]> git.ipfire.org Git - thirdparty/systemd.git/commitdiff
tree-wide: drop space after shell redirection ops 39740/head
authorZbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
Sat, 15 Nov 2025 15:13:47 +0000 (16:13 +0100)
committerZbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
Mon, 17 Nov 2025 15:50:50 +0000 (16:50 +0100)
Those are all unary operators.

29 files changed:
test/integration-tests/TEST-80-NOTIFYACCESS/TEST-80-NOTIFYACCESS.units/reload-timeout.sh
test/integration-tests/TEST-80-NOTIFYACCESS/TEST-80-NOTIFYACCESS.units/test.sh
test/test-bootctl-json.sh
test/units/TEST-07-PID1.issue-31752.sh
test/units/TEST-07-PID1.issue-33672.sh
test/units/TEST-07-PID1.mqueue-ownership.sh
test/units/TEST-13-NSPAWN.machined.sh
test/units/TEST-13-NSPAWN.unpriv.sh
test/units/TEST-16-EXTEND-TIMEOUT.sh
test/units/TEST-17-UDEV.credentials.sh
test/units/TEST-22-TMPFILES.02.sh
test/units/TEST-23-UNIT-FILE.ExtraFileDescriptors.sh
test/units/TEST-29-PORTABLE.directory.sh
test/units/TEST-35-LOGIN.sh
test/units/TEST-50-DISSECT.dissect.sh
test/units/TEST-50-DISSECT.mountfsd.sh
test/units/TEST-54-CREDS.sh
test/units/TEST-63-PATH.sh
test/units/TEST-70-TPM2.creds.sh
test/units/TEST-70-TPM2.cryptsetup.sh
test/units/TEST-70-TPM2.pcrextend.sh
test/units/TEST-70-TPM2.pcrlock.sh
test/units/TEST-74-AUX-UTILS.firstboot.sh
test/units/TEST-74-AUX-UTILS.keyutil.sh
test/units/TEST-74-AUX-UTILS.network-generator.sh
test/units/TEST-74-AUX-UTILS.varlinkctl.sh
test/units/TEST-75-RESOLVED.sh
test/units/TEST-80-NOTIFYACCESS.sh
test/units/TEST-87-AUX-UTILS-VM.validatefs.sh

index 266c3cfef2ccd7751a86c647aaa26e78c35770b8..ac0f4d27a5d3949d195353830c005cefb1a633f1 100755 (executable)
@@ -17,7 +17,7 @@ wait_for_signal() {
 }
 
 sighup_handler() {
-    echo "hup$(( ++COUNTER ))" > /tmp/syncfifo1
+    echo "hup$(( ++COUNTER ))" >/tmp/syncfifo1
 }
 
 trap sighup_handler SIGHUP
index c3a6a3982d6a9fd53fbdee0a7c4df9ce91738d62..a59d2296395f5c491dd5214c4b15317bcd1d3df8 100755 (executable)
@@ -10,7 +10,7 @@ sync_in() {
 }
 
 sync_out() {
-    echo "$1" > /tmp/syncfifo1
+    echo "$1" >/tmp/syncfifo1
 }
 
 export SYSTEMD_LOG_LEVEL=debug
index 4d7c468241b78e7168c60a3367a6dec97aab7622..81355ee10983bc540b4b4e6e40bdb23065986663 100755 (executable)
@@ -37,7 +37,7 @@ if ret=$("bootctl" --print-boot-path); then
     test "$ret" = "/efi" -o "$ret" = "/boot" -o "$ret" = "/boot/efi"
 fi
 
-if "$bootctl" -R > /dev/null ; then
+if "$bootctl" -R >/dev/null ; then
     P=$("$bootctl" -R)
     PP=$("$bootctl" -RR)
 
index 73b6cc69ee6cfa1e9e987bec8a88d1805b5a2744..4904b341afdc07236f719b7d0a05d062fb77bd0f 100755 (executable)
@@ -21,7 +21,7 @@ cleanup() {
 
 trap cleanup EXIT
 
-cat > /run/systemd/system/"$UNIT" <<EOF
+cat >/run/systemd/system/"$UNIT" <<EOF
 [Service]
 ExecStart=true
 RemainAfterExit=yes
@@ -32,7 +32,7 @@ systemctl start "$UNIT"
 assert_eq "$(systemctl show -P NeedDaemonReload "$UNIT")" no
 
