xref: /netbsd-src/tests/fs/psshfs/t_psshfs.sh (revision daf6c4152fcddc27c445489775ed1f66ab4ea9a9)
1# $NetBSD: t_psshfs.sh,v 1.4 2011/02/11 13:19:46 pooka Exp $
2#
3# Copyright (c) 2007, 2008 The NetBSD Foundation, Inc.
4# All rights reserved.
5#
6# Redistribution and use in source and binary forms, with or without
7# modification, are permitted provided that the following conditions
8# are met:
9# 1. Redistributions of source code must retain the above copyright
10#    notice, this list of conditions and the following disclaimer.
11# 2. Redistributions in binary form must reproduce the above copyright
12#    notice, this list of conditions and the following disclaimer in the
13#    documentation and/or other materials provided with the distribution.
14#
15# THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
16# ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
17# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
18# PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
19# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
20# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
21# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
22# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
23# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
24# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
25# POSSIBILITY OF SUCH DAMAGE.
26#
27
28# -------------------------------------------------------------------------
29# Auxiliary functions.
30# -------------------------------------------------------------------------
31
32#
33# Skips the calling test case if puffs is not supported in the kernel
34# or if the calling user does not have the necessary permissions to mount
35# file systems.
36#
37require_puffs() {
38	case "$($(atf_get_srcdir)/h_have_puffs)" in
39		eacces)
40			atf_skip "Cannot open /dev/puffs for read/write access"
41			;;
42		enxio)
43			atf_skip "puffs support not built into the kernel"
44			;;
45		failed)
46			atf_skip "Unknown error trying to access /dev/puffs"
47			;;
48		yes)
49			;;
50		*)
51			atf_fail "Unknown value returned by h_have_puffs"
52			;;
53	esac
54
55	if [ $(id -u) -ne 0 -a $(sysctl -n vfs.generic.usermount) -eq 0 ]
56	then
57		atf_skip "Regular users cannot mount file systems" \
58		    "(vfs.generic.usermount is set to 0)"
59	fi
60}
61
62#
63# Starts a SSH server and sets up the client to access it.
64# Authentication is allowed and done using an RSA key exclusively, which
65# is generated on the fly as part of the test case.
66# XXX: Ideally, all the tests in this test program should be able to share
67# the generated key, because creating it can be a very slow process on some
68# machines.
69#
70start_ssh() {
71	echo "Setting up SSH server configuration"
72	sed -e "s,@SRCDIR@,$(atf_get_srcdir),g" -e "s,@WORKDIR@,$(pwd),g" \
73	    $(atf_get_srcdir)/sshd_config.in >sshd_config || \
74	    atf_fail "Failed to create sshd_config"
75	atf_check -s eq:0 -o empty -e empty cp /usr/libexec/sftp-server .
76	atf_check -s eq:0 -o empty -e empty \
77	    cp $(atf_get_srcdir)/ssh_host_key .
78	atf_check -s eq:0 -o empty -e empty \
79	    cp $(atf_get_srcdir)/ssh_host_key.pub .
80	atf_check -s eq:0 -o empty -e empty chmod 400 ssh_host_key
81	atf_check -s eq:0 -o empty -e empty chmod 444 ssh_host_key.pub
82
83	/usr/sbin/sshd -e -f ./sshd_config >sshd.log 2>&1 &
84	while [ ! -f sshd.pid ]; do
85		sleep 0.01
86	done
87	echo "SSH server started (pid $(cat sshd.pid))"
88
89	echo "Setting up SSH client configuration"
90	atf_check -s eq:0 -o empty -e empty \
91	    ssh-keygen -f ssh_user_key -t rsa -b 1024 -N "" -q
92	atf_check -s eq:0 -o empty -e empty \
93	    cp ssh_user_key.pub authorized_keys
94	echo "[localhost]:10000,[127.0.0.1]:10000,[::1]:10000" \
95	    "$(cat $(atf_get_srcdir)/ssh_host_key.pub)" >known_hosts || \
96	    atf_fail "Failed to create known_hosts"
97	atf_check -s eq:0 -o empty -e empty chmod 600 authorized_keys
98	sed -e "s,@SRCDIR@,$(atf_get_srcdir),g" -e "s,@WORKDIR@,$(pwd),g" \
99	    $(atf_get_srcdir)/ssh_config.in >ssh_config || \
100	    atf_fail "Failed to create ssh_config"
101}
102
103#
104# Stops the SSH server spawned by start_ssh and prints diagnosis data.
