remove 'bashisms' or explicit use bash
This commit is contained in:
		
							parent
							
								
									77392fd3a9
								
							
						
					
					
						commit
						dad5bfbd18
					
				
							
								
								
									
										4
									
								
								debian/qubes-core-agent.postrm
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										4
									
								
								debian/qubes-core-agent.postrm
									
									
									
									
										vendored
									
									
								
							@ -1,4 +1,4 @@
 | 
			
		||||
#!/bin/bash
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
# postrm script for core-agent-linux
 | 
			
		||||
#
 | 
			
		||||
# see: dh_installdeb(1)
 | 
			
		||||
@ -37,7 +37,7 @@ set -e
 | 
			
		||||
# the debian-policy package
 | 
			
		||||
 | 
			
		||||
if [ "${1}" = "remove" ] ; then
 | 
			
		||||
    /usr/bin/glib-compile-schemas /usr/share/glib-2.0/schemas &> /dev/null || :
 | 
			
		||||
    /usr/bin/glib-compile-schemas /usr/share/glib-2.0/schemas > /dev/null 2>&1 || :
 | 
			
		||||
 | 
			
		||||
    if [ -L /lib/firmware/updates ]; then
 | 
			
		||||
        rm /lib/firmware/updates
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										2
									
								
								debian/qubes-core-agent.preinst
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								debian/qubes-core-agent.preinst
									
									
									
									
										vendored
									
									
								
							@ -1,4 +1,4 @@
 | 
			
		||||
#!/bin/bash
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
# preinst script for core-agent-linux
 | 
			
		||||
#
 | 
			
		||||
# see: dh_installdeb(1)
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										2
									
								
								debian/qubes-core-agent.prerm
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								debian/qubes-core-agent.prerm
									
									
									
									
										vendored
									
									
								
							@ -1,4 +1,4 @@
 | 
			
		||||
#!/bin/bash
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
# prerm script for core-agent-linux
 | 
			
		||||
#
 | 
			
		||||
# see: dh_installdeb(1)
 | 
			
		||||
 | 
			
		||||
@ -1,4 +1,4 @@
 | 
			
		||||
#!/bin/bash
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
 | 
			
		||||
apps="evince /usr/libexec/evinced soffice firefox"
 | 
			
		||||
 | 
			
		||||
@ -18,7 +18,7 @@ echo "Sleeping..."
 | 
			
		||||
PREV_IO=0
 | 
			
		||||
while true; do
 | 
			
		||||
	IO=`vmstat -D | awk '/read|write/ {IOs+=$1} END {print IOs}'`
 | 
			
		||||
	if [ $IO -lt $[ $PREV_IO + 50 ] ]; then
 | 
			
		||||
	if [ $IO -lt $(( $PREV_IO + 50 )) ]; then
 | 
			
		||||
		break;
 | 
			
		||||
	fi
 | 
			
		||||
	PREV_IO=$IO
 | 
			
		||||
 | 
			
		||||
@ -1,8 +1,8 @@
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
if [ x$2 == xup ]; then
 | 
			
		||||
if [ x$2 = xup ]; then
 | 
			
		||||
	INET=$(/sbin/ip addr show dev $1 | /bin/grep inet)
 | 
			
		||||
	qubesdb-write /qubes-netvm-external-ip "$INET"
 | 
			
		||||
fi
 | 
			
		||||
if [ x$2 == xdown ]; then
 | 
			
		||||
if [ x$2 = xdown ]; then
 | 
			
		||||
	qubesdb-write /qubes-netvm-external-ip ""
 | 
			
		||||
fi
 | 
			
		||||
 | 
			
		||||
@ -3,7 +3,7 @@
 | 
			
		||||
RULE_FILTER="INPUT -i vif+ -p tcp --dport 8082 -j ACCEPT"
 | 
			
		||||
RULE_NAT="PR-QBS-SERVICES -i vif+ -d 10.137.255.254 -p tcp --dport 8082 -j REDIRECT"
 | 
			
