From: Jiri J. <jja...@re...> - 2015-03-26 10:12:27
|
On 03/26/2015 10:26 AM, Miroslav Vadkerti wrote: > > There will be more places in the suite where you will hit faillock [1]. Would it be possible to > follow up with this patch and fix the remaining stuff also please? > > Also we prefer sticking to sh compatibility if possible, would you mind replacing command for > which? Also if the syntax of if/fi seems too stretched out, feel free to use ie. which faillock >/dev/null && faillock --user "$TEST_USER" --reset > > [1] $ grep -R faillock . > ./audit-test/crypto/tests/test_ssh_multi.bash:# clear faillock at cleanup > ./audit-test/crypto/tests/test_ssh_multi.bash:prepend_cleanup "faillock --reset --user $TEST_USER" > ./audit-test/crypto/tests/test_ssh_multi.bash:prepend_cleanup "faillock --reset --user $TEST_ADMIN" > ./audit-test/crypto/tests/test_ssh_multi.bash:# clear faillock for $TEST_USER > ./audit-test/crypto/tests/test_ssh_multi.bash:faillock --reset --user $TEST_USER > ./audit-test/libpam/run.conf: + pamfaillock_lock > ./audit-test/libpam/run.conf: + pamfaillock_unlock > ./audit-test/libpam/tests/test_pamfaillock_lock.bash:# Verify pam_faillock will lock an account > ./audit-test/libpam/tests/test_pamfaillock_lock.bash:# make sure faillock is reset for TEST_USER > ./audit-test/libpam/tests/test_pamfaillock_lock.bash:/sbin/faillock --user $TEST_USER --reset > > /dev/null || exit_error > ./audit-test/libpam/tests/test_pamfaillock_lock.bash:grep -q pam_faillock /etc/pam.d/sshd || grep > -q pam_faillock /etc/pam.d/password-auth || exit_error > ./audit-test/libpam/tests/test_pamfaillock_lock.bash:# Unlike pam_tally2, faillock doesn't have a > --reset=n option that lets us > ./audit-test/libpam/tests/test_pamfaillock_lock.bash:msg_1="pam_faillock > uid=$tuid.*exe=./usr/sbin/sshd.*res=success.*" > ./audit-test/libpam/tests/test_pamfaillock_lock.bash:/sbin/faillock --user $TEST_USER --reset > > /dev/null || exit_error > ./audit-test/libpam/tests/test_pamfaillock_unlock.bash:# Verify pam_faillock will unlock an account > ./audit-test/libpam/tests/test_pamfaillock_unlock.bash:grep -q pam_faillock /etc/pam.d/sshd || > grep -q pam_faillock /etc/pam.d/password-auth || exit_error > ./audit-test/libpam/tests/test_pamfaillock_unlock.bash:# Unlike pam_tally2, faillock doesn't have > a --reset=n option that lets us > ./audit-test/libpam/tests/test_pamfaillock_unlock.bash:/sbin/faillock --user $TEST_USER --reset > > /dev/null || exit_error > ./audit-test/libpam/tests/test_pamfaillock_unlock.bash:msg_1="faillock reset > uid=$tuid.*exe=./sbin/faillock.*res=success.*" The faillock tests probably don't need command-level disablement, if the tests are not suitable for SuSE, please exclude them in run.conf of the given bucket (libpam) based on $DISTRO (see rules.mk). > ./audit-test/trustedprograms/tests/utils.plib: `faillock --user '$username' --reset`; > ./audit-test/trustedprograms/tests/utils.plib: `faillock --user '$username' --reset`; > ./audit-test/trustedprograms/tests/utils.plib: `faillock --user '$username' --reset`; > ./audit-test/trustedprograms/tests/utils.plib: `faillock --user '$username' --reset`; > ./audit-test/trustedprograms/tests/utils.plib: `faillock --user '$username' --reset`; > ./audit-test/utils/envcheck: check "[ -z \"$(faillock | grep -v '^\([^ ]*:\|When\)')\" ]" 0 \ > ./audit-test/utils/run.bash: faillock --user "$TEST_USER" --reset > ./audit-test/utils/run.bash: faillock --user "$TEST_ADMIN" --reset > Thanks, Jiri |