105#
106stop_ssh() {
107	if [ -f sshd.pid ]; then
108		echo "Stopping SSH server (pid $(cat sshd.pid))"
109		kill $(cat sshd.pid)
110	fi
111	if [ -f sshd.log ]; then
112		echo "Server output was:"
113		sed -e 's,^,    ,' sshd.log
114	fi
115}
116
117#
118# Mounts the given source directory on the target directory using psshfs.
119# Both directories are supposed to live on the current directory.
120#
121mount_psshfs() {
122	atf_check -s eq:0 -o empty -e empty \
123	    mount -t psshfs -o -F=$(pwd)/ssh_config localhost:$(pwd)/${1} ${2}
124}
125
126# -------------------------------------------------------------------------
127# The test cases.
128# -------------------------------------------------------------------------
129
130atf_test_case inode_nos cleanup
131inode_nos_head() {
132	atf_set "descr" "Checks that different files get different inode" \
133	    "numbers"
134}
135inode_nos_body() {
136	require_puffs
137
138	start_ssh
139
140	mkdir root
141	mkdir root/dir
142	touch root/dir/file1
143	touch root/dir/file2
144	touch root/file3
145	touch root/file4
146
147	cat >ne_inodes.sh <<EOF
148#! $(atf-config -t atf_shell)
149#
150# Compares the inodes of the two given files and returns true if they are
151# different; false otherwise.
152#
153test \$(stat -f %i \${1}) -ne \$(stat -f %i \${2})
154EOF
155	chmod +x ne_inodes.sh
156
157	mkdir mnt
158	mount_psshfs root mnt
159	atf_check -s eq:0 -o empty -e empty \
160	    ./ne_inodes.sh root/dir root/dir/file1
161	atf_check -s eq:0 -o empty -e empty \
162	    ./ne_inodes.sh root/dir root/dir/file2
163	atf_check -s eq:0 -o empty -e empty \
164	    ./ne_inodes.sh root/dir/file1 root/dir/file2
165	atf_check -s eq:0 -o empty -e empty \
166	    ./ne_inodes.sh root/file3 root/file4
167}
168inode_nos_cleanup() {
169	umount mnt
170	stop_ssh
171}
172
173atf_test_case pwd cleanup
174pwd_head() {
175	atf_set "descr" "Checks that pwd works correctly"
176}
177pwd_body() {
178	require_puffs
179
180	start_ssh
181
182	mkdir root
183	mkdir root/dir
184
185	mkdir mnt
186	atf_check -s eq:0 -o save:stdout -e empty \
187	    -x 'echo $(cd mnt && /bin/pwd)/dir'
188	mv stdout expout
189	mount_psshfs root mnt
190	atf_check -s eq:0 -o file:expout -e empty \
191	    -x 'cd mnt/dir && ls .. >/dev/null && /bin/pwd'
192}
193pwd_cleanup() {
194	umount mnt
195	stop_ssh
196}
197
198atf_test_case ls cleanup
199ls_head() {
200	atf_set "descr" "Uses ls, attempts to exercise puffs_cc"
201}
202ls_body() {
203	require_puffs
204
205	start_ssh
206
207	mkdir mnt
208	mkdir root
209	mkdir root/dir
210	touch root/dir/file1
211	touch root/dir/file2
212	touch root/file3
213	touch root/file4
214
215	mount_psshfs root mnt
216
217	ls -l mnt &
218
219	IFS=' '
220lsout='dir
221file3
222file4
223
224mnt/dir:
225file1
226file2
227'
228	atf_check -s exit:0 -o inline:"$lsout" ls -R mnt
229}
230ls_cleanup() {
231	umount mnt
232	stop_ssh
233}
234
235# -------------------------------------------------------------------------
236# Initialization.
237# -------------------------------------------------------------------------
238
239atf_init_test_cases() {
240	atf_add_test_case inode_nos
241	atf_add_test_case pwd
242	atf_add_test_case ls
243}
244