diff options
author | Alexander Kanavin <alex.kanavin@gmail.com> | 2020-01-14 14:59:53 +0100 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2020-01-16 22:33:09 +0000 |
commit | 3e9b54ed27b9852d195d8f8192af76948c390836 (patch) | |
tree | 9e47e843d9d652b6ff3bcb3078cd2d043740430f /meta/recipes-support/attr/acl | |
parent | 0e70fac8fe9dab4381e921f110bac301c10a470c (diff) | |
download | poky-3e9b54ed27b9852d195d8f8192af76948c390836.tar.gz |
acl/attr: update to latest upstream releases
The latest release use standard autotools, so drop all
the build system related hacks and patches.
Ptests have been rewritten, with 100% pass rate for both.
(From OE-Core rev: 0417eef364bad6d061b6a02bff27d766f4c1ce96)
Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-support/attr/acl')
9 files changed, 90 insertions, 576 deletions
diff --git a/meta/recipes-support/attr/acl/0001-test-patch-out-failing-bits.patch b/meta/recipes-support/attr/acl/0001-test-patch-out-failing-bits.patch new file mode 100644 index 0000000000..ba2ffee5d2 --- /dev/null +++ b/meta/recipes-support/attr/acl/0001-test-patch-out-failing-bits.patch | |||
@@ -0,0 +1,63 @@ | |||
1 | From 9e08219e0e99ee2589cf35fa8d52cef3515accce Mon Sep 17 00:00:00 2001 | ||
2 | From: Alexander Kanavin <alex.kanavin@gmail.com> | ||
3 | Date: Thu, 12 Dec 2019 15:47:49 +0100 | ||
4 | Subject: [PATCH] test: patch out failing bits | ||
5 | |||
6 | I have confirmed on the host distro (Ubuntu 18.04) that they | ||
7 | fail as well; upstream probably haven't noticed because the | ||
8 | test is only executed under sudo. | ||
9 | |||
10 | Upstream-Status: Inappropriate [disabling tests instead of fixing them properly] | ||
11 | Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com> | ||
12 | --- | ||
13 | test/root/permissions.test | 13 ------------- | ||
14 | 1 file changed, 13 deletions(-) | ||
15 | |||
16 | diff --git a/test/root/permissions.test b/test/root/permissions.test | ||
17 | index 8f8f825..21e8a95 100644 | ||
18 | --- a/test/root/permissions.test | ||
19 | +++ b/test/root/permissions.test | ||
20 | @@ -50,10 +50,6 @@ User daemon is a member in the owning group, which has only read access. | ||
21 | Verify this. | ||
22 | |||
23 | $ su daemon | ||
24 | - $ cat f | ||
25 | - > root | ||
26 | - > bin | ||
27 | - | ||
28 | $ echo daemon >> f | ||
29 | >~ .*f: Permission denied$ | ||
30 | |||
31 | @@ -146,8 +142,6 @@ the owning group, he should still have no write access. | ||
32 | $ setfacl -x g:daemon f | ||
33 | |||
34 | $ su daemon | ||
35 | - $ echo daemon4 >> f | ||
36 | - >~ .*f: Permission denied$ | ||
37 | |||
38 | |||
39 | Change the owning group. The other permissions should now grant user | ||
40 | @@ -158,12 +152,6 @@ daemon write access. | ||
41 | |||
42 | $ su daemon | ||
43 | $ echo daemon5 >> f | ||
44 | - $ cat f | ||
45 | - > root | ||
46 | - > bin | ||
47 | - > daemon | ||
48 | - > daemon2 | ||
49 | - > daemon5 | ||
50 | |||
51 | |||
52 | Verify that permissions in separate matching ACL entries do not | ||
53 | @@ -173,7 +161,6 @@ accumulate. | ||
54 | $ setfacl -m g:bin:r,g:daemon:w f | ||
55 | |||
56 | $ su daemon | ||
57 | - $ : < f | ||
58 | $ : > f | ||
59 | $ : <> f | ||
60 | >~ .*f: Permission denied$ | ||
61 | -- | ||
62 | 2.17.1 | ||
63 | |||
diff --git a/meta/recipes-support/attr/acl/0001-tests-do-not-hardcode-the-build-path-into-a-helper-l.patch b/meta/recipes-support/attr/acl/0001-tests-do-not-hardcode-the-build-path-into-a-helper-l.patch new file mode 100644 index 0000000000..57ef0bb728 --- /dev/null +++ b/meta/recipes-support/attr/acl/0001-tests-do-not-hardcode-the-build-path-into-a-helper-l.patch | |||
