mirror of
git://anongit.mindrot.org/openssh.git
synced 2024-12-12 04:24:21 +08:00
05b5e518c9
[regress/login-timeout.sh regress/reexec.sh regress/test-exec.sh] Use SUDO when cat'ing pid files and running the sshd log wrapper so that it works with a restrictive umask and the pid files are not world readable. Changes from -portable. (id sync only)
74 lines
1.2 KiB
Bash
74 lines
1.2 KiB
Bash
# $OpenBSD: reexec.sh,v 1.7 2013/05/17 10:23:52 dtucker Exp $
|
|
# Placed in the Public Domain.
|
|
|
|
tid="reexec tests"
|
|
|
|
SSHD_ORIG=$SSHD
|
|
SSHD_COPY=$OBJ/sshd
|
|
|
|
# Start a sshd and then delete it
|
|
start_sshd_copy ()
|
|
{
|
|
cp $SSHD_ORIG $SSHD_COPY
|
|
SSHD=$SSHD_COPY
|
|
start_sshd
|
|
SSHD=$SSHD_ORIG
|
|
}
|
|
|
|
# Do basic copy tests
|
|
copy_tests ()
|
|
{
|
|
rm -f ${COPY}
|
|
for p in 1 2; do
|
|
verbose "$tid: proto $p"
|
|
${SSH} -nqo "Protocol=$p" -F $OBJ/ssh_config somehost \
|
|
cat ${DATA} > ${COPY}
|
|
if [ $? -ne 0 ]; then
|
|
fail "ssh cat $DATA failed"
|
|
fi
|
|
cmp ${DATA} ${COPY} || fail "corrupted copy"
|
|
rm -f ${COPY}
|
|
done
|
|
}
|
|
|
|
verbose "test config passing"
|
|
|
|
cp $OBJ/sshd_config $OBJ/sshd_config.orig
|
|
start_sshd
|
|
echo "InvalidXXX=no" >> $OBJ/sshd_config
|
|
|
|
copy_tests
|
|
|
|
$SUDO kill `$SUDO cat $PIDFILE`
|
|
rm -f $PIDFILE
|
|
|
|
cp $OBJ/sshd_config.orig $OBJ/sshd_config
|
|
|
|
# cygwin can't fork a deleted binary
|
|
if [ "$os" != "cygwin" ]; then
|
|
|
|
verbose "test reexec fallback"
|
|
|
|
start_sshd_copy
|
|
rm -f $SSHD_COPY
|
|
|
|
copy_tests
|
|
|
|
$SUDO kill `$SUDO cat $PIDFILE`
|
|
rm -f $PIDFILE
|
|
|
|
verbose "test reexec fallback without privsep"
|
|
|
|
cp $OBJ/sshd_config.orig $OBJ/sshd_config
|
|
echo "UsePrivilegeSeparation=no" >> $OBJ/sshd_config
|
|
|
|
start_sshd_copy
|
|
rm -f $SSHD_COPY
|
|
|
|
copy_tests
|
|
|
|
$SUDO kill `$SUDO cat $PIDFILE`
|
|
rm -f $PIDFILE
|
|
|
|
fi
|