11be35a165
To do so, a few dependencies have been imported: * external/bsd/lutok * external/mit/lua * external/public-domain/sqlite * external/public-domain/xz The Kyua framework is the new generation of ATF (Automated Test Framework), it is composed of: * external/bsd/atf * external/bsd/kyua-atf-compat * external/bsd/kyua-cli * external/bsd/kyua-tester * tests Kyua/ATF being written in C++, it depends on libstdc++ which is provided by GCC. As this is not part of the sources, Kyua is only compiled when the native GCC utils are installed. To install Kyua do the following: * In a cross-build enviromnent, add the following to the build.sh commandline: -V MKBINUTILS=yes -V MKGCCCMDS=yes WARNING: At this point the import is still experimental, and not supported on native builds (a.k.a make build). Change-Id: I26aee23c5bbd2d64adcb7c1beb98fe0d479d7ada
122 lines
3.9 KiB
Bash
122 lines
3.9 KiB
Bash
# $NetBSD: t_create.sh,v 1.8 2011/03/05 07:41:11 pooka Exp $
|
|
#
|
|
# Copyright (c) 2005, 2006, 2007, 2008 The NetBSD Foundation, Inc.
|
|
# All rights reserved.
|
|
#
|
|
# Redistribution and use in source and binary forms, with or without
|
|
# modification, are permitted provided that the following conditions
|
|
# are met:
|
|
# 1. Redistributions of source code must retain the above copyright
|
|
# notice, this list of conditions and the following disclaimer.
|
|
# 2. Redistributions in binary form must reproduce the above copyright
|
|
# notice, this list of conditions and the following disclaimer in the
|
|
# documentation and/or other materials provided with the distribution.
|
|
#
|
|
# THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
|
|
# ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
|
|
# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
|
|
# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
# POSSIBILITY OF SUCH DAMAGE.
|
|
#
|
|
|
|
#
|
|
# Verifies that the create operation works.
|
|
#
|
|
|
|
atf_test_case create
|
|
create_head() {
|
|
atf_set "descr" "Verifies that files can be created"
|
|
atf_set "require.user" "root"
|
|
}
|
|
create_body() {
|
|
test_mount
|
|
|
|
atf_check -s eq:1 -o empty -e empty test -f a
|
|
atf_check -s eq:0 -o empty -e empty touch a
|
|
atf_check -s eq:0 -o empty -e empty test -f a
|
|
|
|
test_unmount
|
|
}
|
|
|
|
atf_test_case attrs
|
|
attrs_head() {
|
|
atf_set "descr" "Verifies that a new file gets the correct" \
|
|
"attributes"
|
|
atf_set "require.config" "unprivileged-user"
|
|
atf_set "require.user" "root"
|
|
}
|
|
attrs_body() {
|
|
user=$(atf_config_get unprivileged-user)
|
|
# Allow the unprivileged user to access the work directory.
|
|
chown ${user} .
|
|
|
|
test_mount
|
|
|
|
umask 022
|
|
atf_check -s eq:1 -o empty -e empty test -f a
|
|
atf_check -s eq:0 -o empty -e empty touch a
|
|
atf_check -s eq:0 -o empty -e empty test -f a
|
|
|
|
eval $(stat -s . | sed -e 's|st_|dst_|g')
|
|
eval $(stat -s a)
|
|
test ${st_flags} -eq 0 || atf_fail "Incorrect flags"
|
|
test ${st_size} -eq 0 || atf_fail "Incorrect size"
|
|
test ${st_uid} -eq $(id -u) || atf_fail "Incorrect uid"
|
|
test ${st_gid} -eq ${dst_gid} || atf_fail "Incorrect gid"
|
|
test ${st_mode} = 0100644 || atf_fail "Incorrect mode"
|
|
|
|
atf_check -s eq:0 -o empty -e empty mkdir b c
|
|
|
|
atf_check -s eq:0 -o empty -e empty chown ${user}:0 b
|
|
eval $(stat -s b)
|
|
[ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner"
|
|
[ ${st_gid} -eq 0 ] || atf_fail "Incorrect group"
|
|
|
|
atf_check -s eq:0 -o empty -e empty chown ${user}:100 c
|
|
eval $(stat -s c)
|
|
[ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner"
|
|
[ ${st_gid} -eq 100 ] || atf_fail "Incorrect group"
|
|
|
|
atf_check -s eq:0 -o empty -e empty su -m ${user} -c 'touch b/a'
|
|
eval $(stat -s b/a)
|
|
[ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner"
|
|
[ ${st_gid} -eq 0 ] || atf_fail "Incorrect group"
|
|
|
|
atf_check -s eq:0 -o empty -e empty su -m ${user} -c 'touch c/a'
|
|
eval $(stat -s c/a)
|
|
[ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner"
|
|
[ ${st_gid} -eq 100 ] || atf_fail "Incorrect group"
|
|
|
|
test_unmount
|
|
}
|
|
|
|
atf_test_case kqueue
|
|
kqueue_head() {
|
|
atf_set "descr" "Verifies that creating a file raises the correct" \
|
|
"kqueue events"
|
|
atf_set "require.user" "root"
|
|
}
|
|
kqueue_body() {
|
|
test_mount
|
|
|
|
atf_check -s eq:0 -o empty -e empty mkdir dir
|
|
echo 'touch dir/a' | kqueue_monitor 1 dir
|
|
kqueue_check dir NOTE_WRITE
|
|
|
|
test_unmount
|
|
}
|
|
|
|
atf_init_test_cases() {
|
|
. $(atf_get_srcdir)/../h_funcs.subr
|
|
. $(atf_get_srcdir)/h_funcs.subr
|
|
|
|
atf_add_test_case create
|
|
atf_add_test_case attrs
|
|
atf_add_test_case kqueue
|
|
}
|