		||||
 | 
			
		||||
if [ "$1" == "start" ]; then
 | 
			
		||||
if [ "$1" = "start" ]; then
 | 
			
		||||
cat <<__EOF__ | iptables-restore -n
 | 
			
		||||
*filter
 | 
			
		||||
-I $RULE_FILTER
 | 
			
		||||
 | 
			
		||||
@ -1,4 +1,4 @@
 | 
			
		||||
#!/bin/bash
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
set -e
 | 
			
		||||
 | 
			
		||||
PIDFILE=/var/run/qubes/qubes-firewall.pid
 | 
			
		||||
@ -7,10 +7,10 @@ XENSTORE_IPTABLES_HEADER=/qubes-iptables-header
 | 
			
		||||
XENSTORE_ERROR=/qubes-iptables-error
 | 
			
		||||
OLD_RULES=""
 | 
			
		||||
# PIDfile handling
 | 
			
		||||
[[ -e $PIDFILE ]] && kill -s 0 $(<$PIDFILE) 2>/dev/null && exit 0
 | 
			
		||||
[ -e "$PIDFILE" ] && kill -s 0 $(cat "$PIDFILE") 2>/dev/null && exit 0
 | 
			
		||||
echo $$ >$PIDFILE
 | 
			
		||||
 | 
			
		||||
trap 'exit 0' SIGTERM
 | 
			
		||||
trap 'exit 0' TERM
 | 
			
		||||
 | 
			
		||||
FIRST_TIME=yes
 | 
			
		||||
 | 
			
		||||
@ -36,11 +36,11 @@ while true; do
 | 
			
		||||
 | 
			
		||||
	RULES=$(qubesdb-read $XENSTORE_IPTABLES_HEADER)
 | 
			
		||||
	IPTABLES_SAVE=$(iptables-save | sed '/^\*filter/,/^COMMIT/d')
 | 
			
		||||
	OUT=`echo -e "$RULES\n$IPTABLES_SAVE" | iptables-restore 2>&1 || true`
 | 
			
		||||
	OUT=$(printf '%s\n%s\n' "$RULES" "$IPTABLES_SAVE" | sed 's/\\n/\n/g' | iptables-restore 2>&1 || true)
 | 
			
		||||
 | 
			
		||||
	for i in $(qubesdb-list -f /qubes-iptables-domainrules) ; do
 | 
			
		||||
		RULES=$(qubesdb-read "$i")
 | 
			
		||||
		ERRS=`echo -e "$RULES" | /sbin/iptables-restore -n 2>&1 || true`
 | 
			
		||||
		ERRS=$(printf '%s\n' "$RULES" | sed 's/\\n/\n/g' | /sbin/iptables-restore -n 2>&1 || true)
 | 
			
		||||
		if [ -n "$ERRS" ]; then
 | 
			
		||||
			echo "Failed applying rules for $i: $ERRS" >&2
 | 
			
		||||
			OUT="$OUT$ERRS"
 | 
			
		||||
@ -48,7 +48,7 @@ while true; do
 | 
			
		||||
	done		
 | 
			
		||||
	qubesdb-write $XENSTORE_ERROR "$OUT"
 | 
			
		||||
	if [ -n "$OUT" ]; then
 | 
			
		||||
		DISPLAY=:0 /usr/bin/notify-send -t 3000 "Firewall loading error ($HOSTNAME)" "$OUT" || :
 | 
			
		||||
		DISPLAY=:0 /usr/bin/notify-send -t 3000 "Firewall loading error ($(hostname))" "$OUT" || :
 | 
			
		||||
	fi
 | 
			
		||||
 | 
			
		||||
	# Check if user didn't define some custom rules to be applied as well...
 | 
			
		||||
 | 
			
		||||
@ -1,23 +1,23 @@
 | 
			
		||||
#!/bin/bash
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
set -e
 | 
			
		||||
 | 
			
		||||
PIDFILE=/var/run/qubes/qubes-netwatcher.pid
 | 
			
		||||
CURR_NETCFG=""
 | 
			
		||||
 | 
			
		||||
# PIDfile handling
 | 
			
		||||
[[ -e $PIDFILE ]] && kill -s 0 $(<$PIDFILE) 2>/dev/null && exit 0
 | 
			
		||||
[ -e "$PIDFILE" ] && kill -s 0 $(cat "$PIDFILE") 2>/dev/null && exit 0
 | 
			
		||||
echo $$ >$PIDFILE
 | 
			
		||||
 | 
			
		||||
trap 'exit 0' SIGTERM
 | 
			
		||||
trap 'exit 0' TERM
 | 
			
		||||
 | 
			
		||||
while true; do
 | 
			
		||||
	NET_DOMID=$(xenstore-read qubes-netvm-domid || :)
 | 
			
		||||
	if [[ -n "$NET_DOMID" ]] && [[ $NET_DOMID -gt 0 ]]; then
 | 
			
		||||
	if [ -n "$NET_DOMID" ] && [ $NET_DOMID -gt 0 ]; then
 | 
			
		||||
		UNTRUSTED_NETCFG=$(xenstore-read /local/domain/$NET_DOMID/qubes-netvm-external-ip || :)
 | 
			
		||||
		# UNTRUSTED_NETCFG is not parsed in any way
 | 
			
		||||
		# thus, no sanitization ready
 | 
			
		||||
		# but be careful when passing it to other shell scripts
 | 
			
		||||
		if [[ "$UNTRUSTED_NETCFG" != "$CURR_NETCFG" ]]; then
 | 
			
		||||
		if [ "$UNTRUSTED_NETCFG" != "$CURR_NETCFG" ]; then
 | 
			
		||||
			/sbin/service qubes-firewall stop
 | 
			
		||||
			/sbin/service qubes-firewall start
 | 
			
		||||
			CURR_NETCFG="$UNTRUSTED_NETCFG"
 | 
			
		||||
 | 
			
		||||
@ -1,6 +1,6 @@
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
 | 
			
		||||
type nm-applet > /dev/null 2>&1 || exit 0
 | 
			
		||||
which nm-applet > /dev/null 2>&1 || exit 0
 | 
			
		||||
 | 
			
		||||
# Hide nm-applet when network-manager is disabled
 | 
			
		||||
nm_enabled=false
 | 
			
		||||
 | 
			
		||||
@ -11,7 +11,7 @@ if [ -r /rw/config/suspend-module-blacklist ]; then
 | 
			
		||||
    MODULES_BLACKLIST="$MODULES_BLACKLIST `cat /rw/config/suspend-module-blacklist`"
 | 
			
		||||
fi
 | 
			
		||||
 | 
			
		||||
if [ x"$action" == x"suspend" ]; then
 | 
			
		||||
if [ x"$action" = x"suspend" ]; then
 | 
			
		||||
    dbus-send --system --print-reply          \
 | 
			
		||||
        --dest=org.freedesktop.NetworkManager \ 
 | 
			
		||||
        /org/freedesktop/NetworkManager       \
 | 
			
		||||
@ -19,7 +19,7 @@ if [ x"$action" == x"suspend" ]; then
 | 
			
		||||
        service NetworkManager stop
 | 
			
		||||
    # Force interfaces down, just in case when NM didn't done it
 | 
			
		||||
    for if in `ls /sys/class/net|grep -v "lo\|vif"`; do 
 | 
			
		||||
        if [ "`cat /sys/class/net/$if/device/devtype 2>/dev/null`" == "vif" ]; then
 | 
			
		||||
        if [ "`cat /sys/class/net/$if/device/devtype 2>/dev/null`" = "vif" ]; then
 | 
			