 mkdir /run/systemd/system/"$UNIT".d
-cat > /run/systemd/system/"$UNIT".d/desc.conf <<EOF
+cat >/run/systemd/system/"$UNIT".d/desc.conf <<EOF
 [Unit]
 Description=Test NeedDaemonReload status after creating drop-in
 EOF
index 603505884abc462e2554ddc0bab174b691984494..0c2d1ae7f6ba9206491b35524353ee7080529a7f 100755 (executable)
@@ -21,13 +21,13 @@ cleanup() {
 
 trap cleanup EXIT
 
-cat > /run/systemd/system/"$UNIT" <<EOF
+cat >/run/systemd/system/"$UNIT" <<EOF
 [Service]
 ExecStart=true
 EOF
 
 mkdir /run/systemd/system/"$UNIT".d
-cat > /run/systemd/system/"$UNIT".d/desc.conf <<EOF
+cat >/run/systemd/system/"$UNIT".d/desc.conf <<EOF
 [Unit]
 Description=Test NeedDaemonReload status of a masked unit with drop-ins
 EOF
index 19fc101950ddebe7876df971547b73cd57ac45b3..3f3f83f5821d94ca00e56589847b4cb9121945b2 100755 (executable)
@@ -19,7 +19,7 @@ at_exit() {
 }
 trap at_exit EXIT
 
-cat << EOF > /run/systemd/system/mqueue-ownership.socket
+cat <<EOF >/run/systemd/system/mqueue-ownership.socket
 [Unit]
 Description=Create a message queue with customized ownership
 [Socket]
@@ -30,7 +30,7 @@ SocketGroup=$group
 SocketMode=$mode
 EOF
 
-cat << 'EOF' > /run/systemd/system/mqueue-ownership.service
+cat <<EOF >/run/systemd/system/mqueue-ownership.service
 [Unit]
 Description=Dummy service for the socket unit
 Requires=%N.socket
index a9e3817688527c7d8497d750a38d3956f21f9d31..7ae23558dca92e63bb924ed73884005b2f6d81ab 100755 (executable)
@@ -397,7 +397,7 @@ rm -f /tmp/none-existent-file
 # server side, to not generate early SIGHUP. Hence, let's just invoke "sleep
 # infinity" client side, once we acquired the fd (passing it to it), and kill
 # it once we verified everything worked.
-PID=$(systemd-notify --fork -- varlinkctl --exec call /run/systemd/machine/io.systemd.Machine io.systemd.Machine.Open '{"name": ".host", "mode": "shell", "user": "root", "path": "/usr/bin/bash", "args": ["bash", "-c", "echo $FOO > /tmp/none-existent-file"], "environment": ["FOO=BAR"]}' -- sleep infinity)
+PID=$(systemd-notify --fork -- varlinkctl --exec call /run/systemd/machine/io.systemd.Machine io.systemd.Machine.Open '{"name": ".host", "mode": "shell", "user": "root", "path": "/usr/bin/bash", "args": ["bash", "-c", "echo $FOO >/tmp/none-existent-file"], "environment": ["FOO=BAR"]}' -- sleep infinity)
 timeout 30 bash -c "until test -e /tmp/none-existent-file; do sleep .5; done"
 grep -q "BAR" /tmp/none-existent-file
 kill "$PID"
@@ -424,7 +424,7 @@ diff /tmp/foo /var/lib/machines/long-running/root/foo
 (! varlinkctl call /run/systemd/machine/io.systemd.Machine io.systemd.Machine.CopyTo '{"name": "long-running", "source": "/tmp/foo", "destination": "/root/foo"}') # FileExists
 varlinkctl call /run/systemd/machine/io.systemd.Machine io.systemd.Machine.CopyTo '{"name": "long-running", "source": "/tmp/foo", "destination": "/root/foo", "replace": true}'
 
