diff options
author | Darren Tucker <dtucker@zip.com.au> | 2005-03-07 18:33:02 +1100 |
---|---|---|
committer | Darren Tucker <dtucker@zip.com.au> | 2005-03-07 18:33:02 +1100 |
commit | a0f3ba71a01428fb468ee7a6bc2fed42436c83f8 (patch) | |
tree | 0301a89585d250084f3481f00d887f057c936f09 /regress/test-exec.sh | |
parent | b712fccc18b218e98bd6ef69c85308cd00a6e543 (diff) |
- dtucker@cvs.openbsd.org 2005/02/27 11:33:30
[multiplex.sh test-exec.sh sshd-log-wrapper.sh]
Add optional capability to log output from regress commands; ok markus@
Use with: make TEST_SSH_LOGFILE=/tmp/regress.log
Diffstat (limited to 'regress/test-exec.sh')
-rw-r--r-- | regress/test-exec.sh | 18 |
1 files changed, 14 insertions, 4 deletions
diff --git a/regress/test-exec.sh b/regress/test-exec.sh index 346b68f16..958c87109 100644 --- a/regress/test-exec.sh +++ b/regress/test-exec.sh | |||
@@ -1,4 +1,4 @@ | |||
1 | # $OpenBSD: test-exec.sh,v 1.26 2005/01/14 04:21:18 david Exp $ | 1 | # $OpenBSD: test-exec.sh,v 1.27 2005/02/27 11:33:30 dtucker Exp $ |
2 | # Placed in the Public Domain. | 2 | # Placed in the Public Domain. |
3 | 3 | ||
4 | #SUDO=sudo | 4 | #SUDO=sudo |
@@ -47,6 +47,8 @@ else | |||
47 | fi | 47 | fi |
48 | unset SSH_AUTH_SOCK | 48 | unset SSH_AUTH_SOCK |
49 | 49 | ||
50 | SRC=`dirname ${SCRIPT}` | ||
51 | |||
50 | # defaults | 52 | # defaults |
51 | SSH=ssh | 53 | SSH=ssh |
52 | SSHD=sshd | 54 | SSHD=sshd |
@@ -91,6 +93,10 @@ if [ ! -x /$SSHD ]; then | |||
91 | SSHD=`which sshd` | 93 | SSHD=`which sshd` |
92 | fi | 94 | fi |
93 | 95 | ||
96 | if [ "x$TEST_SSH_LOGFILE" = "x" ]; then | ||
97 | TEST_SSH_LOGFILE=/dev/null | ||
98 | fi | ||
99 | |||
94 | # these should be used in tests | 100 | # these should be used in tests |
95 | export SSH SSHD SSHAGENT SSHADD SSHKEYGEN SSHKEYSCAN SFTP SFTPSERVER SCP | 101 | export SSH SSHD SSHAGENT SSHADD SSHKEYGEN SSHKEYSCAN SFTP SFTPSERVER SCP |
96 | #echo $SSH $SSHD $SSHAGENT $SSHADD $SSHKEYGEN $SSHKEYSCAN $SFTP $SFTPSERVER $SCP | 102 | #echo $SSH $SSHD $SSHAGENT $SSHADD $SSHKEYGEN $SSHKEYSCAN $SFTP $SFTPSERVER $SCP |
@@ -140,6 +146,7 @@ cleanup () | |||
140 | 146 | ||
141 | trace () | 147 | trace () |
142 | { | 148 | { |
149 | echo "trace: $@" >>$TEST_SSH_LOGFILE | ||
143 | if [ "X$TEST_SSH_TRACE" = "Xyes" ]; then | 150 | if [ "X$TEST_SSH_TRACE" = "Xyes" ]; then |
144 | echo "$@" | 151 | echo "$@" |
145 | fi | 152 | fi |
@@ -147,6 +154,7 @@ trace () | |||
147 | 154 | ||
148 | verbose () | 155 | verbose () |
149 | { | 156 | { |
157 | echo "verbose: $@" >>$TEST_SSH_LOGFILE | ||
150 | if [ "X$TEST_SSH_QUIET" != "Xyes" ]; then | 158 | if [ "X$TEST_SSH_QUIET" != "Xyes" ]; then |
151 | echo "$@" | 159 | echo "$@" |
152 | fi | 160 | fi |
@@ -155,12 +163,14 @@ verbose () | |||
155 | 163 | ||
156 | fail () | 164 | fail () |
157 | { | 165 | { |
166 | echo "FAIL: $@" >>$TEST_SSH_LOGFILE | ||
158 | RESULT=1 | 167 | RESULT=1 |
159 | echo "$@" | 168 | echo "$@" |
160 | } | 169 | } |
161 | 170 | ||
162 | fatal () | 171 | fatal () |
163 | { | 172 | { |
173 | echo "FATAL: $@" >>$TEST_SSH_LOGFILE | ||
164 | echon "FATAL: " | 174 | echon "FATAL: " |
165 | fail "$@" | 175 | fail "$@" |
166 | cleanup | 176 | cleanup |
@@ -180,7 +190,7 @@ cat << EOF > $OBJ/sshd_config | |||
180 | #ListenAddress ::1 | 190 | #ListenAddress ::1 |
181 | PidFile $PIDFILE | 191 | PidFile $PIDFILE |
182 | AuthorizedKeysFile $OBJ/authorized_keys_%u | 192 | AuthorizedKeysFile $OBJ/authorized_keys_%u |
183 | LogLevel QUIET | 193 | LogLevel DEBUG |
184 | AcceptEnv _XXX_TEST_* | 194 | AcceptEnv _XXX_TEST_* |
185 | AcceptEnv _XXX_TEST | 195 | AcceptEnv _XXX_TEST |
186 | Subsystem sftp $SFTPSERVER | 196 | Subsystem sftp $SFTPSERVER |
@@ -251,7 +261,7 @@ chmod 644 $OBJ/authorized_keys_$USER | |||
251 | # create a proxy version of the client config | 261 | # create a proxy version of the client config |
252 | ( | 262 | ( |
253 | cat $OBJ/ssh_config | 263 | cat $OBJ/ssh_config |
254 | echo proxycommand ${SUDO} ${SSHD} -i -f $OBJ/sshd_proxy | 264 | echo proxycommand sh ${SRC}/sshd-log-wrapper.sh ${SUDO} ${SSHD} ${TEST_SSH_LOGFILE} -i -f $OBJ/sshd_proxy |
255 | ) > $OBJ/ssh_proxy | 265 | ) > $OBJ/ssh_proxy |
256 | 266 | ||
257 | # check proxy config | 267 | # check proxy config |
@@ -261,7 +271,7 @@ start_sshd () | |||
261 | { | 271 | { |
262 | # start sshd | 272 | # start sshd |
263 | $SUDO ${SSHD} -f $OBJ/sshd_config -t || fatal "sshd_config broken" | 273 | $SUDO ${SSHD} -f $OBJ/sshd_config -t || fatal "sshd_config broken" |
264 | $SUDO ${SSHD} -f $OBJ/sshd_config | 274 | $SUDO ${SSHD} -f $OBJ/sshd_config -e >>$TEST_SSH_LOGFILE 2>&1 |
265 | 275 | ||
266 | trace "wait for sshd" | 276 | trace "wait for sshd" |
267 | i=0; | 277 | i=0; |