summaryrefslogtreecommitdiff
path: root/regress/principals-command.sh
Commit message (Collapse)AuthorAgeFilesLines
* upstream: Fix up whitespace left by previousdtucker@openbsd.org2021-10-011-103/+103
| | | | | | change removing privsep. No other changes. OpenBSD-Regress-ID: 87adec225d8afaee4d6a91b2b71203f52bf14b15
* upstream: Remove references to privsep.dtucker@openbsd.org2021-10-011-110/+106
| | | | | | | | This removes several do..while loops but does not change the indentation of the now-shallower loops, which will be done in a separate whitespace-only commit to keep changes of style and substance separate. OpenBSD-Regress-ID: 4bed1a0249df7b4a87c965066ce689e79472a8f7
* upstream: Use "skip" instead of "fatal"dtucker@openbsd.org2021-10-011-4/+2
| | | | | | | | if SUDO isn't set for the *-command tests. This means running "make tests" without SUDO set will perform all of the tests that it can instead of failing on the ones it cannot run. OpenBSD-Regress-ID: bd4dbbb02f34b2e8c890558ad4a696248def763a
* upstream: test security key host keys in addition to user keysdjm@openbsd.org2019-12-211-2/+2
| | | | OpenBSD-Regress-ID: 9fb45326106669a27e4bf150575c321806e275b1
* upstream: it's no longer possible to disable privilege separationdjm@openbsd.org2019-12-161-2/+2
| | | | | | in sshd, so don't double the tests' work by trying both off/on OpenBSD-Regress-ID: d366665466dbd09e9b707305da884be3e7619c68
* upstream: test FIDO2/U2F key types; ok markus@djm@openbsd.org2019-11-271-1/+1
| | | | OpenBSD-Regress-ID: 367e06d5a260407619b4b113ea0bd7004a435474
* upstream: skip security-key key types for tests until we have adjm@openbsd.org2019-11-011-2/+2
| | | | | | dummy U2F middleware to use. OpenBSD-Regress-ID: 37200462b44334a4ad45e6a1f7ad1bd717521a95
* upstream: Check for RSA support before using it for the user key,dtucker@openbsd.org2019-09-061-3/+8
| | | | | | otherwise use ed25519 which is supported when built without OpenSSL. OpenBSD-Regress-ID: 3d23ddfe83c5062f00ac845d463f19a2ec78c0f7
* upstream: Append pid to temp files in /var/run and set a cleanupdtucker@openbsd.org2018-11-221-2/+3
| | | | | | | trap for them. This allows multiple instances of tests to run without colliding. OpenBSD-Regress-ID: 57add105ecdfc54752d8003acdd99eb68c3e0b4c
* upstream: UsePrivilegeSeparation no is deprecateddtucker@openbsd.org2018-11-221-2/+2
| | | | | | test "yes" and "sandbox". OpenBSD-Regress-ID: 80e685ed8990766527dc629b1affc09a75bfe2da
* upstream commitdjm@openbsd.org2017-05-011-9/+9
| | | | | | | eliminate explicit specification of protocol in tests and loops over protocol. We only support SSHv2 now. Upstream-Regress-ID: 0082838a9b8a382b7ee9cbf0c1b9db727784fadd
* unbreak principals-command testDamien Miller2016-10-131-7/+7
| | | | Undo inconsistetly updated variable name.
* upstream commitbluhm@openbsd.org2016-10-011-2/+2
| | | | | | | | Allow to run ssh regression tests as root. If the user is already root, the test should not expect that SUDO is set. If ssh needs another user, use sudo or doas to switch from root if necessary. OK dtucker@ Upstream-Regress-ID: b464e55185ac4303529e3e6927db41683aaeace2
* upstream commitdjm@openbsd.org2016-09-211-11/+27
| | | | | | test all the AuthorizedPrincipalsCommand % expansions Upstream-Regress-ID: 0a79a84dfaa59f958e46b474c3db780b454d30e3
* Disable tests where fs perms are incorrectDamien Miller2016-02-231-0/+7
| | | | | | | | | | | Some tests have strict requirements on the filesystem permissions for certain files and directories. This adds a regress/check-perm tool that copies the relevant logic from sshd to exactly test the paths in question. This lets us skip tests when the local filesystem doesn't conform to our expectations rather than continuing and failing the test run. ok dtucker@
* let principals-command.sh work for noexec /var/runDamien Miller2015-08-101-109/+113
|
* skip, rather than fatal when run without SUDO setDamien Miller2015-05-291-2/+4
|
* upstream commitdjm@openbsd.org2015-05-211-0/+139
regress test for AuthorizedPrincipalsCommand Upstream-Regress-ID: c658fbf1ab6b6011dc83b73402322e396f1e1219