Fix warning : lack of whitespace around assignment

v2 : also fix some typos while we are here.
v3 : add fixes for isic and checksecurity

Signed-off-by: Jason Schonberg <schonm@gmail.com>
[removed already applied change]
Signed-off-by: Scott Murray <scott.murray@konsulko.com>
This commit is contained in:
J. S.
2025-04-14 22:24:03 -04:00
committed by Scott Murray
parent ebe9234fb8
commit 4e2b318a86
14 changed files with 18 additions and 18 deletions

View File

@@ -14,7 +14,7 @@ S = "${WORKDIR}/checksecurity-${PV}+nmu1"
# allow for anylocal, no need to patch
LOGDIR="/etc/checksecurity"
LOGDIR = "/etc/checksecurity"
do_compile() {
sed -i -e "s;LOGDIR=/var/log/setuid;LOGDIR=${LOGDIR};g" ${B}/etc/check-setuid.conf

View File

@@ -1,4 +1,4 @@
DESCRIPTION="Python wrapper to convert JSON into a human readable HTML Table representation."
DESCRIPTION = "Python wrapper to convert JSON into a human readable HTML Table representation."
LICENSE = "MIT"
LIC_FILES_CHKSUM = "file://LICENSE.txt;md5=8065590663ea0c10aa131841ea806767"

View File

@@ -1,4 +1,4 @@
DESCRIPTION="Creates diffs of XML files"
DESCRIPTION = "Creates diffs of XML files"
LICENSE = "MIT"
LIC_FILES_CHKSUM = "file://LICENSE.txt;md5=0d0e9e3949e163c3edd1e097b8b0ed62"

View File

@@ -21,9 +21,9 @@ B = "${S}/build"
inherit cmake pkgconfig python3native python3targetconfig ptest
STAGING_OSCAP_BUILDDIR = "${TMPDIR}/work-shared/openscap/oscap-build-artifacts"
export OSCAP_CPE_PATH="${STAGING_OSCAP_BUILDDIR}${datadir_native}/openscap/cpe"
export OSCAP_SCHEMA_PATH="${STAGING_OSCAP_BUILDDIR}${datadir_native}/openscap/schemas"
export OSCAP_XSLT_PATH="${STAGING_OSCAP_BUILDDIR}${datadir_native}/openscap/xsl"
export OSCAP_CPE_PATH = "${STAGING_OSCAP_BUILDDIR}${datadir_native}/openscap/cpe"
export OSCAP_SCHEMA_PATH = "${STAGING_OSCAP_BUILDDIR}${datadir_native}/openscap/schemas"
export OSCAP_XSLT_PATH = "${STAGING_OSCAP_BUILDDIR}${datadir_native}/openscap/xsl"
OECMAKE_GENERATOR = "Unix Makefiles"

View File

@@ -16,7 +16,7 @@ UPSTREAM_CHECK_URI = "https://github.com/${BPN}/${BPN}/releases"
inherit autotools pkgconfig aide-base
PACKAGECONFIG ??=" gcrypt zlib e2fsattrs posix capabilities curl pthread \
PACKAGECONFIG ??= " gcrypt zlib e2fsattrs posix capabilities curl pthread \
${@bb.utils.contains('DISTRO_FEATURES', 'selinux', 'selinux audit', '', d)} \
${@bb.utils.contains('DISTRO_FEATURES', 'xattr', 'xattr', '', d)} \
"

View File

@@ -18,7 +18,7 @@ inherit autotools-brokensep useradd
S = "${UNPACKDIR}/git"
OSSEC_DIR="/var/ossec"
OSSEC_DIR = "/var/ossec"
OSSEC_UID ?= "ossec"
OSSEC_RUID ?= "ossecr"
OSSEC_GID ?= "ossec"

View File

@@ -1,7 +1,7 @@
SUMMARY = "Tripwire: A system integrity assessment tool (IDS)"
DESCRIPTION = "Open Source Tripwire® software is a security and data \
integrity tool useful for monitoring and alerting on specific file change(s) on a range of systems"
HOMEPAGE="http://sourceforge.net/projects/tripwire"
HOMEPAGE = "http://sourceforge.net/projects/tripwire"
SECTION = "security Monitor/Admin"
LICENSE = "GPL-2.0-only"
LIC_FILES_CHKSUM = "file://COPYING;md5=1c069be8dbbe48e89b580ab4ed86c127"

