unix: remove always true check from uipc_attach
[freebsd/src.git] / libexec / rc / tests / rc_subr_test.sh
blobf004354fe52e274ad52085fbd618886d80801023
2 # Copyright 2022 Mateusz Piotrowski <0mp@FreeBSD.org>
4 # SPDX-License-Identifier: BSD-2-Clause
6 # Redistribution and use in source and binary forms, with or without
7 # modification, are permitted provided that the following conditions
8 # are met:
9 # 1. Redistributions of source code must retain the above copyright
10 # notice, this list of conditions and the following disclaimer.
11 # 2. Redistributions in binary form must reproduce the above copyright
12 # notice, this list of conditions and the following disclaimer in the
13 # documentation and/or other materials provided with the distribution.
15 # THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
16 # ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17 # IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18 # ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
19 # FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20 # DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21 # OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22 # HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23 # LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24 # OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25 # SUCH DAMAGE.
28 atf_test_case oomprotect_all
29 oomprotect_all_head()
31 atf_set "descr" "Verify that \${name}_oomprotect=all protects " \
32 "the command and all its current and future children"
33 atf_set "require.user" "root" # For protect(1).
36 oomprotect_all_body()
38 if [ "$(sysctl -n security.jail.jailed)" != 0 ]; then
39 atf_skip "protect(1) cannot be used in a jail"
42 __name="$(atf_get ident)"
43 __pidfile="$(mktemp -t "${__name}.pid")"
44 __childpidfile="$(mktemp -t "${__name}.childpid")"
45 __script=$(mktemp -t "${__name}.script")
47 cat >> "$__script" <<-'LITERAL'
48 . /etc/rc.subr
49 name="$1"
50 pidfile="$2"
51 _childpidfile="$3"
52 _rc_arg="$4"
53 setvar "${name}_oomprotect" all
54 command="/usr/sbin/daemon"
55 command_args="-P $pidfile -p $_childpidfile -- /bin/sleep 5"
56 run_rc_command "$_rc_arg"
57 LITERAL
59 atf_check -s exit:0 -o inline:"Starting ${__name}.\n" -e empty \
60 /bin/sh "$__script" "$__name" "$__pidfile" "$__childpidfile" onestart
61 atf_check -s exit:0 -o match:'^..1..... .......1$' -e empty \
62 ps -p "$(cat "$__pidfile")" -ax -o flags,flags2
63 atf_check -s exit:0 -o match:'^..1..... .......1$' -e empty \
64 ps -p "$(cat "$__childpidfile")" -ax -o flags,flags2
65 atf_check -s exit:0 -o ignore -e empty \
66 /bin/sh "$__script" "$__name" "$__pidfile" "$__childpidfile" onestop
69 atf_test_case oomprotect_yes
70 oomprotect_yes_head()
72 atf_set "descr" "Verify that \${name}_oomprotect=yes protects " \
73 "the command but not its children"
74 atf_set "require.user" "root" # For protect(1).
77 oomprotect_yes_body()
79 if [ "$(sysctl -n security.jail.jailed)" != 0 ]; then
80 atf_skip "protect(1) cannot be used in a jail"
83 __name="$(atf_get ident)"
84 __pidfile="$(mktemp -t "${__name}.pid")"
85 __script=$(mktemp -t "${__name}.script")
87 cat >> "$__script" <<-'LITERAL'
88 . /etc/rc.subr
89 name="$1"
90 pidfile="$2"
91 _rc_arg="$3"
92 setvar "${name}_oomprotect" yes
93 procname="/bin/sleep"
94 command="/usr/sbin/daemon"
95 command_args="-p $pidfile -- $procname 5"
96 run_rc_command "$_rc_arg"
97 LITERAL
99 atf_check -s exit:0 -o inline:"Starting ${__name}.\n" -e empty \
100 /bin/sh "$__script" "$__name" "$__pidfile" onestart
101 atf_check -s exit:0 -o match:'^..1..... .......0$' -e empty \
102 ps -p "$(cat "$__pidfile")" -ax -o flags,flags2
103 atf_check -s exit:0 -o ignore -e empty \
104 /bin/sh "$__script" "$__name" "$__pidfile" onestop
107 atf_init_test_cases()
109 atf_add_test_case oomprotect_all
110 atf_add_test_case oomprotect_yes