		||||
            continue
 | 
			
		||||
        fi
 | 
			
		||||
        ip l s $if down
 | 
			
		||||
 | 
			
		||||
@ -9,8 +9,7 @@ if [ -d "$args" ] ; then
 | 
			
		||||
else
 | 
			
		||||
  echo "Checking if arguments is matching a command"
 | 
			
		||||
  COMMAND=`echo $args | cut -d ' ' -f 1`
 | 
			
		||||
  TYPE=`type -t $COMMAND`
 | 
			
		||||
  if [ "$TYPE" == "file" ] ; then
 | 
			
		||||
  if which "$COMMAND"; then
 | 
			
		||||
    echo "Redirecting STDIN to $args"
 | 
			
		||||
    # Parsing args to handle quotes correctly
 | 
			
		||||
    # Dangerous method if args are uncontrolled
 | 
			
		||||
 | 
			
		||||
@ -1,31 +1,31 @@
 | 
			
		||||
set -e
 | 
			
		||||
read filename
 | 
			
		||||
 | 
			
		||||
if [[ "${filename}" = xdgicon:* ]]; then
 | 
			
		||||
if [ "${filename%%:*}" = xdgicon ]; then
 | 
			
		||||
    # get biggest icon from hicolor theme
 | 
			
		||||
 | 
			
		||||
    filename="${filename#*:}.png"
 | 
			
		||||
    candidate=
 | 
			
		||||
    for dir in /usr/share/icons/{hicolor/,}; do
 | 
			
		||||
    for dir in /usr/share/icons/hicolor/ /usr/share/icons/; do
 | 
			
		||||
        candidate=$(find -L "${dir}" -type f -name "${filename}")
 | 
			
		||||
        if [[ -n "${candidate}" ]]; then
 | 
			
		||||
        if [ -n "${candidate}" ]; then
 | 
			
		||||
            candidate=$(echo "${candidate}" | xargs ls --sort=size | head -1)
 | 
			
		||||
            break
 | 
			
		||||
        fi
 | 
			
		||||
    done
 | 
			
		||||
 | 
			
		||||
    [[ -n "${candidate}" ]]
 | 
			
		||||
    [ -n "${candidate}" ]
 | 
			
		||||
    filename="${candidate}"
 | 
			
		||||
 | 
			
		||||
elif [[ "${filename}" = "-" ]] || [[ "${filename}" = *":-" ]]; then
 | 
			
		||||
elif [ "${filename}" = "-" ] || [ "${filename##*:}" = "-" ]; then
 | 
			
		||||
    tmpfile="$(mktemp /tmp/qimg-XXXXXXXX)"
 | 
			
		||||
    cat > "${tmpfile}"
 | 
			
		||||
    if [[ "$filename" = *":-" ]]; then
 | 
			
		||||
    if [ "${filename##*:}" = "-" ]; then
 | 
			
		||||
        tmpfile="${filename%:*}:${tmpfile}"
 | 
			
		||||
    fi
 | 
			
		||||
    filename="${tmpfile}"
 | 
			
		||||
 | 
			
		||||
elif ! [[ -r "${filename}" ]]; then
 | 
			
		||||
elif ! [ -r "${filename}" ]; then
 | 
			
		||||
    exit 1
 | 
			
		||||
fi
 | 
			
		||||
 | 
			
		||||
@ -34,6 +34,6 @@ fi
 | 
			
		||||
identify -format '%w %h\n' "$filename" | sed -e '/^$/d'
 | 
			
		||||
convert -depth 8 "$filename" rgba:-
 | 
			
		||||
 | 
			
		||||
[[ -n "${tmpfile}" ]] && rm -f ${tmpfile} || true
 | 
			
		||||
[ -n "${tmpfile}" ] && rm -f ${tmpfile} || true
 | 
			
		||||
 | 
			
		||||
# vim: ft=sh ts=4 sw=4 et
 | 
			
		||||
 | 
			
		||||
@ -11,8 +11,7 @@ if [ -f "$args" ] ; then
 | 
			
		||||
else
 | 
			
		||||
  echo "Checking if arguments is matching a command" >&2
 | 
			
		||||
  COMMAND=`echo $args | cut -d ' ' -f 1`
 | 
			
		||||
  TYPE=`type -t $COMMAND`
 | 
			
		||||
  if [ "$TYPE" == "file" ] ; then
 | 
			
		||||
  if which "$COMMAND"; then
 | 
			
		||||
    tmpdir=`mktemp -d`
 | 
			
		||||
    mkfifo $tmpdir/backup-data
 | 
			
		||||
    echo "Redirecting $args to STDOUT" >&2
 | 
			
		||||
 | 
			
		||||
@ -1,4 +1,4 @@
 | 
			
		||||
#!/bin/bash
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
#
 | 
			
		||||
# The Qubes OS Project, http://www.qubes-os.org
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
@ -1,4 +1,4 @@
 | 
			
