openssh-portable/regress
Manoj Ampalam 1137942918
Refactored pester based E2E test setup (#384)
- Set up dedicated test endpoint instead of tweaking main service configuration.
- Got rid of redundant custom test configuration files.
- Cleaned up pester tests directory. Moved test filed to dedicated directory
- Revised TestDaemon start/stop routines to use "netstat" for host process identification. This gets rid of slight flakiness in previous approach.
2019-06-17 22:46:33 -07:00
..
misc upstream: adapt to changes in KEX APIs and file removals 2019-01-21 23:51:29 +11:00
pesterTests Refactored pester based E2E test setup (#384) 2019-06-17 22:46:33 -07:00
unittests Ported v8.0 changes 2019-05-24 23:08:06 -07:00
.gitattributes Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
Makefile upstream: add "extra:" target to run some extra tests that are not 2019-01-21 11:51:54 +11:00
README.regress document some more regress control env variables 2018-08-27 13:08:01 +10:00
addrmatch.sh Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
agent-getpeereid.sh space before tab in previous 2018-02-23 14:19:55 +11:00
agent-pkcs11.sh Adjust softhsm2 path on Fedora Linux for regress 2019-03-29 22:37:15 +11:00
agent-ptrace.sh
agent-timeout.sh Merge branch 'V_8_0' of https://github.com/openssh/openssh-portable 2019-05-22 14:18:23 -07:00
agent.sh Merge branch 'V_8_0' of https://github.com/openssh/openssh-portable 2019-05-22 14:18:23 -07:00
allow-deny-users.sh upstream: make this use ssh_proxy rather than starting/stopping a 2018-07-13 12:14:38 +10:00
authinfo.sh upstream: make this a bit more portable-friendly 2018-04-10 10:17:56 +10:00
banner.sh Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
broken-pipe.sh
brokenkeys.sh
cert-file.sh upstream: more typos spotted by Karsten Weiss using codespell 2018-04-10 10:17:56 +10:00
cert-hostkey.sh Merge branch 'V_8_0' of https://github.com/openssh/openssh-portable 2019-05-22 14:18:23 -07:00
cert-userkey.sh Merge branch 'V_8_0' of https://github.com/openssh/openssh-portable 2019-05-22 14:18:23 -07:00
cfginclude.sh Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
cfgmatch.sh Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
cfgmatchlisten.sh increase timeout to match cfgmatch.sh 2018-07-13 11:41:33 +10:00
cfgparse.sh Merge branch 'V_7_8' of https://github.com/openssh/openssh-portable into cwb 2018-10-04 14:43:51 -07:00
check-perm.c
cipher-speed.sh
conch-ciphers.sh
connect-privsep.sh
connect-uri.sh
connect.sh
dhgex.sh
dsa_ssh2.prv
dsa_ssh2.pub
dynamic-forward.sh Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
envpass.sh Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
exit-status.sh
forcecommand.sh Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
forward-control.sh upstream: test the correct configuration option name 2018-06-08 00:31:38 +10:00
forwarding.sh Merge branch 'V_7_8' of https://github.com/openssh/openssh-portable into cwb 2018-10-04 14:43:51 -07:00
host-expand.sh Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
hostkey-agent.sh Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
hostkey-rotate.sh Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
integrity.sh Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
kextype.sh Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
key-options.sh upstream: add a comment that could have saved me 45 minutes of wild 2018-07-04 23:52:50 +10:00
keygen-change.sh Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
keygen-convert.sh Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
keygen-knownhosts.sh Merge branch 'V_7_8' of https://github.com/openssh/openssh-portable into cwb 2018-10-04 14:43:51 -07:00
keygen-moduli.sh
keys-command.sh upstream: Append pid to temp files in /var/run and set a cleanup 2018-11-22 20:58:27 +11:00
keyscan.sh Merge branch 'V_8_0' of https://github.com/openssh/openssh-portable 2019-05-22 14:18:23 -07:00
keytype.sh upstream: explicitly specify RSA/SHA-2 keytype here too 2018-03-14 18:55:47 +11:00
krl.sh Merge branch 'V_7_9' of https://github.com/openssh/openssh-portable 2018-10-25 11:55:02 -07:00
limit-keytype.sh Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
localcommand.sh Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
login-timeout.sh
mkdtemp.c Missing unistd.h for regress/mkdtemp.c 2018-08-20 15:57:29 +10:00
modpipe.c Remove execute bit from modpipe.c. 2018-02-15 22:33:21 +11:00
moduli.in
multiplex.sh Merge branch 'V_8_0' of https://github.com/openssh/openssh-portable 2019-05-22 14:18:23 -07:00
multipubkey.sh upstream: UsePrivilegeSeparation no is deprecated 2018-11-22 16:24:20 +11:00
netcat.c Set SO_REUSEADDR in regression test netcat. 2018-02-08 12:42:12 +11:00
portnum.sh
principals-command.sh upstream: Append pid to temp files in /var/run and set a cleanup 2018-11-22 20:58:27 +11:00
proto-mismatch.sh
proto-version.sh
proxy-connect.sh
putty-ciphers.sh Provide $OBJ to paths in PuTTY interop tests. 2018-03-23 13:21:14 +11:00
putty-kex.sh Provide $OBJ to paths in PuTTY interop tests. 2018-03-23 13:21:14 +11:00
putty-transfer.sh Provide $OBJ to paths in PuTTY interop tests. 2018-03-23 13:21:14 +11:00
reconfigure.sh Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
reexec.sh Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
rekey.sh Merge branch 'V_7_8' of https://github.com/openssh/openssh-portable into cwb 2018-10-04 14:43:51 -07:00
rsa_openssh.prv
rsa_openssh.pub
rsa_ssh2.prv
scp-ssh-wrapper.sh
scp-uri.sh Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
scp.sh Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
setuid-allowed.c Adapt portable to legacy buffer API removal 2018-07-10 19:39:52 +10:00
sftp-badcmds.sh
sftp-batch.sh
sftp-chroot.sh upstream: Append pid to temp files in /var/run and set a cleanup 2018-11-22 20:58:27 +11:00
sftp-cmds.sh Merge branch 'V_8_0' of https://github.com/openssh/openssh-portable 2019-05-22 14:18:23 -07:00
sftp-glob.sh Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
sftp-perm.sh Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
sftp-uri.sh Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
sftp.sh
ssh-com-client.sh
ssh-com-keygen.sh
ssh-com-sftp.sh
ssh-com.sh
ssh2putty.sh
sshcfgparse.sh Merge branch 'V_7_8' of https://github.com/openssh/openssh-portable into cwb 2018-10-04 14:43:51 -07:00
sshd-log-wrapper.sh
stderr-after-eof.sh
stderr-data.sh
t4.ok
t5.ok
t11.ok
test-exec.sh Merge branch 'V_8_0' of https://github.com/openssh/openssh-portable 2019-05-22 14:18:23 -07:00
transfer.sh
try-ciphers.sh Ported bash based E2E tests and integrated security fix for cve-2018-15473(#346) 2018-10-04 14:16:02 -07:00
valgrind-unit.sh Enable leak checks for unit tests with valgrind 2018-07-13 11:41:33 +10:00
yes-head.sh