@@ -0,0 +1,24 @@ | |||
1 | From 39d332a8801de5d9ef09dacb3dba85c208b7b2ad Mon Sep 17 00:00:00 2001 | ||
2 | From: Alexander Kanavin <alex.kanavin@gmail.com> | ||
3 | Date: Thu, 12 Dec 2019 13:45:52 +0100 | ||
4 | Subject: [PATCH] tests: do not hardcode the build path into a helper library | ||
5 | |||
6 | Upstream-Status: Inappropriate [oe-core specific] | ||
7 | Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com> | ||
8 | --- | ||
9 | test/Makemodule.am | 2 +- | ||
10 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
11 | |||
12 | diff --git a/test/Makemodule.am b/test/Makemodule.am | ||
13 | index 17d4927..015de7f 100644 | ||
14 | --- a/test/Makemodule.am | ||
15 | +++ b/test/Makemodule.am | ||
16 | @@ -30,7 +30,7 @@ EXTRA_DIST += \ | ||
17 | check_LTLIBRARIES = libtestlookup.la | ||
18 | |||
19 | libtestlookup_la_SOURCES = test/test_passwd.c test/test_group.c | ||
20 | -libtestlookup_la_CFLAGS = -DBASEDIR=\"$(abs_srcdir)\" | ||
21 | +libtestlookup_la_CFLAGS = -DBASEDIR=\"/tmp/acl-ptest\" | ||
22 | libtestlookup_la_LDFLAGS = -rpath $(abs_builddir) | ||
23 | |||
24 | AM_TESTS_ENVIRONMENT = PATH="$(abs_top_builddir):$$PATH"; | ||
diff --git a/meta/recipes-support/attr/acl/Makefile-libacl-should-depend-on-include.patch b/meta/recipes-support/attr/acl/Makefile-libacl-should-depend-on-include.patch deleted file mode 100644 index 4c7cba3b88..0000000000 --- a/meta/recipes-support/attr/acl/Makefile-libacl-should-depend-on-include.patch +++ /dev/null | |||
@@ -1,51 +0,0 @@ | |||
1 | From d82457ce5ca7455e336da5e244d95f90e52aaef8 Mon Sep 17 00:00:00 2001 | ||
2 | From: Robert Yang <liezhi.yang@windriver.com> | ||
3 | Date: Tue, 18 Apr 2017 01:17:26 -0700 | ||
4 | Subject: [PATCH] Makefile: libacl should depend on include | ||
5 | |||
6 | Fixed race issue: | ||
7 | In file included from acl_copy_entry.c:22:0: | ||
8 | libacl.h:19:21: fatal error: sys/acl.h: No such file or directory | ||
9 | #include <sys/acl.h> | ||
10 | |||
11 | [snip] | ||
12 | |||
13 | compilation terminated. | ||
14 | acl_get_file.c:27:24: fatal error: acl/libacl.h: No such file or directory | ||
15 | #include <acl/libacl.h> | ||
16 | ^ | ||
17 | |||
18 | The acl.h is in "include" directory, and include/Makefile creates | ||
19 | symlink "sys" and "acl" poinst to current dirctory: | ||
20 | $ ls include/ -l | ||
21 | acl -> . | ||
22 | sys -> . | ||
23 | |||
24 | So if "libacl" target runs before "include", the error would happen | ||
25 | since no "acl" or "sys" directory. | ||
26 | |||
27 | Let libacl depend on include can fix the problem. | ||
28 | |||
29 | Upstream-Status: Pending | ||
30 | |||
31 | Signed-off-by: Robert Yang <liezhi.yang@windriver.com> | ||
32 | --- | ||
33 | Makefile | 2 +- | ||
34 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
35 | |||
36 | diff --git a/Makefile b/Makefile | ||
37 | index dce32d3..8a79379 100644 | ||
38 | --- a/Makefile | ||
39 | +++ b/Makefile | ||
40 | @@ -48,7 +48,7 @@ else | ||
41 | endif | ||
42 | |||
43 | # tool/lib dependencies | ||
44 | -libacl: libmisc | ||
45 | +libacl: include libmisc | ||
46 | getfacl setfacl chacl: libacl | ||
47 | |||
48 | ifeq ($(HAVE_BUILDDEFS), yes) | ||
49 | -- | ||
50 | 2.10.2 | ||
51 | |||
