File: 1042

package info (click to toggle)
pcp 7.1.0-1
  • links: PTS
  • area: main
  • in suites: forky, sid
  • size: 252,748 kB
  • sloc: ansic: 1,483,656; sh: 182,366; xml: 160,462; cpp: 83,813; python: 24,980; perl: 18,327; yacc: 6,877; lex: 2,864; makefile: 2,738; awk: 165; fortran: 60; java: 52
file content (53 lines) | stat: -rwxr-xr-x 1,004 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
#!/bin/sh
# PCP QA Test No. 1042
# Check that unauthenticated REST API access to proc.* is not
# possible.
#
# Copyright (c) 2015,2019 Red Hat.
#

seq=`basename $0`
echo "QA output created by $seq"

. ./common.python

_check_series

status=1	# failure is the default!

pyscript=$here/src/test_webprocesses.py
signal=$PCP_BINADM_DIR/pmsignal
username=`id -u -n`
webport=`_find_free_port`
webargs="-f -U $username -p $webport"

_cleanup()
{
    if [ "X$webpid" != "X" ]; then
        $signal -s TERM $webpid
        webpid=""
    fi
    $sudo rm -f $tmp.*
}

trap "_cleanup; exit \$status" 0 1 2 3 15

_filter()
{
    sed \
	-e 's/\#[0-9][0-9]*/#CONTEXT/g' \
	-e "s/:$webport/:WEBPORT/g" \
    # end
}

# real QA test starts here
echo '== enforcing mode (no unauthenticated proc access)'
$PCP_BINADM_DIR/pmproxy $webargs -l $tmp.out &
webpid=$!
echo "enforcing webpid=$webpid" >>$seq_full
_wait_for_pmproxy $webport || _exit 1
$python $pyscript --port $webport | _filter

# success, all done
status=0
exit