README.regress

Overview.

$ ./configure && make tests

You'll see some progress info. A failure will cause either the make to
abort or the driver script to report a "FATAL" failure.

The test consists of 2 parts. The first is the file-based tests which is
driven by the Makefile, and the second is a set of network or proxycommand
based tests, which are driven by a driver script (test-exec.sh) which is
called multiple times by the Makefile.

Failures in the first part will cause the Makefile to return an error.
Failures in the second part will print a "FATAL" message for the failed
test and continue.

OpenBSD has a system-wide regression test suite. OpenSSH Portable's test
suite is based on OpenBSD's with modifications.


Environment variables.

SKIP_UNIT: Skip unit tests.
SUDO: path to sudo/doas command, if desired. Note that some systems
	(notably systems using PAM) require sudo to execute some tests.
LTESTS: Whitespace separated list of tests (filenames without the .sh
	extension) to run.
OBJ: used by test scripts to access build dir.
TEST_SHELL: shell used for running the test scripts.
TEST_SSH_FAIL_FATAL: set to "yes" to make any failure abort the test
	currently in progress.
TEST_SSH_PORT: TCP port to be used for the listening tests.
TEST_SSH_QUIET: set to "yes" to suppress non-fatal output.
TEST_SSH_SSHD_CONFOPTS: Configuration directives to be added to sshd_config
	before running each test.
TEST_SSH_SSH_CONFOPTS: Configuration directives to be added to
	ssh_config before running each test.
TEST_SSH_TRACE: set to "yes" for verbose output from tests 
TEST_SSH_x: path to "ssh" command under test, where x is one of
	SSH, SSHD, SSHAGENT, SSHADD, SSHKEYGEN, SSHKEYSCAN, SFTP or
	SFTPSERVER
USE_VALGRIND: Run the tests under valgrind memory checker.


Individual tests.

You can run an individual test from the top-level Makefile, eg:
$ make tests LTESTS=agent-timeout

If you need to manipulate the environment more you can invoke test-exec.sh
directly if you set up the path to find the binaries under test and the
test scripts themselves, for example:

$ cd regress
$ PATH=`pwd`/..:$PATH:. TEST_SHELL=/bin/sh sh test-exec.sh `pwd` \
    agent-timeout.sh
ok agent timeout test


Files.

test-exec.sh: the main test driver. Sets environment, creates config files
and keys and runs the specified test.

At the time of writing, the individual tests are:
agent-timeout.sh:	agent timeout test
agent.sh:		simple agent test
broken-pipe.sh:		broken pipe test
connect-privsep.sh:	proxy connect with privsep
connect.sh:		simple connect
exit-status.sh:		remote exit status
forwarding.sh:		local and remote forwarding
keygen-change.sh:	change passphrase for key
keyscan.sh:		keyscan
proto-mismatch.sh:	protocol version mismatch
proto-version.sh:	sshd version with different protocol combinations
proxy-connect.sh:	proxy connect
sftp.sh:		basic sftp put/get
ssh-com-client.sh:	connect with ssh.com client
ssh-com-keygen.sh:	ssh.com key import
ssh-com-sftp.sh:	basic sftp put/get with ssh.com server
ssh-com.sh:		connect to ssh.com server
stderr-after-eof.sh:	stderr data after eof
stderr-data.sh:		stderr data transfer
transfer.sh:		transfer data
try-ciphers.sh:		try ciphers
yes-head.sh:		yes pipe head


Problems?

Run the failing test with shell tracing (-x) turned on:
$ PATH=`pwd`/..:$PATH:. sh -x test-exec.sh `pwd` agent-timeout.sh

Failed tests can be difficult to diagnose. Suggestions:
- run the individual test via ./test-exec.sh `pwd` [testname]
- set LogLevel to VERBOSE in test-exec.sh and enable syslogging of
  auth.debug (eg to /var/log/authlog).


Known Issues.

- Similarly, if you do not have "scp" in your system's $PATH then the
  multiplex scp tests will fail (since the system's shell startup scripts
  will determine where the shell started by sshd will look for scp).

- Recent GNU coreutils deprecate "head -[n]": this will cause the yes-head
  test to fail.  The old behaviour can be restored by setting (and
  exporting) _POSIX2_VERSION=199209 before running the tests.