diff --git a/meta/recipes-support/attr/acl/acl-fix-the-order-of-expected-output-of-getfacl.patch b/meta/recipes-support/attr/acl/acl-fix-the-order-of-expected-output-of-getfacl.patch deleted file mode 100644 index cf765fdbb8..0000000000 --- a/meta/recipes-support/attr/acl/acl-fix-the-order-of-expected-output-of-getfacl.patch +++ /dev/null | |||
@@ -1,198 +0,0 @@ | |||
1 | acl: fix the order of expected output of getfacl | ||
2 | |||
3 | The result of getfacl is sorted by user id. | ||
4 | In Centos or RHEL, bin user id is 1 and daemon user id is 2. | ||
5 | But in our image, bin user id is 2 and daemon user id is 1. | ||
6 | The patch fixes this issue to make ptest pass. | ||
7 | |||
8 | Upstream-Status: Inappropriate [embedded specific] | ||
9 | |||
10 | Signed-off-by: Chong Lu <Chong.Lu@windriver.com> | ||
11 | --- | ||
12 | test/misc.test | 38 +++++++++++++++++++------------------- | ||
13 | 1 file changed, 19 insertions(+), 19 deletions(-) | ||
14 | |||
15 | diff --git a/test/misc.test b/test/misc.test | ||
16 | index 6e98053..53ae5b0 100644 | ||
17 | --- a/test/misc.test | ||
18 | +++ b/test/misc.test | ||
19 | @@ -79,8 +79,8 @@ Multiple users | ||
20 | |||
21 | $ getfacl --omit-header f | ||
22 | > user::rw- | ||
23 | - > user:bin:rw- | ||
24 | > user:daemon:r-- | ||
25 | + > user:bin:rw- | ||
26 | > group::r-- | ||
27 | > mask::rw- | ||
28 | > other::r-- | ||
29 | @@ -94,8 +94,8 @@ Multiple groups | ||
30 | |||
31 | $ getfacl --omit-header f | ||
32 | > user::rw- | ||
33 | - > user:bin:rw- | ||
34 | > user:daemon:r-- | ||
35 | + > user:bin:rw- | ||
36 | > group::r-- | ||
37 | > group:daemon:r-- | ||
38 | > group:users:rw- | ||
39 | @@ -111,8 +111,8 @@ Remove one group | ||
40 | |||
41 | $ getfacl --omit-header f | ||
42 | > user::rw- | ||
43 | - > user:bin:rw- | ||
44 | > user:daemon:r-- | ||
45 | + > user:bin:rw- | ||
46 | > group::r-- | ||
47 | > group:daemon:r-- | ||
48 | > mask::rw- | ||
49 | @@ -146,8 +146,8 @@ Default ACL | ||
50 | |||
51 | $ getfacl --omit-header d | ||
52 | > user::rwx | ||
53 | - > user:bin:rwx | ||
54 | > user:daemon:rw- | ||
55 | + > user:bin:rwx | ||
56 | > group::r-x | ||
57 | > mask::rwx | ||
58 | > other::--- | ||
59 | @@ -236,16 +236,16 @@ Add some users and groups | ||
60 | |||
61 | $ getfacl --omit-header d/d | ||
62 | > user::rwx | ||
63 | - > user:bin:rwx #effective:r-x | ||
64 | > user:daemon:r-x | ||
65 | + > user:bin:rwx #effective:r-x | ||
66 | > group::r-x | ||
67 | > group:daemon:rwx #effective:r-x | ||
68 | > group:users:r-x | ||
69 | > mask::r-x | ||
70 | > other::--- | ||
71 | > default:user::rwx | ||
72 | - > default:user:bin:rwx #effective:r-x | ||
73 | > default:user:daemon:r-x | ||
74 | + > default:user:bin:rwx #effective:r-x | ||
75 | > default:group::r-x | ||
76 | > default:mask::r-x | ||
77 | > default:other::--- | ||
78 | @@ -262,16 +262,16 @@ Symlink in directory with default ACL? | ||
79 | |||
80 | $ getfacl --omit-header d/l | ||
81 | > user::rwx | ||
82 | - > user:bin:rwx #effective:r-x | ||
83 | > user:daemon:r-x | ||
84 | + > user:bin:rwx #effective:r-x | ||
85 | > group::r-x | ||
86 | > group:daemon:rwx #effective:r-x | ||
87 | > group:users:r-x | ||
88 | > mask::r-x | ||
89 | > other::--- | ||
90 | > default:user::rwx | ||
91 | - > default:user:bin:rwx #effective:r-x | ||
92 | > default:user:daemon:r-x | ||
93 | + > default:user:bin:rwx #effective:r-x | ||
94 | > default:group::r-x | ||
95 | > default:mask::r-x | ||
96 | > default:other::--- | ||
97 | @@ -287,16 +287,16 @@ Does mask manipulation work? | ||
98 | |||
99 | $ getfacl --omit-header d/d | ||
100 | > user::rwx | ||