-echo "sample-test-output" > /tmp/foo
+echo "sample-test-output" >/tmp/foo
 varlinkctl call /run/systemd/machine/io.systemd.Machine io.systemd.Machine.CopyTo '{"name": "long-running", "source": "/tmp/foo", "destination": "/root/foo", "replace": true}'
 diff /tmp/foo /var/lib/machines/long-running/root/foo
 rm -f /tmp/foo /var/lib/machines/long-running/root/foo
index 7ae2c74efa31c7a23013785e334a3d4df2564603..22bc03e5db7139a38a36e85d5d1593fdb45d1384 100755 (executable)
@@ -164,7 +164,7 @@ assert_not_in 'nurps' "$(run0 --pipe -u testuser machinectl --user list-images)"
 assert_not_in 'kurps' "$(run0 --pipe -u testuser machinectl --user list-images)"
 
 mkdir /home/testuser/.local/state/machines/inodetest
-echo hallo > /home/testuser/.local/state/machines/inodetest/testfile
+echo hallo >/home/testuser/.local/state/machines/inodetest/testfile
 
 # Make the file sparse, set an xattr, set an ACL, set a chattr flag, and make it hardlink
 ln /home/testuser/.local/state/machines/inodetest/testfile /home/testuser/.local/state/machines/inodetest/testfile.hard
@@ -176,7 +176,7 @@ chown foreign-0:foreign-0 /home/testuser/.local/state/machines/inodetest/testfil
 ls -al /home/testuser/.local/state/machines/inodetest
 
 # Verify UID squashing
-echo gaga > /home/testuser/.local/state/machines/inodetest/squashtest
+echo gaga >/home/testuser/.local/state/machines/inodetest/squashtest
 chown 1000:1000 /home/testuser/.local/state/machines/inodetest/squashtest
 
 # Ensure hardlinked symlinks work
@@ -217,7 +217,7 @@ run0 -u testuser machinectl --user remove inodetest2
 
 # Test tree mangling (i.e. moving the root dir one level up on extract)
 mkdir -p /var/tmp/mangletest/mangletest-0.1/usr/lib
-echo "ID=brumm" > /var/tmp/mangletest/mangletest-0.1/usr/lib/os-release
+echo "ID=brumm" >/var/tmp/mangletest/mangletest-0.1/usr/lib/os-release
 tar -C /var/tmp/mangletest/ -cvzf /var/tmp/mangletest.tar.gz mangletest-0.1
 run0 --pipe -u testuser importctl -m --user import-tar /var/tmp/mangletest.tar.gz
 cmp /var/tmp/mangletest/mangletest-0.1/usr/lib/os-release /home/testuser/.local/state/machines/mangletest/usr/lib/os-release
index 19f3ed771b20cee9adfe91e24caa448083a8bd2c..93fc0b78f6061782a052e96526c20d4f24dcdbeb 100755 (executable)
@@ -86,7 +86,7 @@ systemd-run \
     -u runtime-max-sec-test-3.service \
     sh -c "while true; do sleep 1; done"
 mkdir -p /etc/systemd/system/runtime-max-sec-test-3.service.d/
-cat > /etc/systemd/system/runtime-max-sec-test-3.service.d/override.conf << EOF
+cat >/etc/systemd/system/runtime-max-sec-test-3.service.d/override.conf <<EOF
 [Service]
 RuntimeMaxSec=${runtime_max_sec}s
 EOF
@@ -103,7 +103,7 @@ until systemctl is-active runtime-max-sec-test-4.scope; do
     sleep 1
 done
 mkdir -p /etc/systemd/system/runtime-max-sec-test-4.scope.d/
-cat > /etc/systemd/system/runtime-max-sec-test-4.scope.d/override.conf << EOF
+cat >/etc/systemd/system/runtime-max-sec-test-4.scope.d/override.conf <<EOF
 [Scope]
 RuntimeMaxSec=${runtime_max_sec}s
 EOF
index 2552dc6809f68bfdc2b43ed876e80b2c6a4721cb..e65608b6ce81ed169372ca31f0badff34d0ae736 100755 (executable)
@@ -19,10 +19,10 @@ at_exit() {
 trap at_exit EXIT
 
 mkdir -p /run/credstore
-cat > /run/credstore/udev.conf.50-testme <<EOF
+cat >/run/credstore/udev.conf.50-testme <<EOF
 udev_log=debug
 EOF
-cat > /run/credstore/udev.rules.50-testme <<EOF
+cat >/run/credstore/udev.rules.50-testme <<EOF
 SUBSYSTEM=="net", OPTIONS="log_level=debug"
 EOF
 
