- (tim) [regress/login-timeout.sh regress/reconfigure.sh regress/reexec.sh
regress/test-exec.sh] Under certain conditions when testing with sudo tests would fail because the pidfile could not be read by a regular user. "cat: cannot open ...../regress/pidfile: Permission denied (error 13)" Make sure cat is run by $SUDO. no objection from me. djm@
This commit is contained in:
parent
02c47341a2
commit
722b8d14f1
|
@ -1,3 +1,10 @@
|
||||||
|
20100812
|
||||||
|
- (tim) [regress/login-timeout.sh regress/reconfigure.sh regress/reexec.sh
|
||||||
|
regress/test-exec.sh] Under certain conditions when testing with sudo
|
||||||
|
tests would fail because the pidfile could not be read by a regular user.
|
||||||
|
"cat: cannot open ...../regress/pidfile: Permission denied (error 13)"
|
||||||
|
Make sure cat is run by $SUDO. no objection from me. djm@
|
||||||
|
|
||||||
20100809
|
20100809
|
||||||
- (djm) bz#1561: don't bother setting IFF_UP on tun(4) device if it is
|
- (djm) bz#1561: don't bother setting IFF_UP on tun(4) device if it is
|
||||||
already set. Makes FreeBSD user openable tunnels useful; patch from
|
already set. Makes FreeBSD user openable tunnels useful; patch from
|
||||||
|
|
|
@ -15,7 +15,7 @@ if [ $? -ne 0 ]; then
|
||||||
fail "ssh connect after login grace timeout failed with privsep"
|
fail "ssh connect after login grace timeout failed with privsep"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
$SUDO kill `cat $PIDFILE`
|
$SUDO kill `$SUDO cat $PIDFILE`
|
||||||
|
|
||||||
trace "test login grace without privsep"
|
trace "test login grace without privsep"
|
||||||
echo "UsePrivilegeSeparation no" >> $OBJ/sshd_config
|
echo "UsePrivilegeSeparation no" >> $OBJ/sshd_config
|
||||||
|
|
|
@ -15,7 +15,7 @@ esac
|
||||||
|
|
||||||
start_sshd
|
start_sshd
|
||||||
|
|
||||||
PID=`cat $PIDFILE`
|
PID=`$SUDO cat $PIDFILE`
|
||||||
rm -f $PIDFILE
|
rm -f $PIDFILE
|
||||||
$SUDO kill -HUP $PID
|
$SUDO kill -HUP $PID
|
||||||
|
|
||||||
|
|
|
@ -41,7 +41,7 @@ echo "InvalidXXX=no" >> $OBJ/sshd_config
|
||||||
|
|
||||||
copy_tests
|
copy_tests
|
||||||
|
|
||||||
$SUDO kill `cat $PIDFILE`
|
$SUDO kill `$SUDO cat $PIDFILE`
|
||||||
rm -f $PIDFILE
|
rm -f $PIDFILE
|
||||||
|
|
||||||
cp $OBJ/sshd_config.orig $OBJ/sshd_config
|
cp $OBJ/sshd_config.orig $OBJ/sshd_config
|
||||||
|
@ -53,7 +53,7 @@ rm -f $SSHD_COPY
|
||||||
|
|
||||||
copy_tests
|
copy_tests
|
||||||
|
|
||||||
$SUDO kill `cat $PIDFILE`
|
$SUDO kill `$SUDO cat $PIDFILE`
|
||||||
rm -f $PIDFILE
|
rm -f $PIDFILE
|
||||||
|
|
||||||
verbose "test reexec fallback without privsep"
|
verbose "test reexec fallback without privsep"
|
||||||
|
@ -66,7 +66,7 @@ rm -f $SSHD_COPY
|
||||||
|
|
||||||
copy_tests
|
copy_tests
|
||||||
|
|
||||||
$SUDO kill `cat $PIDFILE`
|
$SUDO kill `$SUDO cat $PIDFILE`
|
||||||
rm -f $PIDFILE
|
rm -f $PIDFILE
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -167,7 +167,7 @@ have_prog()
|
||||||
cleanup ()
|
cleanup ()
|
||||||
{
|
{
|
||||||
if [ -f $PIDFILE ]; then
|
if [ -f $PIDFILE ]; then
|
||||||
pid=`cat $PIDFILE`
|
pid=`$SUDO cat $PIDFILE`
|
||||||
if [ "X$pid" = "X" ]; then
|
if [ "X$pid" = "X" ]; then
|
||||||
echo no sshd running
|
echo no sshd running
|
||||||
else
|
else
|
||||||
|
|
Loading…
Reference in New Issue