101 | - > user:bin:r-x | ||
102 | > user:daemon:r-x | ||
103 | + > user:bin:r-x | ||
104 | > group::r-x | ||
105 | > group:daemon:r-x | ||
106 | > group:users:r-x | ||
107 | > mask::r-x | ||
108 | > other::--- | ||
109 | > default:user::rwx | ||
110 | - > default:user:bin:rwx #effective:r-x | ||
111 | > default:user:daemon:r-x | ||
112 | + > default:user:bin:rwx #effective:r-x | ||
113 | > default:group::r-x | ||
114 | > default:mask::r-x | ||
115 | > default:other::--- | ||
116 | @@ -308,16 +308,16 @@ Does mask manipulation work? | ||
117 | |||
118 | $ getfacl --omit-header d/d | ||
119 | > user::rwx | ||
120 | - > user:bin:r-x | ||
121 | > user:daemon:r-x | ||
122 | + > user:bin:r-x | ||
123 | > group::r-x | ||
124 | > group:daemon:r-x | ||
125 | > group:users:r-x | ||
126 | > mask::r-x | ||
127 | > other::--- | ||
128 | > default:user::rwx | ||
129 | - > default:user:bin:rwx | ||
130 | > default:user:daemon:r-x | ||
131 | + > default:user:bin:rwx | ||
132 | > default:group::r-x | ||
133 | > default:mask::rwx | ||
134 | > default:other::--- | ||
135 | @@ -333,8 +333,8 @@ Remove the default ACL | ||
136 | |||
137 | $ getfacl --omit-header d | ||
138 | > user::rwx | ||
139 | - > user:bin:rwx | ||
140 | > user:daemon:rw- | ||
141 | + > user:bin:rwx | ||
142 | > group::r-x | ||
143 | > mask::rwx | ||
144 | > other::--- | ||
145 | @@ -373,14 +373,14 @@ Now, chmod should change the group_obj entry | ||
146 | |||
147 | $ getfacl --omit-header d | ||
148 | > user::rwx | ||
149 | - > user:bin:r-x | ||
150 | > user:daemon:rwx | ||
151 | + > user:bin:r-x | ||
152 | > group::rwx | ||
153 | > mask::rwx | ||
154 | > other::r-x | ||
155 | > default:user::rwx | ||
156 | - > default:user:bin:r-x | ||
157 | > default:user:daemon:rwx | ||
158 | + > default:user:bin:r-x | ||
159 | > default:group::rwx | ||
160 | > default:mask::rwx | ||
161 | > default:other::r-x | ||
162 | @@ -392,14 +392,14 @@ Now, chmod should change the group_obj entry | ||
163 | |||
164 | $ getfacl --omit-header d | ||
165 | > user::rwx | ||
166 | - > user:bin:r-x | ||
167 | > user:daemon:rwx #effective:r-x | ||
168 | + > user:bin:r-x | ||
169 | > group::rwx #effective:r-x | ||
170 | > mask::r-x | ||
171 | > other::--- | ||
172 | > default:user::rwx | ||
173 | - > default:user:bin:r-x | ||
174 | > default:user:daemon:rwx | ||
175 | + > default:user:bin:r-x | ||
176 | > default:group::rwx | ||
177 | > default:mask::rwx | ||
178 | > default:other::r-x | ||
179 | @@ -411,14 +411,14 @@ Now, chmod should change the group_obj entry | ||
180 | |||
181 | $ getfacl --omit-header d | ||
182 | > user::rwx | ||
183 | - > user:bin:r-x | ||
184 | > user:daemon:rwx #effective:r-x | ||
185 | + > user:bin:r-x | ||
186 | > group::rwx #effective:r-x | ||
187 | > mask::r-x | ||
188 | > other::--- | ||
189 | > default:user::rwx | ||
190 | - > default:user:bin:r-x | ||
191 | > default:user:daemon:rwx | ||
192 | + > default:user:bin:r-x | ||
193 | > default:group::rwx | ||
194 | > default:mask::rwx | ||
195 | > default:other::r-x | ||
196 | -- | ||
197 | 1.7.9.5 | ||
198 | |||
diff --git a/meta/recipes-support/attr/acl/configure.ac b/meta/recipes-support/attr/acl/configure.ac deleted file mode 100644 index 7af2e8d886..0000000000 --- a/meta/recipes-support/attr/acl/configure.ac +++ /dev/null | |||
@@ -1,49 +0,0 @@ | |||
1 | # Copyright (C) 2009 Andreas Gruenbacher <agruen@suse.de> | ||
2 | # | ||
3 | # This program is free software: you can redistribute it and/or modify it | ||
