New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

qubes-hcl-report doesn't properly escape spaces in machine name #1994

Closed
marmarek opened this Issue May 16, 2016 · 4 comments

Comments

Projects
None yet
3 participants
@marmarek
Member

marmarek commented May 16, 2016

There is expression meant to replace non-alphanumeric characters with underscore, but apparently it doesn't work:
https://github.com/QubesOS/qubes-core-admin/blob/master/qvm-tools/qubes-hcl-report#L106

FILENAME="Qubes-HCL-${BRAND//+([^[:alnum:]])/_}-${PRODUCT//+([^[:alnum:]])/_}-$DATE"

According to bash manual it should be ok. And it works on bash 4.3.42, but not on 4.2.53 which we have in dom0. Some bash bug?

Reported by picard

@marmarek marmarek added this to the Release 3.0 updates milestone May 16, 2016

@unman

This comment has been minimized.

Show comment
Hide comment
@unman

unman May 19, 2016

Member

What about this?
FILENAME="Qubes-HCL-${BRAND//[^[:alnum:]]/_}-${PRODUCT//[^[:alnum:]]/_}-$DATE"

Member

unman commented May 19, 2016

What about this?
FILENAME="Qubes-HCL-${BRAND//[^[:alnum:]]/_}-${PRODUCT//[^[:alnum:]]/_}-$DATE"

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek May 19, 2016

Member

Yes, I have exactly this already committed, just not pushed yet.

Member

marmarek commented May 19, 2016

Yes, I have exactly this already committed, just not pushed yet.

@marmarek marmarek self-assigned this May 19, 2016

@tomck tomck referenced this issue in QubesOS/qubes-hcl Jun 9, 2016

Merged

Add HCL report for Dell XPS L702X #2

marmarek added a commit to QubesOS/qubes-core-admin that referenced this issue Jun 25, 2016

qubes-hcl-report: filename sanitization for old bash
Bash in dom0 (Fedora 20 based) doesn't properly handle "+(..)" operator.
So remove it for now.

Fixes QubesOS/qubes-issues#1994

(cherry picked from commit 7c0f5a4)
@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jun 25, 2016

Member

Automated announcement from builder-github

The package qubes-core-dom0-3.1.17-1.fc20 has been pushed to the r3.1 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

Member

marmarek commented Jun 25, 2016

Automated announcement from builder-github

The package qubes-core-dom0-3.1.17-1.fc20 has been pushed to the r3.1 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jul 25, 2016

Member

Automated announcement from builder-github

The package qubes-core-dom0-3.1.17-1.fc20 has been pushed to the r3.1 stable repository for dom0.
To install this update, please use the standard update command:

sudo qubes-dom0-update

Or update dom0 via Qubes Manager.

Changes included in this update

Member

marmarek commented Jul 25, 2016

Automated announcement from builder-github

The package qubes-core-dom0-3.1.17-1.fc20 has been pushed to the r3.1 stable repository for dom0.
To install this update, please use the standard update command:

sudo qubes-dom0-update

Or update dom0 via Qubes Manager.

Changes included in this update

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment