diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 16:11:47 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 16:11:47 +0000 |
commit | 758f820bcc0f68aeebac1717e537ca13a320b909 (patch) | |
tree | 48111ece75cf4f98316848b37a7e26356e00669e /init.cfg | |
parent | Initial commit. (diff) | |
download | coreutils-758f820bcc0f68aeebac1717e537ca13a320b909.tar.xz coreutils-758f820bcc0f68aeebac1717e537ca13a320b909.zip |
Adding upstream version 9.1.upstream/9.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'init.cfg')
-rw-r--r-- | init.cfg | 765 |
1 files changed, 765 insertions, 0 deletions
diff --git a/init.cfg b/init.cfg new file mode 100644 index 0000000..eb57de2 --- /dev/null +++ b/init.cfg @@ -0,0 +1,765 @@ +# This file is sourced by init.sh, *before* its initialization. + +# Copyright (C) 2010-2022 Free Software Foundation, Inc. + +# This program is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. + +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. + +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <https://www.gnu.org/licenses/>. + +# This goes hand in hand with the "exec 9>&2;" in tests/Makefile.am's +# TESTS_ENVIRONMENT definition. +stderr_fileno_=9 + +# Having an unsearchable directory in PATH causes execve to fail with EACCES +# when applied to an unresolvable program name, contrary to the desired ENOENT. +# Avoid the problem by rewriting PATH to exclude unsearchable directories. +# Also, if PATH lacks /sbin and/or /usr/sbin, append it/them. +sanitize_path_() +{ + # FIXME: remove double quotes around $IFS when all tests use init.sh. + # They constitute a work-around for a bug in FreeBSD 8.1's /bin/sh. + local saved_IFS="$IFS" + IFS=: + set -- $PATH + IFS=$saved_IFS + + local d d1 + local colon= + local new_path= + for d in "$@"; do + test -z "$d" && d1=. || d1=$d + if ls -d "$d1/." > /dev/null 2>&1; then + new_path="$new_path$colon$d" + colon=':' + fi + done + + for d in /sbin /usr/sbin ; do + case ":$new_path:" in + *:$d:*) ;; + *) new_path="$new_path:$d" ;; + esac + done + + PATH=$new_path + export PATH +} + +getlimits_() +{ + eval $(getlimits) + test "$INT_MAX" || fatal_ "running getlimits" +} + +require_no_default_acl_() +{ + if getfacl --version < /dev/null > /dev/null 2>&1; then + getfacl "$1" | grep '^default:' && skip_ 'Default ACL detected' + else + ls -ld "$1" | grep '.........+' && skip_ 'ACL detected' + fi +} + +require_acl_() +{ + getfacl --version < /dev/null > /dev/null 2>&1 \ + && setfacl --version < /dev/null > /dev/null 2>&1 \ + || skip_ "This test requires getfacl and setfacl." + + id -u bin > /dev/null 2>&1 \ + || skip_ "This test requires a local user named bin." +} + +is_local_dir_() +{ + test $# = 1 || framework_failure_ + df --local "$1" >/dev/null 2>&1 +} + +require_mount_list_() +{ + local mount_list_fail='cannot read table of mounted file systems' + df --local 2>&1 | grep -F "$mount_list_fail" >/dev/null && + skip_ "$mount_list_fail" +} + +dump_mount_list_() +{ + cat /proc/self/mountinfo || + cat /proc/self/mounts || + cat /proc/mounts || + cat /etc/mtab +} + +require_local_dir_() +{ + require_mount_list_ + is_local_dir_ . || + skip_ "This test must be run on a local file system." +} + +require_selinux_() +{ + # When in a chroot of an SELinux-enabled system, but with a mock-simulated + # SELinux-*disabled* system, recognize that SELinux is disabled system wide: + grep 'selinuxfs$' /proc/filesystems > /dev/null \ + || skip_ "this system lacks SELinux support" + + # Independent of whether SELinux is enabled system-wide, + # the current file system may lack SELinux support. + # Also the current build may have SELinux support disabled. + case $(ls -Zd .) in + '? .'|'unlabeled .') + test -z "$CONFIG_HEADER" \ + && framework_failure_ 'CONFIG_HEADER not defined' + grep '^#define HAVE_SELINUX_SELINUX_H 1' "$CONFIG_HEADER" > /dev/null \ + && selinux_missing_="(file) system" || selinux_missing_="build" + skip_ "this $selinux_missing_ lacks SELinux support" + ;; + esac +} + +# Return the SELinux type component if available +get_selinux_type() { ls -Zd "$1" | sed -n 's/.*:\(.*_t\)[: ].*/\1/p'; } + +# Whether SELinux Multi Level Security is enabled +mls_enabled_() { + sestatus 2>&1 | + grep 'Policy MLS status:.*enabled' > /dev/null +} + +# Skip this test if we're not in SELinux "enforcing" mode. +require_selinux_enforcing_() +{ + require_selinux_ + test "$(getenforce)" = Enforcing \ + || skip_ "This test is useful only with SELinux in Enforcing mode." +} + +require_smack_() +{ + grep 'smackfs$' /proc/filesystems > /dev/null \ + || skip_ "this system lacks SMACK support" + + test "$(ls -Zd .)" != '? .' \ + || skip_ "this file system lacks SMACK support" +} + +require_openat_support_() +{ + # Skip this test if your system has neither the openat-style functions + # nor /proc/self/fd support with which to emulate them. + + test -z "$CONFIG_HEADER" \ + && framework_failure_ 'CONFIG_HEADER not defined' + + _skip=yes + grep '^#define HAVE_OPENAT' "$CONFIG_HEADER" > /dev/null && _skip=no + test -d /proc/self/fd && _skip=no + if test $_skip = yes; then + skip_ 'this system lacks openat support' + fi +} + +# Return true if command runs with the +# ulimit specified in the first argument +ulimit_supported_() +{ + local v + v="$1" + shift + + ( + # Try to disable core dumps which may + # occur with memory constraints + trap '' SEGV; ulimit -c 0; + + ulimit -v $v && "$@" + ) >/dev/null 2>&1 +} + +# Determine the minimum required VM limit to run the given command. +# Output that value to stdout ... to be used by the caller. +# Return 0 in case of success, and a non-Zero value otherwise. +get_min_ulimit_v_() +{ + local v + local page_size + + # Increase result by this amount to avoid alignment issues + page_size=$(getconf PAGESIZE || echo 4096) + page_size=$(($page_size / 1024)) + + for v in $( seq 5000 5000 50000 ); do + if ulimit_supported_ $v "$@"; then + local prev_v + prev_v=$v + for v in $( seq $(($prev_v-1000)) -1000 1000 ); do + ulimit_supported_ $v "$@" || + { + ret_v=$((prev_v + $page_size)) + echo $ret_v + return 0 + } + prev_v=$v + done + fi + done + # The above did not find a working limit. Echo a very small number - just + # in case the caller does not handle the non-Zero return value. + echo 1; return 1 +} + +require_readable_root_() +{ + test -r / || skip_ "/ is not readable" +} + +# Skip the current test if strace is not available or doesn't work +# with the named syscall. Usage: require_strace_ unlink +require_strace_() +{ + test $# = 1 || framework_failure_ + + strace -V < /dev/null > /dev/null 2>&1 || + skip_ 'no strace program' + + strace -qe "$1" echo > /dev/null 2>&1 || + skip_ 'strace -qe "'"$1"'" does not work' + + # On some linux/sparc64 systems, strace works fine on 32-bit executables, + # but prints only one line of output for every 64-bit executable. + strace -o log-help ls --help >/dev/null || framework_failure_ + n_lines_help=$(wc -l < log-help) + rm -f log-help + if test $n_lines_help = 0 || test $n_lines_help = 1; then + skip_ 'strace produces no more than one line of output' + fi +} + +# Skip the current test if valgrind doesn't work, +# which could happen if not installed, +# or hasn't support for the built architecture, +# or hasn't appropriate error suppressions installed etc. +require_valgrind_() +{ + valgrind --error-exitcode=1 true 2>/dev/null || + skip_ "requires a working valgrind" +} + +# Skip the current test if setfacl doesn't work on the current file system, +# which could happen if not installed, or if ACLs are not supported by the +# kernel or the file system, or are turned off via mount options. +# +# Work around the following two issues: +# +# 1) setfacl maps ACLs into file permission bits if on "noacl" file systems. +# +# On file systems which do not support ACLs (e.g. ext4 mounted with -o noacl), +# setfacl operates on the regular file permission bits, and only fails if the +# given ACL spec does not fit into there. Thus, to test if ACLs really work +# on the current file system, pass an ACL spec which can't be mapped that way. +# "Default" ACLs (-d) seem to fulfill this requirement. +# +# 2) setfacl only invokes the underlying system call if the ACL would change. +# +# If the given ACL spec would not change the ACLs on the file, then setfacl +# does not invoke the underlying system call - setxattr(). Therefore, to test +# if setting ACLs really works on the current file system, call setfacl twice +# with conflictive ACL specs. +require_setfacl_() +{ + local d='acltestdir_' + mkdir $d || framework_failure_ + local f=0 + + setfacl -d -m user::r-x $d \ + && setfacl -d -m user::rwx $d \ + || f=1 + rm -rf $d || framework_failure_ + test $f = 0 \ + || skip_ "setfacl does not work on the current file system" +} + +# Require a controlling input 'terminal'. +require_controlling_input_terminal_() +{ + have_input_tty=yes + tty -s || have_input_tty=no + test -t 0 || have_input_tty=no + if test "$have_input_tty" = no; then + skip_ 'requires controlling input terminal +This test must have a controlling input "terminal", so it may not be +run via "batch", "at", or "ssh". On some systems, it may not even be +run in the background.' + fi +} + +require_built_() +{ + skip_=no + for i in "$@"; do + case " $built_programs " in + *" $i "*) ;; + *) echo "$i: not built" 1>&2; skip_=yes ;; + esac + done + + test $skip_ = yes && skip_ "required program(s) not built" +} + +require_file_system_bytes_free_() +{ + local req=$1 + local expr=$(stat -f --printf "$req / %S <= %a" .) + $AWK "BEGIN{ exit !($expr) }" \ + || skip_ "this test needs at least $req bytes of free space" +} + +uid_is_privileged_() +{ + # Make sure id -u succeeds. + my_uid=$(id -u) \ + || { echo "$0: cannot run 'id -u'" 1>&2; return 1; } + + # Make sure it gives valid output. + case $my_uid in + 0) ;; + *[!0-9]*) + echo "$0: invalid output ('$my_uid') from 'id -u'" 1>&2 + return 1 ;; + *) return 1 ;; + esac +} + +get_process_status_() +{ + sed -n '/^State:[ ]*\([[:alpha:]]\).