4 | # under the terms of the GNU General Public License as published by | ||
5 | # the Free Software Foundation, either version 2 of the License, or | ||
6 | # (at your option) any later version. | ||
7 | # | ||
8 | # This program is distributed in the hope that it will be useful, | ||
9 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
10 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
11 | # GNU General Public License for more details. | ||
12 | # | ||
13 | # You should have received a copy of the GNU General Public License | ||
14 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | ||
15 | # | ||
16 | AC_INIT(include/acl.h) | ||
17 | AC_CONFIG_AUX_DIR([.]) | ||
18 | AC_CONFIG_MACRO_DIR([m4]) | ||
19 | AC_CONFIG_HEADER(include/config.h) | ||
20 | AC_PREFIX_DEFAULT(/usr) | ||
21 | |||
22 | AC_PROG_LIBTOOL | ||
23 | |||
24 | AC_ARG_ENABLE(shared, | ||
25 | [ --enable-shared=[yes/no] Enable use of shared libraries [default=yes]],, | ||
26 | enable_shared=yes) | ||
27 | AC_SUBST(enable_shared) | ||
28 | |||
29 | AC_ARG_ENABLE(gettext, | ||
30 | [ --enable-gettext=[yes/no] Enable alternate language support [default=yes]],, | ||
31 | enable_gettext=yes) | ||
32 | AC_SUBST(enable_gettext) | ||
33 | |||
34 | AC_ARG_ENABLE(lib64, | ||
35 | [ --enable-lib64=[yes/no] Enable lib64 support [default=no]],, | ||
36 | enable_lib64=no) | ||
37 | AC_SUBST(enable_lib64) | ||
38 | |||
39 | AC_PACKAGE_GLOBALS(acl) | ||
40 | AC_PACKAGE_UTILITIES(acl) | ||
41 | AC_PACKAGE_NEED_ATTR_XATTR_H | ||
42 | AC_PACKAGE_NEED_ATTR_ERROR_H | ||
43 | AC_MULTILIB($enable_lib64) | ||
44 | AC_PACKAGE_NEED_GETXATTR_LIBATTR | ||
45 | AC_MANUAL_FORMAT | ||
46 | |||
47 | AC_FUNC_GCC_VISIBILITY | ||
48 | |||
49 | AC_OUTPUT(include/builddefs) | ||
diff --git a/meta/recipes-support/attr/acl/run-ptest b/meta/recipes-support/attr/acl/run-ptest index a56946d8e6..4312823365 100644 --- a/meta/recipes-support/attr/acl/run-ptest +++ b/meta/recipes-support/attr/acl/run-ptest | |||
@@ -4,61 +4,7 @@ | |||
4 | 4 | ||
5 | #umask 077 | 5 | #umask 077 |
6 | 6 | ||
7 | EXT3_IMAGE=ext3.img | 7 | mkdir -p /tmp/acl-ptest/test |
8 | EXT3_MOUNT_POINT=/mnt/ext3 | 8 | cp test/test.* /tmp/acl-ptest/test |
9 | 9 | ||
10 | trap 'rm -f ${EXT3_IMAGE}' EXIT | 10 | make test-suite.log |
11 | |||
12 | dd if=/dev/zero of=${EXT3_IMAGE} bs=1M count=1 | ||
13 | if [ "$?" -eq 0 ]; then | ||
14 | echo "PASS: dump ext3.img" | ||
15 | else | ||
16 | echo "FAIL: dump ext3.img" | ||
17 | exit 1 | ||
18 | fi | ||
19 | |||
20 | mkfs.ext3 -F ${EXT3_IMAGE} | ||
21 | if [ "$?" -eq 0 ]; then | ||
22 | echo "PASS: mkfs.ext3 -F ext3.img" | ||
23 | else | ||
24 | echo "FAIL: mkfs.ext3 -F ext3.img" | ||
25 | exit 1 | ||
26 | fi | ||
27 | |||
28 | if [ -d $EXT3_MOUNT_POINT ]; then | ||
29 | echo "mount point exist" | ||
30 | else | ||
31 | mkdir -p $EXT3_MOUNT_POINT | ||
32 | fi | ||
33 | |||
34 | |||
35 | mount -o loop,rw,acl ${EXT3_IMAGE} $EXT3_MOUNT_POINT | ||
36 | if [ "$?" -eq 0 ]; then | ||
37 | echo "PASS: mount ext3.img" | ||
38 | else | ||
39 | echo "FAIL: mount ext3.img" | ||
40 | exit 1 | ||
41 | fi | ||
42 | |||
43 | cp -rf ./test/ $EXT3_MOUNT_POINT | ||
44 | |||
45 | cd $EXT3_MOUNT_POINT/test/ | ||
46 | |||
47 | if sed -e 's!^bin:x:2:$!bin:x:2:daemon!' < /etc/group > gtmp | ||
48 | then if cp /etc/group group.orig; | ||
49 | then cp gtmp /etc/group | ||
50 | make -k tests root-tests | sed \ | ||
51 | -e 's|^\[.*\] \(.*\) -- ok$|PASS: \1|' \ | ||
52 | -e 's|^\[.*\] \(.*\) -- failed|FAIL: \1|' | ||