index 60d2c1156d53d45887d297d91dd8019fbd9d1909..3e5496683e2bdef26c1a2da075508d67c6d0cb3a 100755 (executable)
@@ -139,7 +139,7 @@ test "$(stat -c %U:%G:%a /tmp/C/3/f1)" = "root:root:644"
 test ! -e /tmp/C/4
 
 touch /tmp/C/3-origin/f{2,3,4}
-echo -n ABC > /tmp/C/3/f1
+echo -n ABC >/tmp/C/3/f1
 
 systemd-tmpfiles --create - <<EOF
 C+     /tmp/C/3    0755 daemon daemon - /tmp/C/3-origin
index 12efaf15dcb68c2fde957c234851be9833303b45..c3bba34d15c259ab2d3b9bb61e0cfffe08f8fffd 100755 (executable)
@@ -15,8 +15,8 @@ at_exit() {
 trap at_exit EXIT
 
 mkdir /tmp/test-extra-fd
-echo "Hello" > /tmp/test-extra-fd/1.txt
-echo "Extra" > /tmp/test-extra-fd/2.txt
+echo "Hello" >/tmp/test-extra-fd/1.txt
+echo "Extra" >/tmp/test-extra-fd/2.txt
 
 # Open files and assign FD to variables
 exec {TEST_FD1}</tmp/test-extra-fd/1.txt
index 2cbd7da009c42448094f50439eca847ae31d892c..e8ceafb28ece7c395d15105d150e304e4a74e79f 100755 (executable)
@@ -138,7 +138,7 @@ portablectl detach --now --runtime --enable /tmp/rootdir minimal-app0
 # The wrong file should be ignored, given the right one has the xattr set
 trap 'rm -rf /var/cache/wrongext' EXIT
 mkdir -p /var/cache/wrongext/usr/lib/extension-release.d /var/cache/wrongext/usr/lib/systemd/system/
-echo "[Service]" > /var/cache/wrongext/usr/lib/systemd/system/app0.service
+echo "[Service]" >/var/cache/wrongext/usr/lib/systemd/system/app0.service
 touch /var/cache/wrongext/usr/lib/extension-release.d/extension-release.wrongext_somethingwrong.txt
 cp /tmp/rootdir/usr/lib/os-release /var/cache/wrongext/usr/lib/extension-release.d/extension-release.app0
 setfattr -n user.extension-release.strict -v "false" /var/cache/wrongext/usr/lib/extension-release.d/extension-release.app0
index 813ea5938036c7e70ca7a240d253df8518e713a3..d4a07faca135b111af5c2f39dd757691c15ab724 100755 (executable)
@@ -674,7 +674,7 @@ testcase_ambient_caps() {
     TRANSIENTUNIT="capwakealarm$RANDOM.service"
     SCRIPT="/tmp/capwakealarm$RANDOM.sh"
 
-    cat > /etc/pam.d/"$PAMSERVICE" <<EOF
+    cat >/etc/pam.d/"$PAMSERVICE" <<EOF
 auth sufficient    pam_unix.so
 auth required      pam_deny.so
 account sufficient pam_unix.so
@@ -725,7 +725,7 @@ testcase_background() {
 
     trap background_at_return RETURN
 
-    cat > /etc/pam.d/"$PAMSERVICE" <<EOF
+    cat >/etc/pam.d/"$PAMSERVICE" <<EOF
 auth sufficient    pam_unix.so
 auth required      pam_deny.so
 account sufficient pam_unix.so
index 922dca0cf820bb9209cfddfb03d2c94e56aeb9f8..6ac4263dff77facecd95e3f104706bb63b2c353e 100755 (executable)
@@ -916,7 +916,7 @@ systemd-dissect --list /tmp/img >/dev/null
 read -r SHA256SUM1 _ < <(systemd-dissect --copy-from /tmp/img etc/os-release | sha256sum)
 test "$SHA256SUM1" != ""
 
-echo abc > abc
+echo abc >abc
 systemd-dissect --copy-to /tmp/img abc /abc
 test -f /tmp/img/abc
 
index 92d497903f20b5e49469bbed009037a361675cf5..a70cf6df0fa9f9af59c0b49c559ecf110b37c494 100755 (executable)
@@ -122,7 +122,7 @@ cmp /tmp/unpriv.raw.mtree /tmp/unpriv2.raw.mtree
 
 # Make sure nspawn works unpriv, too (for now do not nest)
 if ! systemd-detect-virt -c; then
-    systemd-nspawn --pipe -i /var/tmp/unpriv.raw --read-only echo thisisatest > /tmp/unpriv.out
+    systemd-nspawn --pipe -i /var/tmp/unpriv.raw --read-only echo thisisatest >/tmp/unpriv.out
     echo thisisatest | cmp /tmp/unpriv.out -
 
     # The unpriv user has no rights to lock the image or write to it. Let's
index 5cfa19905abe7f661462a5564607e6bcb3bdf6f7..6878141aae612ef67ec1489425d9e7db82733a52 100755 (executable)
@@ -490,24 +490,24 @@ fi
 # Decrypt/encrypt via varlink
 
 DATA="Zm9vYmFyCg=="
-echo "{\"data\":\"$DATA\"}" > /tmp/vlcredsdata
+echo "{\"data\":\"$DATA\"}" >/tmp/vlcredsdata
 
 varlinkctl call /run/systemd/io.systemd.Credentials io.systemd.Credentials.Encrypt "$(cat /tmp/vlcredsdata)" | \
-    varlinkctl call --json=short /run/systemd/io.systemd.Credentials io.systemd.Credentials.Decrypt > /tmp/vlcredsdata2
+    varlinkctl call --json=short /run/systemd/io.systemd.Credentials io.systemd.Credentials.Decrypt >/tmp/vlcredsdata2
 
 cmp /tmp/vlcredsdata /tmp/vlcredsdata2
 rm /tmp/vlcredsdata2
 
 # Pick a key type explicitly
 varlinkctl call /run/systemd/io.systemd.Credentials io.systemd.Credentials.Encrypt "{\"data\":\"$DATA\",\"withKey\":\"host\"}" | \
-    varlinkctl call --json=short /run/systemd/io.systemd.Credentials io.systemd.Credentials.Decrypt > /tmp/vlcredsdata2
+    varlinkctl call --json=short /run/systemd/io.systemd.Credentials io.systemd.Credentials.Decrypt >/tmp/vlcredsdata2
 
 cmp /tmp/vlcredsdata /tmp/vlcredsdata2
 rm /tmp/vlcredsdata2
 
 varlinkctl call /run/systemd/io.systemd.Credentials io.systemd.Credentials.Encrypt "{\"data\":\"$DATA\",\"withKey\":\"null\"}" | \
     jq '.["allowNull"] = true' |
-    varlinkctl call --json=short /run/systemd/io.systemd.Credentials io.systemd.Credentials.Decrypt > /tmp/vlcredsdata2
+    varlinkctl call --json=short /run/systemd/io.systemd.Credentials io.systemd.Credentials.Decrypt >/tmp/vlcredsdata2
 
 cmp /tmp/vlcredsdata /tmp/vlcredsdata2
 rm /tmp/vlcredsdata /tmp/vlcredsdata2
index fa58ff382c0a0ff21d78a5c576f611cba4567ae3..5a49dfb4e90d01fcbc300a25f4f68563a3132404 100755 (executable)
@@ -110,11 +110,11 @@ assert_in "test63-issue-24577-dep.service" "$output"
 systemctl start test63-pr-30768.path
 exec {lock}<>/tmp/noexit
 flock -e $lock
-echo test1 > /tmp/copyme
+echo test1 >/tmp/copyme
 # shellcheck disable=SC2016
 timeout 30 bash -c 'until test "$(systemctl show test63-pr-30768.service -P ActiveState)" = deactivating; do sleep .2; done'
 diff /tmp/copyme /tmp/copied
-echo test2 > /tmp/copyme
+echo test2 >/tmp/copyme
 exec {lock}<&-
 timeout 30 bash -c 'until diff /tmp/copyme /tmp/copied >/dev/null; do sleep .2; done'
 
index e66bfd19c513cd82b93dd2ead3c0c9db4b311a7a..15899d10578992849ae3f226c66276c4050631e7 100755 (executable)
@@ -6,7 +6,7 @@ set -o pipefail
 export SYSTEMD_LOG_LEVEL=debug
 
