Remove building with NOCRYPTO option
[minix.git] / tests / fs / psshfs / t_psshfs.sh
blob241d46d5d040fac64c922c4cd75c6d42922e6f89
1 # $NetBSD: t_psshfs.sh,v 1.7 2013/03/16 07:54:04 jmmv Exp $
3 # Copyright (c) 2007, 2008 The NetBSD Foundation, Inc.
4 # All rights reserved.
6 # Redistribution and use in source and binary forms, with or without
7 # modification, are permitted provided that the following conditions
8 # are met:
9 # 1. Redistributions of source code must retain the above copyright
10 # notice, this list of conditions and the following disclaimer.
11 # 2. Redistributions in binary form must reproduce the above copyright
12 # notice, this list of conditions and the following disclaimer in the
13 # documentation and/or other materials provided with the distribution.
15 # THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
16 # ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
17 # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
18 # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
19 # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
20 # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
21 # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
22 # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
23 # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
24 # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
25 # POSSIBILITY OF SUCH DAMAGE.
28 # -------------------------------------------------------------------------
29 # Auxiliary functions.
30 # -------------------------------------------------------------------------
33 # Skips the calling test case if puffs is not supported in the kernel
34 # or if the calling user does not have the necessary permissions to mount
35 # file systems.
37 require_puffs() {
38 case "$($(atf_get_srcdir)/h_have_puffs)" in
39 eacces)
40 atf_skip "Cannot open /dev/puffs for read/write access"
42 enxio)
43 atf_skip "puffs support not built into the kernel"
45 failed)
46 atf_skip "Unknown error trying to access /dev/puffs"
48 yes)
51 atf_fail "Unknown value returned by h_have_puffs"
53 esac
55 if [ $(id -u) -ne 0 -a $(sysctl -n vfs.generic.usermount) -eq 0 ]
56 then
57 atf_skip "Regular users cannot mount file systems" \
58 "(vfs.generic.usermount is set to 0)"
63 # Starts a SSH server and sets up the client to access it.
64 # Authentication is allowed and done using an RSA key exclusively, which
65 # is generated on the fly as part of the test case.
66 # XXX: Ideally, all the tests in this test program should be able to share
67 # the generated key, because creating it can be a very slow process on some
68 # machines.
70 start_ssh() {
71 echo "Setting up SSH server configuration"
72 sed -e "s,@SRCDIR@,$(atf_get_srcdir),g" -e "s,@WORKDIR@,$(pwd),g" \
73 $(atf_get_srcdir)/sshd_config.in >sshd_config || \
74 atf_fail "Failed to create sshd_config"
75 atf_check -s eq:0 -o empty -e empty cp /usr/libexec/sftp-server .
76 atf_check -s eq:0 -o empty -e empty \
77 cp $(atf_get_srcdir)/ssh_host_key .
78 atf_check -s eq:0 -o empty -e empty \
79 cp $(atf_get_srcdir)/ssh_host_key.pub .
80 atf_check -s eq:0 -o empty -e empty chmod 400 ssh_host_key
81 atf_check -s eq:0 -o empty -e empty chmod 444 ssh_host_key.pub
83 /usr/sbin/sshd -e -f ./sshd_config >sshd.log 2>&1 &
84 while [ ! -f sshd.pid ]; do
85 sleep 0.01
86 done
87 echo "SSH server started (pid $(cat sshd.pid))"
89 echo "Setting up SSH client configuration"
90 atf_check -s eq:0 -o empty -e empty \
91 ssh-keygen -f ssh_user_key -t rsa -b 1024 -N "" -q
92 atf_check -s eq:0 -o empty -e empty \
93 cp ssh_user_key.pub authorized_keys
94 echo "[localhost]:10000,[127.0.0.1]:10000,[::1]:10000" \
95 "$(cat $(atf_get_srcdir)/ssh_host_key.pub)" >known_hosts || \
96 atf_fail "Failed to create known_hosts"
97 atf_check -s eq:0 -o empty -e empty chmod 600 authorized_keys
98 sed -e "s,@SRCDIR@,$(atf_get_srcdir),g" -e "s,@WORKDIR@,$(pwd),g" \
99 $(atf_get_srcdir)/ssh_config.in >ssh_config || \
100 atf_fail "Failed to create ssh_config"
104 # Stops the SSH server spawned by start_ssh and prints diagnosis data.
106 stop_ssh() {
107 if [ -f sshd.pid ]; then
108 echo "Stopping SSH server (pid $(cat sshd.pid))"
109 kill $(cat sshd.pid)
111 if [ -f sshd.log ]; then
112 echo "Server output was:"
113 sed -e 's,^, ,' sshd.log
118 # Mounts the given source directory on the target directory using psshfs.
119 # Both directories are supposed to live on the current directory.
121 mount_psshfs() {
122 atf_check -s eq:0 -o empty -e empty \
123 mount -t psshfs -o -F=$(pwd)/ssh_config localhost:$(pwd)/${1} ${2}
126 # -------------------------------------------------------------------------
127 # The test cases.
128 # -------------------------------------------------------------------------
130 atf_test_case inode_nos cleanup
131 inode_nos_head() {
132 atf_set "descr" "Checks that different files get different inode" \
133 "numbers"
135 inode_nos_body() {
136 require_puffs
138 start_ssh
140 mkdir root
141 mkdir root/dir
142 touch root/dir/file1
143 touch root/dir/file2
144 touch root/file3
145 touch root/file4
147 cat >ne_inodes.sh <<EOF
148 #! /bin/sh
150 # Compares the inodes of the two given files and returns true if they are
151 # different; false otherwise.
153 set -e
154 ino1=\$(stat -f %i \${1})
155 ino2=\$(stat -f %i \${2})
156 test \${ino1} -ne \${ino2}
158 chmod +x ne_inodes.sh
160 mkdir mnt
161 mount_psshfs root mnt
162 atf_check -s eq:0 -o empty -e empty \
163 ./ne_inodes.sh root/dir root/dir/file1
164 atf_check -s eq:0 -o empty -e empty \
165 ./ne_inodes.sh root/dir root/dir/file2
166 atf_check -s eq:0 -o empty -e empty \
167 ./ne_inodes.sh root/dir/file1 root/dir/file2
168 atf_check -s eq:0 -o empty -e empty \
169 ./ne_inodes.sh root/file3 root/file4
171 inode_nos_cleanup() {
172 umount mnt
173 stop_ssh
176 atf_test_case pwd cleanup
177 pwd_head() {
178 atf_set "descr" "Checks that pwd works correctly"
180 pwd_body() {
181 require_puffs
183 start_ssh
185 mkdir root
186 mkdir root/dir
188 mkdir mnt
189 atf_check -s eq:0 -o save:stdout -e empty \
190 -x 'echo $(cd mnt && /bin/pwd)/dir'
191 mv stdout expout
192 mount_psshfs root mnt
193 atf_check -s eq:0 -o file:expout -e empty \
194 -x 'cd mnt/dir && ls .. >/dev/null && /bin/pwd'
196 pwd_cleanup() {
197 umount mnt
198 stop_ssh
201 atf_test_case ls cleanup
202 ls_head() {
203 atf_set "descr" "Uses ls, attempts to exercise puffs_cc"
205 ls_body() {
206 require_puffs
208 start_ssh
210 mkdir mnt
211 mkdir root
212 mkdir root/dir
213 touch root/dir/file1
214 touch root/dir/file2
215 touch root/file3
216 touch root/file4
218 mount_psshfs root mnt
220 ls -l mnt &
222 IFS=' '
223 lsout='dir
224 file3
225 file4
227 mnt/dir:
228 file1
229 file2
231 atf_check -s exit:0 -o inline:"$lsout" ls -R mnt
233 ls_cleanup() {
234 umount mnt
235 stop_ssh
238 atf_test_case setattr_cache cleanup
239 setattr_cache_head() {
240 atf_set "descr" "Checks that setattr caches"
241 # Don't wait for the eternity that atf usually waits. Twenty
242 # seconds should be good enough, except maybe on a VAX...
243 atf_set "timeout" 20
245 setattr_cache_body() {
246 require_puffs
247 start_ssh
248 atf_check -s exit:0 mkdir root
249 atf_check -s exit:0 mkdir mnt
250 mount_psshfs root mnt
251 atf_check -s exit:0 -x ': > mnt/loser'
252 atf_check -s exit:0 -o save:stat stat mnt/loser
253 # Oops -- this doesn't work. We need to stop the child of the
254 # sshd that is handling the sftp session.
255 atf_check -s exit:0 kill -STOP $(cat sshd.pid)
256 atf_check -s exit:0 -x ': > mnt/loser'
257 atf_check -s exit:0 -o file:stat stat mnt/loser
259 setattr_cache_cleanup() {
260 umount mnt
261 kill -CONT $(cat sshd.pid)
262 stop_ssh
265 # -------------------------------------------------------------------------
266 # Initialization.
267 # -------------------------------------------------------------------------
269 atf_init_test_cases() {
270 atf_add_test_case inode_nos
271 atf_add_test_case pwd
272 atf_add_test_case ls
273 #atf_add_test_case setattr_cache