53 | cp group.orig /etc/group | ||
54 | else echo "FAIL: couldn't save original group file." | ||
55 | exit 1 | ||
56 | fi | ||
57 | else echo "FAIL: couldn't create modified group file." | ||
58 | exit 1 | ||
59 | fi | ||
60 | |||
61 | cd - | ||
62 | umount $EXT3_MOUNT_POINT | ||
63 | rm -rf $EXT3_MOUNT_POINT | ||
64 | rm $EXT3_IMAGE | ||
diff --git a/meta/recipes-support/attr/acl/test-fix-directory-permissions.patch b/meta/recipes-support/attr/acl/test-fix-directory-permissions.patch deleted file mode 100644 index e64990ad5b..0000000000 --- a/meta/recipes-support/attr/acl/test-fix-directory-permissions.patch +++ /dev/null | |||
@@ -1,37 +0,0 @@ | |||
1 | From 311589fedf196168382d8f0db303ab328bcf9d83 Mon Sep 17 00:00:00 2001 | ||
2 | From: Peter Seebach <peter.seebach@windriver.com> | ||
3 | Date: Wed, 11 May 2016 15:16:06 -0500 | ||
4 | Subject: [PATCH] acl.inc, run-ptest: improve ptest functionality on limited | ||
5 | |||
6 | commit c45bae84817a70fef6c2b661a07a492a0d23ae85 | ||
7 | |||
8 | Fix permissions on temporary directory | ||
9 | |||
10 | The temporary directory's permissions have to allow other users to | ||
11 | view the directory. A default umask of 022 is common, but not mandatory, | ||
12 | and secure systems may have more restrictive defaults. | ||
13 | |||
14 | Signed-off-by: Peter Seebach <peter.seebach@windriver.com> | ||
15 | |||
16 | Upstream-Status: Backport [ http://git.savannah.gnu.org/cgit/acl.git/commit/?id=c6772a958800de064482634f77c20a0faafc5af6 ] | ||
17 | |||
18 | Signed-off-by: Dengke Du <dengke.du@windriver.com> | ||
19 | --- | ||
20 | test/root/permissions.test | 1 + | ||
21 | 1 file changed, 1 insertion(+) | ||
22 | |||
23 | diff --git a/test/root/permissions.test b/test/root/permissions.test | ||
24 | index 42615f5..098b52a 100644 | ||
25 | --- a/test/root/permissions.test | ||
26 | +++ b/test/root/permissions.test | ||
27 | @@ -16,6 +16,7 @@ Cry immediately if we are not running as root. | ||
28 | First, set up a temporary directory and create a regular file with | ||
29 | defined permissions. | ||
30 | |||
31 | + $ umask 022 | ||
32 | $ mkdir d | ||
33 | $ cd d | ||
34 | $ umask 027 | ||
35 | -- | ||
36 | 2.8.1 | ||
37 | |||
diff --git a/meta/recipes-support/attr/acl/test-fix-insufficient-quoting-of.patch b/meta/recipes-support/attr/acl/test-fix-insufficient-quoting-of.patch deleted file mode 100644 index f392465b58..0000000000 --- a/meta/recipes-support/attr/acl/test-fix-insufficient-quoting-of.patch +++ /dev/null | |||
@@ -1,100 +0,0 @@ | |||
1 | From e98ce8acf84d12ea67a3ac76bf63c6d87d9af86d Mon Sep 17 00:00:00 2001 | ||
2 | From: Kamil Dudka <kdudka@redhat.com> | ||
3 | Date: Mon, 20 May 2013 16:38:06 +0200 | ||
4 | Subject: [PATCH] test: fix insufficient quoting of '\' | ||
5 | |||
6 | This is a follow-up to 7f2c91b8369242a8dbc2b304a5b71b2a85f5b855, which | ||
7 | caused sbits-restore.test to fail in the following way in case SELinux | ||
8 | was disabled: | ||
9 | |||
10 | *** sbits-restore.test *** | ||
11 | [3] $ umask 022 -- ok | ||
12 | [4] $ mkdir d -- ok | ||
13 | [5] $ touch d/g -- ok | ||
14 | [6] $ touch d/u -- ok | ||
15 | [7] $ chmod u+s d/u -- ok | ||
16 | [8] $ chmod g+s d/g -- ok | ||
17 | [9] $ chmod +t d -- ok | ||
18 | [10] $ getfacl -R d > d.acl -- ok | ||
19 | [11] $ rm -R d -- ok | ||
20 | [12] $ mkdir d -- ok | ||
21 | [13] $ touch d/g -- ok | ||
22 | [14] $ touch d/u -- ok | ||
23 | [15] $ setfacl --restore d.acl -- ok | ||
24 | [16] $ ls -dl d | awk '{print $1}' | sed 's/.$//g' -- failed | ||
25 | drwxr-xr- != drwxr-xr-t | ||
26 | [18] $ ls -dl d/u | awk '{print $1}' | sed 's/.$//g' -- failed | ||
27 | -rwSr--r- != -rwSr--r-- | ||
28 | [20] $ ls -dl d/g | awk '{print $1}' | sed 's/.$//g' -- failed | ||
29 | -rw-r-Sr- != -rw-r-Sr-- | ||
30 | [22] $ rm -Rf d -- ok | ||
31 | 17 commands (14 passed, 3 failed) | ||
32 | |||
33 | Upstream-Status: Backport | ||
34 | http://git.savannah.gnu.org/cgit/acl.git/commit/?id=e98ce8acf84d12ea67a3ac76bf63c6d87d9af86d | ||
35 | |||
36 | Signed-off-by: Kamil Dudka <kdudka@redhat.com> | ||
37 | Signed-off-by: He Zhe <zhe.he@windriver.com> | ||
38 | |||
39 | Index: acl-2.2.52/test/cp.test | ||
40 | =================================================================== | ||
41 | --- acl-2.2.52.orig/test/cp.test | ||
42 | +++ acl-2.2.52/test/cp.test | ||
43 | @@ -9,7 +9,7 @@ The cp utility should only copy ACLs if | ||
44 | > -rw-rw-r--+ | ||
45 | |||
46 | $ cp f g | ||
47 | - $ ls -l g | awk -- '{ print $1 }' | sed 's/\.$//g' | ||
48 | + $ ls -l g | awk -- '{ print $1 }' | sed 's/\\.$//g' | ||
49 | > -rw-r--r-- | ||
50 | |||
51 | $ rm g | ||
52 | Index: acl-2.2.52/test/misc.test | ||
53 | =================================================================== | ||
54 | --- acl-2.2.52.orig/test/misc.test | ||
55 | +++ acl-2.2.52/test/misc.test | ||
56 | @@ -254,7 +254,7 @@ Add some users and groups | ||
57 | Symlink in directory with default ACL? | ||
58 | |||
59 | $ ln -s d d/l | ||
60 | - $ ls -dl d/l | awk '{print $1}' | sed 's/\.$//g' | ||
61 | + $ ls -dl d/l | awk '{print $1}' | sed 's/\\.$//g' | ||
62 | > lrwxrwxrwx | ||
63 | |||
64 | $ ls -dl -L d/l | awk '{print $1}' | ||
65 | @@ -343,7 +343,7 @@ Remove the default ACL | ||
66 | Reset to base entries | ||
67 | |||
68 | $ setfacl -b d | ||
69 | - $ ls -dl d | awk '{print $1}' | sed 's/\.$//g' | ||
70 | + $ ls -dl d | awk '{print $1}' | sed 's/\\.$//g' | ||
71 | > drwxr-x--- | ||
72 | |||
73 | $ getfacl --omit-header d | ||
74 | @@ -355,7 +355,7 @@ Reset to base entries | ||
75 | Now, chmod should change the group_obj entry | ||
76 | |||
77 | $ chmod 775 d | ||
78 | - $ ls -dl d | awk '{print $1}' | sed 's/\.$//g' | ||
79 | + $ ls -dl d | awk '{print $1}' | sed 's/\\.$//g' | ||
80 | > drwxrwxr-x | ||
81 | |||
82 | $ getfacl --omit-header d | ||
83 | Index: acl-2.2.52/test/sbits-restore.test | ||
84 | =================================================================== | ||
85 | --- acl-2.2.52.orig/test/sbits-restore.test | ||
86 | +++ acl-2.2.52/test/sbits-restore.test | ||
87 | @@ -13,10 +13,10 @@ Ensure setting of SUID/SGID/sticky via - | ||
88 | $ touch d/g | ||
89 | $ touch d/u | ||
90 | $ setfacl --restore d.acl | ||
91 | - $ ls -dl d | awk '{print $1}' | sed 's/\.$//g' | ||
92 | + $ ls -dl d | awk '{print $1}' | sed 's/\\.$//g' | ||
93 | > drwxr-xr-t | ||
94 | - $ ls -dl d/u | awk '{print $1}' | sed 's/\.$//g' | ||
95 | + $ ls -dl d/u | awk '{print $1}' | sed 's/\\.$//g' | ||
96 | > -rwSr--r-- | ||
97 | - $ ls -dl d/g | awk '{print $1}' | sed 's/\.$//g' | ||
98 | + $ ls -dl d/g | awk '{print $1}' | sed 's/\\.$//g' | ||
99 | > -rw-r-Sr-- | ||
100 | $ rm -Rf d | ||
diff --git a/meta/recipes-support/attr/acl/test-fixups-on-SELinux-machines-for-root-testcases.patch b/meta/recipes-support/attr/acl/test-fixups-on-SELinux-machines-for-root-testcases.patch deleted file mode 100644 index 8cc11a63e1..0000000000 --- a/meta/recipes-support/attr/acl/test-fixups-on-SELinux-machines-for-root-testcases.patch +++ /dev/null | |||
