/python/python3-xmldiff_2.7.0.bb index 9d38065..a81c252 100644 --- a/dynamic-layers/meta-python/recipes-devtools/python/python3-xmldiff_2.7.0.bb +++ b/dynamic-layers/meta-python/recipes-devtools/python/python3-xmldiff_2.7.0.bb @@ -1,4 +1,4 @@ -DESCRIPTION="Creates diffs of XML files" +DESCRIPTION = "Creates diffs of XML files" LICENSE = "MIT" LIC_FILES_CHKSUM = "file://LICENSE.txt;md5=0d0e9e3949e163c3edd1e097b8b0ed62" diff --git a/recipes-compliance/scap-security-guide/scap-security-guide_0.1.76.bb b/recipes-compliance/scap-security-guide/scap-security-guide_0.1.76.bb index 73bd576..25309c7 100644 --- a/recipes-compliance/scap-security-guide/scap-security-guide_0.1.76.bb +++ b/recipes-compliance/scap-security-guide/scap-security-guide_0.1.76.bb @@ -21,9 +21,9 @@ B = "${S}/build" inherit cmake pkgconfig python3native python3targetconfig ptest STAGING_OSCAP_BUILDDIR = "${TMPDIR}/work-shared/openscap/oscap-build-artifacts" -export OSCAP_CPE_PATH="${STAGING_OSCAP_BUILDDIR}${datadir_native}/openscap/cpe" -export OSCAP_SCHEMA_PATH="${STAGING_OSCAP_BUILDDIR}${datadir_native}/openscap/schemas" -export OSCAP_XSLT_PATH="${STAGING_OSCAP_BUILDDIR}${datadir_native}/openscap/xsl" +export OSCAP_CPE_PATH = "${STAGING_OSCAP_BUILDDIR}${datadir_native}/openscap/cpe" +export OSCAP_SCHEMA_PATH = "${STAGING_OSCAP_BUILDDIR}${datadir_native}/openscap/schemas" +export OSCAP_XSLT_PATH = "${STAGING_OSCAP_BUILDDIR}${datadir_native}/openscap/xsl" OECMAKE_GENERATOR = "Unix Makefiles" diff --git a/recipes-ids/aide/aide_0.18.8.bb b/recipes-ids/aide/aide_0.18.8.bb index e2014a1..2912cb2 100644 --- a/recipes-ids/aide/aide_0.18.8.bb +++ b/recipes-ids/aide/aide_0.18.8.bb @@ -16,7 +16,7 @@ UPSTREAM_CHECK_URI = "https://github.com/${BPN}/${BPN}/releases" inherit autotools pkgconfig aide-base -PACKAGECONFIG ??=" gcrypt zlib e2fsattrs posix capabilities curl pthread \ +PACKAGECONFIG ??= " gcrypt zlib e2fsattrs posix capabilities curl pthread \ ${@bb.utils.contains('DISTRO_FEATURES', 'selinux', 'selinux audit', '', d)} \ ${@bb.utils.contains('DISTRO_FEATURES', 'xattr', 'xattr', '', d)} \ " diff --git a/recipes-ids/ossec/ossec-hids_3.7.0.bb b/recipes-ids/ossec/ossec-hids_3.7.0.bb index fbd1294..d9f5121 100644 --- a/recipes-ids/ossec/ossec-hids_3.7.0.bb +++ b/recipes-ids/ossec/ossec-hids_3.7.0.bb @@ -18,7 +18,7 @@ inherit autotools-brokensep useradd S = "${UNPACKDIR}/git" -OSSEC_DIR="/var/ossec" +OSSEC_DIR = "/var/ossec" OSSEC_UID ?= "ossec" OSSEC_RUID ?= "ossecr" OSSEC_GID ?= "ossec" diff --git a/recipes-ids/tripwire/tripwire_2.4.3.7.bb b/recipes-ids/tripwire/tripwire_2.4.3.7.bb index e67d3c7..3c85027 100644 --- a/recipes-ids/tripwire/tripwire_2.4.3.7.bb +++ b/recipes-ids/tripwire/tripwire_2.4.3.7.bb @@ -1,7 +1,7 @@ SUMMARY = "Tripwire: A system integrity assessment tool (IDS)" DESCRIPTION = "Open Source Tripwire® software is a security and data \ integrity tool useful for monitoring and alerting on specific file change(s) on a range of systems" -HOMEPAGE="http://sourceforge.net/projects/tripwire" +HOMEPAGE = "http://sourceforge.net/projects/tripwire" SECTION = "security Monitor/Admin" LICENSE = "GPL-2.0-only" LIC_FILES_CHKSUM = "file://COPYING;md5=1c069be8dbbe48e89b580ab4ed86c127" diff --git a/recipes-kernel/lkrg/lkrg-module_0.9.7.bb b/recipes-kernel/lkrg/lkrg-module_0.9.7.bb index 751c045..20982a8 100644 --- a/recipes-kernel/lkrg/lkrg-module_0.9.7.bb +++ b/recipes-kernel/lkrg/lkrg-module_0.9.7.bb @@ -1,5 +1,5 @@ SUMMARY = "Linux Kernel Runtime Guard" -DESCRIPTION="LKRG performs runtime integrity checking of the Linux \ +DESCRIPTION = "LKRG performs runtime integrity checking of the Linux \ kernel and detection of security vulnerability exploits against the