Radish alpha
H
rad:z3QDZAW2FAfuLvihrhiyDC9fAD8G9
HardenedBSD Package Manager
Radicle
Git
Provide mechanisms to ignore jails via prefix matching during audits
Dan Langille committed 1 year ago
commit 4c72d06e3559b62a0694c6eccc1edf27fa724b17
parent 8ac4cc9
2 files changed +24 -0
modified scripts/periodic/405.pkg-base-audit.in
@@ -181,6 +181,18 @@ audit_base_all() {
				continue 2
			fi
		done
+

+
		# ignore some jails
+
		# we iterate to get prefix matches because we foo to match foo.bar
+
		for ignore in ${security_status_baseaudit_jails_ignore_wild} ; do
+
			if [ $(expr "${j%|*}" : "${ignore}") -ne 0 ] ; then
+
				echo
+
				echo "ignoring jail: ${j%|*}"
+
				# continue with the main loop
+
				continue 2
+
			fi
+
		done
+

		echo
		echo "jail: ${j%|*}"
		audit_base "-j ${j%|*}" ${j##*|}
modified scripts/periodic/410.pkg-audit.in
@@ -176,6 +176,18 @@ audit_pkgs_all() {
				continue 2
			fi
		done
+

+
		# ignore some jails
+
		# we iterate to get prefix matches because we foo to match foo.bar
+
		for ignore in ${security_status_pkgaudit_jails_ignore_wild} ; do
+
			if [ $(expr "${j%|*}" : "${ignore}") -ne 0 ] ; then
+
				echo
+
				echo "ignoring jail: ${j%|*}"
+
				# continue with the main loop
+
				continue 2
+
			fi
+
		done
+

		echo
		echo "jail: ${j%|*}"
		for t in audit expiration deprecation; do