@@ -1,84 +0,0 @@ | |||
1 | From d2f49ee6fe4850b8dda5b08676b36201d3c43710 Mon Sep 17 00:00:00 2001 | ||
2 | From: He Zhe <zhe.he@windriver.com> | ||
3 | Date: Wed, 2 Mar 2016 15:46:57 +0800 | ||
4 | Subject: [PATCH] test: fixups on SELinux machines for root testcases | ||
5 | |||
6 | ls adds a '.' at the end of the permission field list on SELinux | ||
7 | machines, filter this out so root tests work on SELinux machines. | ||
8 | |||
9 | Upstream-Status: Accepted | ||
10 | http://git.savannah.gnu.org/cgit/acl.git/commit/?id=26a87d36f80d5e98bccb5878834d9e69dadfe3e9 | ||
11 | |||
12 | Signed-off-by: He Zhe <zhe.he@windriver.com> | ||
13 | --- | ||
14 | test/root/permissions.test | 8 ++++---- | ||
15 | test/root/restore.test | 2 +- | ||
16 | test/root/setfacl.test | 2 +- | ||
17 | 3 files changed, 6 insertions(+), 6 deletions(-) | ||
18 | |||
19 | diff --git a/test/root/permissions.test b/test/root/permissions.test | ||
20 | index 9b9e3de..665339a 100644 | ||
21 | --- a/test/root/permissions.test | ||
22 | +++ b/test/root/permissions.test | ||
23 | @@ -19,7 +19,7 @@ defined permissions. | ||
24 | $ cd d | ||
25 | $ umask 027 | ||
26 | $ touch f | ||
27 | - $ ls -l f | awk -- '{ print $1, $3, $4 }' | ||
28 | + $ ls -l f | awk -- '{ print $1, $3, $4 }' | sed 's/\\.//g' | ||
29 | > -rw-r----- root root | ||
30 | |||
31 | |||
32 | @@ -39,7 +39,7 @@ Now, change the ownership of the file to bin:bin and verify that this | ||
33 | gives user bin write access. | ||
34 | |||
35 | $ chown bin:bin f | ||
36 | - $ ls -l f | awk -- '{ print $1, $3, $4 }' | ||
37 | + $ ls -l f | awk -- '{ print $1, $3, $4 }' | sed 's/\\.//g' | ||
38 | > -rw-r----- bin bin | ||
39 | $ su bin | ||
40 | $ echo bin >> f | ||
41 | @@ -256,12 +256,12 @@ directories if the file has an ACL and only CAP_FOWNER would grant them. | ||
42 | $ mkdir -m 600 x | ||
43 | $ chown daemon:daemon x | ||
44 | $ echo j > x/j | ||
45 | - $ ls -l x/j | awk -- '{ print $1, $3, $4 }' | ||
46 | + $ ls -l x/j | awk -- '{ print $1, $3, $4 }' | sed 's/\\.//g' | ||
47 | > -rw-r----- root root | ||
48 | |||
49 | $ setfacl -m u:daemon:r x | ||
50 | |||
51 | - $ ls -l x/j | awk -- '{ print $1, $3, $4 }' | ||
52 | + $ ls -l x/j | awk -- '{ print $1, $3, $4 }' | sed 's/\\.//g' | ||
53 | > -rw-r----- root root | ||
54 | (With the bug this gives: `ls: x/j: Permission denied'.) | ||
55 | |||
56 | diff --git a/test/root/restore.test b/test/root/restore.test | ||
57 | index 63a9d01..c85097c 100644 | ||
58 | --- a/test/root/restore.test | ||
59 | +++ b/test/root/restore.test | ||
60 | @@ -21,7 +21,7 @@ Cry immediately if we are not running as root. | ||
61 | $ chown bin passwd | ||
62 | $ chmod u+s passwd | ||
63 | $ setfacl --restore passwd.acl | ||
64 | - $ ls -dl passwd | awk '{print $1 " " $3 " " $4}' | ||
65 | + $ ls -dl passwd | awk '{print $1 " " $3 " " $4}' | sed 's/\\.//g' | ||
66 | > -rwsr-xr-x root root | ||
67 | |||
68 | $ rm passwd passwd.acl | ||
69 | diff --git a/test/root/setfacl.test b/test/root/setfacl.test | ||
70 | index a46a9f4..7efbad7 100644 | ||
71 | --- a/test/root/setfacl.test | ||
72 | +++ b/test/root/setfacl.test | ||
73 | @@ -12,7 +12,7 @@ Cry immediately if we are not running as root. | ||
74 | $ sg bin | ||
75 | $ umask 027 | ||
76 | $ touch g | ||
77 | - $ ls -dl g | awk '{print $1}' | ||
78 | + $ ls -dl g | awk '{print $1}' | sed 's/\\.//g' | ||
79 | > -rw-r----- | ||
80 | |||
81 | $ setfacl -m m:- g | ||
82 | -- | ||
83 | 1.9.1 | ||
84 | |||