 # Ensure that sandboxing doesn't stop creds from being accessible
-echo "test" > /tmp/testdata
+echo "test" >/tmp/testdata
 systemd-creds encrypt /tmp/testdata /tmp/testdata.encrypted --with-key=tpm2
 # LoadCredentialEncrypted
 systemd-run -p PrivateDevices=yes -p LoadCredentialEncrypted=testdata.encrypted:/tmp/testdata.encrypted --pipe --wait systemd-creds cat testdata.encrypted | cmp - /tmp/testdata
index 8c1a362fbccb8d5134f34f95fa3e1d943992a899..e8f3c9b7078d1f84db848c0add2f7880a252def5 100755 (executable)
@@ -135,7 +135,7 @@ if tpm_has_pcr sha256 12; then
     tpm2_pcrread -Q -o /tmp/pcr.dat sha256:12
     CURRENT_PCR_VALUE=$(cat /sys/class/tpm/tpm0/pcr-sha256/12)
     tpm2_readpublic -c 0x81000001 -o /tmp/srk.pub
-    systemd-analyze srk > /tmp/srk2.pub
+    systemd-analyze srk >/tmp/srk2.pub
     cmp /tmp/srk.pub /tmp/srk2.pub
     if [ -f /run/systemd/tpm2-srk-public-key.tpm2b_public ] ; then
         cmp /tmp/srk.pub /run/systemd/tpm2-srk-public-key.tpm2b_public
@@ -203,7 +203,7 @@ if openssl_supports_kdf SSKDF; then
     # Make sure that --tpm2-device-key= also works with systemd-repart
     tpm2_readpublic -c 0x81000001 -o /tmp/srk.pub
     mkdir /tmp/dditest
-    cat > /tmp/dditest/50-root.conf <<EOF
+    cat >/tmp/dditest/50-root.conf <<EOF
 [Partition]
 Type=root
 Format=ext4
index e5cd4843d63e489d1f9e4a0e5ceab00fae1637d0..c13722c961f9b8091ee80d1f66811cc7e2304da4 100755 (executable)
@@ -92,7 +92,7 @@ RECORD_COUNT=$((RECORD_COUNT + 1))
 tpm2_pcrread sha256:11 -Q -o /tmp/oldpcr11
 # Do the equivalent of 'SYSTEMD_FORCE_MEASURE=1 "$SD_PCREXTEND" foobar' via Varlink, just to test the Varlink logic (but first we need to patch out the conditionalization...)
 mkdir -p /run/systemd/system/systemd-pcrextend.socket.d
-cat > /run/systemd/system/systemd-pcrextend.socket.d/50-no-condition.conf <<EOF
+cat >/run/systemd/system/systemd-pcrextend.socket.d/50-no-condition.conf <<EOF
 [Unit]
 # Turn off all conditions */
 ConditionSecurity=
index 7e546273b39deb777c59b7071c86b2e0285e88e1..5fea226c1082615380fdb12a130e325c6f9f534f 100755 (executable)
@@ -196,7 +196,7 @@ SYSTEMD_XBOOTLDR_PATH=/tmp/fakexbootldr SYSTEMD_RELAX_XBOOTLDR_CHECKS=1 "$SD_PCR
 # Exercise Varlink API a bit (but first turn off condition)
 
 mkdir -p /run/systemd/system/systemd-pcrlock.socket.d
-cat > /run/systemd/system/systemd-pcrlock.socket.d/50-no-condition.conf <<EOF
+cat >/run/systemd/system/systemd-pcrlock.socket.d/50-no-condition.conf <<EOF
 [Unit]
 # Turn off all conditions
 ConditionSecurity=
index d6946ba4ee2f4e1bc7e213b582cc4451f58f8ac7..5ae97b2a480bdb8515cf8a8d49c1adc661d46918 100755 (executable)
@@ -224,7 +224,7 @@ if [ -d "/usr/share/keymaps/" ] || [ -d "/usr/share/kbd/keymaps/" ] || [ -d "/us
 