kernel." SECTION = "security" HOMEPAGE = "https://www.openwall.com/lkrg/" diff --git a/recipes-mac/ccs-tools/ccs-tools_1.8.9.bb b/recipes-mac/ccs-tools/ccs-tools_1.8.9.bb index a746c56..3f754e9 100644 --- a/recipes-mac/ccs-tools/ccs-tools_1.8.9.bb +++ b/recipes-mac/ccs-tools/ccs-tools_1.8.9.bb @@ -26,7 +26,7 @@ do_install(){ oe_runmake INSTALLDIR=${D} USRLIBDIR=${libdir} SBINDIR=${sbindir} install } -PACKAGE="${PN} ${PN}-dbg ${PN}-doc" +PACKAGES = "${PN} ${PN}-dbg ${PN}-doc" FILES:${PN} = "\ ${sbindir}/* \ @@ -46,4 +46,4 @@ FILES:${PN}-dbg = "\ /usr/src/debug/* \ " -REQUIRED_DISTRO_FEATURES ?=" tomoyo" +REQUIRED_DISTRO_FEATURES ?= " tomoyo" diff --git a/recipes-perl/perl/libwhisker2-perl_2.5.bb b/recipes-perl/perl/libwhisker2-perl_2.5.bb index 2c32bfc..e16e5f2 100644 --- a/recipes-perl/perl/libwhisker2-perl_2.5.bb +++ b/recipes-perl/perl/libwhisker2-perl_2.5.bb @@ -15,7 +15,7 @@ S = "${UNPACKDIR}/libwhisker2-2.5" inherit cpan-base -PACKAGEGROUP ??="" +PACKAGEGROUP ??= "" PACKAGEGROUP[ssl] = ", , libnet-ssleay-perl, libnet-ssleay-perl" do_install() { diff --git a/recipes-scanners/checksec/checksec_2.6.0.bb b/recipes-scanners/checksec/checksec_2.6.0.bb index 3712e68..4767239 100644 --- a/recipes-scanners/checksec/checksec_2.6.0.bb +++ b/recipes-scanners/checksec/checksec_2.6.0.bb @@ -2,7 +2,7 @@ SUMMARY = "Linux system security checks" DESCRIPTION = "The checksec script is designed to test what standard Linux OS and PaX security features are being used." SECTION = "security" LICENSE = "BSD-3-Clause" -HOMEPAGE="https://github.com/slimm609/checksec.sh" +HOMEPAGE = "https://github.com/slimm609/checksec.sh" LIC_FILES_CHKSUM = "file://LICENSE.txt;md5=879b2147c754bc040c29e9c3b84da836" diff --git a/recipes-security/cryptmount/cryptmount_6.2.0.bb b/recipes-security/cryptmount/cryptmount_6.2.0.bb index d69d88b..424ff56 100644 --- a/recipes-security/cryptmount/cryptmount_6.2.0.bb +++ b/recipes-security/cryptmount/cryptmount_6.2.0.bb @@ -10,7 +10,7 @@ inherit autotools-brokensep gettext pkgconfig systemd EXTRA_OECONF = " --enable-cswap --enable-fsck --enable-argv0switch" -PACKAGECONFIG ?="intl luks gcrypt nls" +PACKAGECONFIG ?= "intl luks gcrypt nls" PACKAGECONFIG:append = " ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'systemd', '', d)}" PACKAGECONFIG[systemd] = "--with-systemd, --without-systemd, systemd" diff --git a/recipes-security/isic/isic_0.07.bb b/recipes-security/isic/isic_0.07.bb index d39184e..8e0f5ce 100644 --- a/recipes-security/isic/isic_0.07.bb +++ b/recipes-security/isic/isic_0.07.bb @@ -17,7 +17,7 @@ SRC_URI = "http://prdownloads.sourceforge.net/isic/${BPN}-${PV}.tgz \ SRC_URI[md5sum] = "29f70c9bde9aa9128b8f7e66a315f9a4" SRC_URI[sha256sum] = "e033c53e03e26a4c72b723e2a5a1c433ee70eb4d23a1ba0d7d7e14ee1a80429d" -S="${UNPACKDIR}/${BPN}-${PV}" +S = "${UNPACKDIR}/${BPN}-${PV}" inherit autotools-brokensep diff --git a/recipes-security/sshguard/sshguard_2.4.3.bb b/recipes-security/sshguard/sshguard_2.4.3.bb index 37b414e..de3d856 100644 --- a/recipes-security/sshguard/sshguard_2.4.3.bb +++ b/recipes-security/sshguard/sshguard_2.4.3.bb @@ -1,10 +1,10 @@ -SUMARRY=" Intelligently block brute-force attacks by aggregating system logs " +SUMMARY = " Intelligently block brute-force attacks by aggregating system logs " HOMEPAGE = "https://www.sshguard.net/" LIC_FILES_CHKSUM = "file://COPYING;md5=47a33fc98cd20713882c4d822a57bf4d" LICENSE = "BSD-1-Clause" -SRC_URI="https://sourceforge.net/projects/sshguard/files/sshguard/${PV}/sshguard-${PV}.tar.gz" +SRC_URI = "https://sourceforge.net/projects/sshguard/files/sshguard/${PV}/sshguard-${PV}.tar.gz" SRC_URI[sha256sum] = "64029deff6de90fdeefb1f497d414f0e4045076693a91da1a70eb7595e97efeb"