View File

@@ -1,5 +1,5 @@
SUMMARY = "Linux Kernel Runtime Guard"
DESCRIPTION="LKRG performs runtime integrity checking of the Linux \
DESCRIPTION = "LKRG performs runtime integrity checking of the Linux \
kernel and detection of security vulnerability exploits against the kernel."
SECTION = "security"
HOMEPAGE = "https://www.openwall.com/lkrg/"

View File

@@ -26,7 +26,7 @@ do_install(){
oe_runmake INSTALLDIR=${D} USRLIBDIR=${libdir} SBINDIR=${sbindir} install
}
PACKAGE="${PN} ${PN}-dbg ${PN}-doc"
PACKAGES = "${PN} ${PN}-dbg ${PN}-doc"
FILES:${PN} = "\
${sbindir}/* \
@@ -46,4 +46,4 @@ FILES:${PN}-dbg = "\
/usr/src/debug/* \
"
REQUIRED_DISTRO_FEATURES ?=" tomoyo"
REQUIRED_DISTRO_FEATURES ?= " tomoyo"

View File

@@ -15,7 +15,7 @@ S = "${UNPACKDIR}/libwhisker2-2.5"
inherit cpan-base
PACKAGEGROUP ??=""
PACKAGEGROUP ??= ""
PACKAGEGROUP[ssl] = ", , libnet-ssleay-perl, libnet-ssleay-perl"
do_install() {

View File

@@ -2,7 +2,7 @@ SUMMARY = "Linux system security checks"
DESCRIPTION = "The checksec script is designed to test what standard Linux OS and PaX security features are being used."
SECTION = "security"
LICENSE = "BSD-3-Clause"
HOMEPAGE="https://github.com/slimm609/checksec.sh"
HOMEPAGE = "https://github.com/slimm609/checksec.sh"
LIC_FILES_CHKSUM = "file://LICENSE.txt;md5=879b2147c754bc040c29e9c3b84da836"

View File

@@ -10,7 +10,7 @@ inherit autotools-brokensep gettext pkgconfig systemd
EXTRA_OECONF = " --enable-cswap --enable-fsck --enable-argv0switch"
PACKAGECONFIG ?="intl luks gcrypt nls"
PACKAGECONFIG ?= "intl luks gcrypt nls"
PACKAGECONFIG:append = " ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'systemd', '', d)}"
PACKAGECONFIG[systemd] = "--with-systemd, --without-systemd, systemd"

View File

@@ -17,7 +17,7 @@ SRC_URI = "http://prdownloads.sourceforge.net/isic/${BPN}-${PV}.tgz \
SRC_URI[md5sum] = "29f70c9bde9aa9128b8f7e66a315f9a4"
SRC_URI[sha256sum] = "e033c53e03e26a4c72b723e2a5a1c433ee70eb4d23a1ba0d7d7e14ee1a80429d"
S="${UNPACKDIR}/${BPN}-${PV}"
S = "${UNPACKDIR}/${BPN}-${PV}"
inherit autotools-brokensep

View File

@@ -1,10 +1,10 @@
SUMARRY=" Intelligently block brute-force attacks by aggregating system logs "
SUMMARY = " Intelligently block brute-force attacks by aggregating system logs "
HOMEPAGE = "https://www.sshguard.net/"
LIC_FILES_CHKSUM = "file://COPYING;md5=47a33fc98cd20713882c4d822a57bf4d"
LICENSE = "BSD-1-Clause"
SRC_URI="https://sourceforge.net/projects/sshguard/files/sshguard/${PV}/sshguard-${PV}.tar.gz"
SRC_URI = "https://sourceforge.net/projects/sshguard/files/sshguard/${PV}/sshguard-${PV}.tar.gz"
SRC_URI[sha256sum] = "64029deff6de90fdeefb1f497d414f0e4045076693a91da1a70eb7595e97efeb"