    rm "$ROOT/etc/vconsole.conf"
    # this should be a NOP, given that stdout is connected to /dev/null, and hence not a VT
-   systemd-firstboot --root="$ROOT" --prompt-keymap-auto > /dev/null
+   systemd-firstboot --root="$ROOT" --prompt-keymap-auto >/dev/null
 fi
 echo -ne "Europe/Berlin\n" | systemd-firstboot --root="$ROOT" --prompt-timezone
 readlink "$ROOT/etc/localtime" | grep -q "Europe/Berlin$"
index 0c5c0d5d9b22d4814bf3ff04a13a72c6f122a247..172939253e4510b8fdb5d6bdf69c835146f9ef51 100755 (executable)
@@ -49,20 +49,20 @@ testcase_public() {
 
 verify_pkcs7() {
     # Verify using internal certificate
-    openssl smime -verify -binary -inform der -in /tmp/payload.p7s -content /tmp/payload -noverify > /dev/null
+    openssl smime -verify -binary -inform der -in /tmp/payload.p7s -content /tmp/payload -noverify >/dev/null
     # Verify using external (original) certificate
-    openssl smime -verify -binary -inform der -in /tmp/payload.p7s -content /tmp/payload -noverify -certfile /tmp/test.crt -nointern > /dev/null
+    openssl smime -verify -binary -inform der -in /tmp/payload.p7s -content /tmp/payload -noverify -certfile /tmp/test.crt -nointern >/dev/null
 }
 
 verify_pkcs7_fail() {
     # Verify using internal certificate
-    (! openssl smime -verify -binary -inform der -in /tmp/payload.p7s -content /tmp/payload -noverify > /dev/null)
+    (! openssl smime -verify -binary -inform der -in /tmp/payload.p7s -content /tmp/payload -noverify >/dev/null)
     # Verify using external (original) certificate
-    (! openssl smime -verify -binary -inform der -in /tmp/payload.p7s -content /tmp/payload -noverify -certfile /tmp/test.crt -nointern > /dev/null)
+    (! openssl smime -verify -binary -inform der -in /tmp/payload.p7s -content /tmp/payload -noverify -certfile /tmp/test.crt -nointern >/dev/null)
 }
 
 testcase_pkcs7() {
-    echo -n "test" > /tmp/payload
+    echo -n "test" >/tmp/payload
 
     for hashalg in sha256 sha384 sha512; do
         # shellcheck disable=SC2086
index 5b5b0a13a398303886562b9b7898ce75b58b63fc..44912b2a0f38549bfae5062e6dfa7e161a9b4763 100755 (executable)
@@ -15,12 +15,12 @@ at_exit() {
 trap at_exit EXIT
 
 mkdir -p /run/credstore
-cat > /run/credstore/network.conf.50-testme <<EOF
+cat >/run/credstore/network.conf.50-testme <<EOF
 [Network]
 SpeedMeter=yes
 EOF
 
-cat > /run/credstore/network.network.50-testme <<EOF
+cat >/run/credstore/network.network.50-testme <<EOF
 [Match]
 Property=IDONTEXIST
 EOF
index a35097ffa7a4e69fb6b2217a2d1b26ee7c7ae001..c24752e70e5cf36beadaa2dcee2a71e62c34f6b7 100755 (executable)
@@ -175,8 +175,8 @@ varlinkctl introspect /run/systemd/io.systemd.Hostname io.systemd.Hostname
 varlinkctl call /run/systemd/io.systemd.Hostname io.systemd.Hostname.Describe '{}'
 
 # Validate that --exec results in the very same values
-varlinkctl call /run/systemd/io.systemd.Hostname io.systemd.Hostname.Describe '{}' | jq > /tmp/describe1.json
-varlinkctl --exec call /run/systemd/io.systemd.Hostname io.systemd.Hostname.Describe '{}' -- jq > /tmp/describe2.json
+varlinkctl call /run/systemd/io.systemd.Hostname io.systemd.Hostname.Describe '{}' | jq >/tmp/describe1.json
+varlinkctl --exec call /run/systemd/io.systemd.Hostname io.systemd.Hostname.Describe '{}' -- jq >/tmp/describe2.json
 cmp /tmp/describe1.json /tmp/describe2.json
 rm /tmp/describe1.json /tmp/describe2.json
 