		||||
#!/bin/bash
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
#
 | 
			
		||||
# The Qubes OS Project, http://www.qubes-os.org
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
@ -1,4 +1,4 @@
 | 
			
		||||
#!/bin/bash
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
#
 | 
			
		||||
# The Qubes OS Project, http://www.qubes-os.org
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
@ -1,4 +1,4 @@
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
#!/bin/bash
 | 
			
		||||
#
 | 
			
		||||
# chkconfig: 345 90 90
 | 
			
		||||
# description: Executes Qubes core scripts at VM boot
 | 
			
		||||
 | 
			
		||||
@ -1,4 +1,4 @@
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
#!/bin/bash
 | 
			
		||||
#
 | 
			
		||||
# chkconfig: 345 85 85
 | 
			
		||||
# description: Executes Qubes core scripts at AppVM boot
 | 
			
		||||
 | 
			
		||||
@ -1,4 +1,4 @@
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
#!/bin/bash
 | 
			
		||||
#
 | 
			
		||||
# chkconfig: 345 90 90
 | 
			
		||||
# description: Executes Qubes core scripts at NetVM boot
 | 
			
		||||
 | 
			
		||||
@ -1,4 +1,4 @@
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
#!/bin/bash
 | 
			
		||||
#
 | 
			
		||||
# chkconfig: 345 91 91
 | 
			
		||||
# description: Starts Qubes Firewall monitor
 | 
			
		||||
 | 
			
		||||
@ -1,4 +1,4 @@
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
#!/bin/bash
 | 
			
		||||
#
 | 
			
		||||
# chkconfig: 345 92 92
 | 
			
		||||
# description: Starts Qubes Network monitor
 | 
			
		||||
 | 
			
		||||
@ -1,4 +1,4 @@
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
#!/bin/bash
 | 
			
		||||
#
 | 
			
		||||
# chkconfig: 345 90 90
 | 
			
		||||
# description: Executes Qubes core scripts at VM boot
 | 
			
		||||
 | 
			
		||||
@ -1,4 +1,4 @@
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
#!/bin/bash
 | 
			
		||||
#
 | 
			
		||||
# tinyproxy     Startup script for the tinyproxy server as Qubes updates proxy
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
@ -1,4 +1,4 @@
 | 
			
		||||
#!/bin/bash
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
 | 
			
		||||
# List of services enabled by default (in case of absence of qubesdb entry)
 | 
			
		||||
DEFAULT_ENABLED_NETVM="network-manager qubes-network qubes-update-check qubes-updates-proxy"
 | 
			
		||||
 | 
			
		||||
@ -4,4 +4,4 @@ ConditionPathExists=/var/run/qubes-service/qubes-update-check
 | 
			
		||||
 | 
			
		||||
[Service]
 | 
			
		||||
Type=oneshot
 | 
			
		||||
ExecStart=/usr/lib/qubes/qrexec-client-vm dom0 qubes.NotifyUpdates /bin/sh -c 'if [ -e /usr/bin/yum ]; then yum -q check-update >/dev/null; [ $? -eq 100 ] && echo 1 || echo 0; else apt-get -q update > /dev/null; apt-get -s upgrade | awk "/^Inst/{ print $2 }" | [[ $(wc -L) -eq 0 ]] && echo 0 || echo 1; fi'
 | 
			
		||||
ExecStart=/usr/lib/qubes/qrexec-client-vm dom0 qubes.NotifyUpdates /bin/sh -c 'if [ -e /usr/bin/yum ]; then yum -q check-update >/dev/null; [ $? -eq 100 ] && echo 1 || echo 0; else apt-get -q update > /dev/null; apt-get -s upgrade | awk "/^Inst/{ print $2 }" | [ $(wc -L) -eq 0 ] && echo 0 || echo 1; fi'
 | 
			
		||||
 | 
			
		||||
		Loading…
	
		Reference in New Issue
	
	Block a user