index 4d2257d6e0f9864bb2e83effeaaee5e83df54c51..b2dbd2d1b18a9ad477611dcb527a083dad118730 100755 (executable)
@@ -817,7 +817,7 @@ testcase_09_resolvectl_showcache() {
         echo "[NetDev]"
         echo "Name=dns2"
         echo "Kind=dummy"
-    } > /run/systemd/network/10-dns2.netdev
+    } >/run/systemd/network/10-dns2.netdev
     {
         echo "[Match]"
         echo "Name=dns2"
@@ -825,7 +825,7 @@ testcase_09_resolvectl_showcache() {
         echo "IPv6AcceptRA=no"
         echo "Address=10.123.0.1/24"
         echo "DNS=10.0.0.1"
-    } > /run/systemd/network/10-dns2.network
+    } >/run/systemd/network/10-dns2.network
     networkctl reload
     networkctl reconfigure dns2
 
@@ -834,7 +834,7 @@ testcase_09_resolvectl_showcache() {
         echo "[Resolve]"
         echo "DNSSEC=no"
         echo "DNSOverTLS=no"
-    } > /run/systemd/resolved.conf.d/90-resolved.conf
+    } >/run/systemd/resolved.conf.d/90-resolved.conf
     systemctl reload systemd-resolved.service
 
     test "$(resolvectl show-cache --json=short | jq -rc '.[] | select(.ifname == "dns2" and .protocol == "dns") | .dnssec')" == 'no'
@@ -844,7 +844,7 @@ testcase_09_resolvectl_showcache() {
         echo "[Resolve]"
         echo "DNSSEC=allow-downgrade"
         echo "DNSOverTLS=opportunistic"
-    } > /run/systemd/resolved.conf.d/90-resolved.conf
+    } >/run/systemd/resolved.conf.d/90-resolved.conf
     systemctl reload systemd-resolved.service
 
     test "$(resolvectl show-cache --json=short | jq -rc '.[] | select(.ifname == "dns2" and .protocol == "dns") | .dnssec')" == 'allow-downgrade'
index 22a5a3af80d05ff4ebf9226602cd201bdcdf4d74..bac4af1988a7741377757a7feaa6c440e852f4a0 100755 (executable)
@@ -15,7 +15,7 @@ sync_in() {
 }
 
 sync_out() {
-    echo "$1" > /tmp/syncfifo2
+    echo "$1" >/tmp/syncfifo2
 }
 
 export SYSTEMD_LOG_LEVEL=debug
index 86120975be73f8b341818e40a18b4282dc389d17..f3f06137780bb9b1837f08b0a5e0a11ddef2b38a 100755 (executable)
@@ -28,14 +28,14 @@ at_exit() {
 trap at_exit EXIT
 
 mkdir /tmp/validatefs-test
-cat > /tmp/validatefs-test/validatefs-root.conf <<EOF
+cat >/tmp/validatefs-test/validatefs-root.conf <<EOF
 [Partition]
 Type=root
 Label=kromm
 Format=ext4
 EOF
 
-cat > /tmp/validatefs-test/validatefs-usr.conf <<EOF
+cat >/tmp/validatefs-test/validatefs-usr.conf <<EOF
 [Partition]
 Type=usr
 Label=plisch
@@ -44,7 +44,7 @@ Verity=data
 VerityMatchKey=mupf
 EOF
 
-cat > /tmp/validatefs-test/validatefs-usr-verity.conf <<EOF
+cat >/tmp/validatefs-test/validatefs-usr-verity.conf <<EOF
 [Partition]
 Type=usr-verity
 Label=plisch-verity
@@ -52,21 +52,21 @@ Verity=hash
 VerityMatchKey=mupf
 EOF
 
-cat > /tmp/validatefs-test/validatefs-home.conf <<EOF
+cat >/tmp/validatefs-test/validatefs-home.conf <<EOF
 [Partition]
 Type=home
 Label=rupft
 Format=ext4
 EOF
 
-cat > /tmp/validatefs-test/validatefs-esp.conf <<EOF
+cat >/tmp/validatefs-test/validatefs-esp.conf <<EOF
 [Partition]
 Type=esp
 Label=fumm
 Format=vfat
 EOF
 
-cat > /tmp/validatefs-test/validatefs-generic.conf <<EOF
+cat >/tmp/validatefs-test/validatefs-generic.conf <<EOF
 [Partition]
 Label=qnurx
 Type=linux-generic