*/s//\1/p' /proc/$1/status +} + +# Convert an ls-style permission string, like drwxr----x and -rw-r-x-wx +# to the equivalent chmod --mode (-m) argument, (=,u=rwx,g=r,o=x and +# =,u=rw,g=rx,o=wx). Ignore ACLs. +rwx_to_mode_() +{ + case $# in + 1) rwx=$1;; + *) echo "$0: wrong number of arguments" 1>&2 + echo "Usage: $0 ls-style-mode-string" 1>&2 + return;; + esac + + case $rwx in + [ld-][rwx-][rwx-][rwxsS-][rwx-][rwx-][rwxsS-][rwx-][rwx-][rwxtT-]) ;; + [ld-][rwx-][rwx-][rwxsS-][rwx-][rwx-][rwxsS-][rwx-][rwx-][rwxtT-][+.]) ;; + *) echo "$0: invalid mode string: $rwx" 1>&2; return;; + esac + + # Perform these conversions: + # S s + # s xs + # T t + # t xt + # The 'T' and 't' ones are only valid for 'other'. + s='s/S/@/;s/s/x@/;s/@/s/' + t='s/T/@/;s/t/x@/;s/@/t/' + + u=$(echo $rwx|sed 's/^.\(...\).*/,u=\1/;s/-//g;s/^,u=$//;'$s) + g=$(echo $rwx|sed 's/^....\(...\).*/,g=\1/;s/-//g;s/^,g=$//;'$s) + o=$(echo $rwx|sed 's/^.......\(...\).*/,o=\1/;s/-//g;s/^,o=$//;'$s';'$t) + echo "=$u$g$o" +} + +# Set the global variable stty_reversible_ to a space-separated list of the +# reversible settings from stty.c. stty_reversible_ also starts and ends +# with a space. +stty_reversible_init_() +{ + require_perl_ + # Pad start with one space for the first option to match in query function. + stty_reversible_=' '$(perl -lne '/^ *{"(.*?)",.*\bREV\b/ and print $1' \ + "$abs_top_srcdir"/src/stty.c | tr '\n' ' ') + # Ensure that there are at least 62, i.e., so we're alerted if + # reformatting the source empties the list. + test 62 -le $(echo "$stty_reversible_"|wc -w) \ + || framework_failure_ "too few reversible settings" +} + +# Test whether $1 is one of stty's reversible options. +stty_reversible_query_() +{ + case $stty_reversible_ in + '') + framework_failure_ "stty_reversible_init_() not called?";; + *" $1 "*) + return 0;; + *) + return 1;; + esac +} + +skip_if_() +{ + case $1 in + root) skip_ must be run as root ;; + non-root) skip_ must be run as non-root ;; + *) ;; # FIXME? + esac +} + +very_expensive_() +{ + if test "$RUN_VERY_EXPENSIVE_TESTS" != yes; then + skip_ 'very expensive: disabled by default +This test is very expensive, so it is disabled by default. +To run it anyway, rerun make check with the RUN_VERY_EXPENSIVE_TESTS +environment variable set to yes. E.g., + + env RUN_VERY_EXPENSIVE_TESTS=yes make check + +or use the shortcut target of the toplevel Makefile, + + make check-very-expensive +' + fi +} + +expensive_() +{ + if test "$RUN_EXPENSIVE_TESTS" != yes; then + skip_ 'expensive: disabled by default +This test is relatively expensive, so it is disabled by default. +To run it anyway, rerun make check with the RUN_EXPENSIVE_TESTS +environment variable set to yes. E.g., + + env RUN_EXPENSIVE_TESTS=yes make check + +or use the shortcut target of the toplevel Makefile, + + make check-expensive +' + fi +} + +# Test whether we can run our just-built root owned rm, +# i.e., that $NON_ROOT_USERNAME has access to the build directory. +nonroot_has_perm_() +{ + require_built_ chroot + + local rm_version=$( + chroot --skip-chdir --user=$NON_ROOT_USERNAME / env PATH="$PATH" \ + rm --version | + sed -n '1s/.* //p' + ) + case ":$rm_version:" in + :$PACKAGE_VERSION:) ;; + *) return 1;; + esac +} + +require_root_() +{ + uid_is_privileged_ || skip_ "must be run as root" + NON_ROOT_USERNAME=${NON_ROOT_USERNAME=nobody} + NON_ROOT_GID=${NON_ROOT_GID=$(id -g $NON_ROOT_USERNAME)} + + # When the current test invokes chroot, call nonroot_has_perm_ + # to check for a common problem. + grep '^[ ]*chroot' "../$0" \ + && { nonroot_has_perm_ \ + || skip_ "user $NON_ROOT_USERNAME lacks execute permissions"; } +} + +skip_if_root_() { uid_is_privileged_ && skip_ "must be run as non-root"; } + +# Set 'groups' to a space-separated list of at least two groups +# of which the user is a member. +require_membership_in_two_groups_() +{ + test $# = 0 || framework_failure_ + + groups=${COREUTILS_GROUPS-$( (id -G || /usr/xpg4/bin/id -G) 2>/dev/null)} + case "$groups" in + *' '*) ;; + *) skip_ 'requires membership in two groups +this test requires that you be a member of more than one group, +but running '\''id -G'\'' either failed or found just one. If you really +are a member of at least two groups, then rerun this test with +COREUTILS_GROUPS set in your environment to the space-separated list +of group names or numbers. E.g., + + env COREUTILS_GROUPS='\''users cdrom'\'' make check + +' + ;; + esac +} + +# Is /proc/$PID/status supported? +require_proc_pid_status_() +{ + sleep 2 & + local pid=$! + sleep .5 + grep '^State:[ ]*[S]' /proc/$pid/status > /dev/null 2>&1 || + skip_ "/proc/$pid/status: missing or 'different'" + kill $pid +} + +# Does trap support signal names? +# Old versions of ash did not. +require_trap_signame_() +{ + (trap '' CHLD) || skip_ 'requires trap with signal name support' +} + +# Does kill support sending signal to whole group? +# dash 0.5.8 at least does not. +require_kill_group_() +{ + kill -0 -- -1 || skip_ 'requires kill with group signalling support' +} + +# Return nonzero if the specified path is on a file system for +# which SEEK_DATA support exists. +seek_data_capable_() +{ + { python3 < /dev/null && PYTHON_=python3; } || + { python < /dev/null && PYTHON_=python; } + + if test x"$PYTHON_" = x; then + warn_ 'seek_data_capable_: python missing: assuming not SEEK_DATA capable' + return 1 + fi + + # Use timeout if available to skip cases where SEEK_DATA takes a long time. + # We saw FreeBSD 9.1 take 35s to return from SEEK_DATA for a 1TiB empty file. + # Note lseek() is uninterruptible on FreeBSD 9.1, but it does eventually + # return, and the timeout will ensure a failure return from the process. + timeout --version >/dev/null && TIMEOUT_='timeout 10' + + $TIMEOUT_ $PYTHON_ "$abs_srcdir"/tests/seek-data-capable "$@" +} + +# Skip the current test if "." lacks d_type support. +require_dirent_d_type_() +{ + python < /dev/null \ + || skip_ python missing: assuming no d_type support + + python "$abs_srcdir"/tests/d_type-check \ + || skip_ requires d_type support +} + +# Skip the current test if we lack Perl. +require_perl_() +{ + : ${PERL=perl} + $PERL -e 'use warnings' > /dev/null 2>&1 \ + || skip_ 'configure did not find a usable version of Perl' +} + +# Does the current (working-dir) file system support sparse files? +require_sparse_support_() +{ + test $# = 0 || framework_failure_ + # Test whether we can create a sparse file. + # For example, on Darwin6.5 with a file system of type hfs, it's not possible. + # NTFS requires 128K before a hole appears in a sparse file. + t=sparse.$$ + dd bs=1 seek=128K of=$t < /dev/null 2> /dev/null + set x $(du -sk $t) + kb_size=$2 + rm -f $t + if test $kb_size -ge 128; then + skip_ 'this file system does not support sparse files' + fi +} + +# Libraries needed when we compile a shared library. +gcc_shared_libs_= + +# Compile a shared lib using the GCC options for doing so. +# Pass input and output file as parameters respectively. +# Any other optional parmeters are passed to $CC. +gcc_shared_() +{ + local in=$1 + local out=$2 + shift 2 || return 1 + + $CC -Wall -shared --std=gnu99 -fPIC -O2 $* "$in" -o "$out" $gcc_shared_libs_ +} + +# There are a myriad of ways to build shared libs, +# so we only consider running tests requiring shared libs, +# on platforms that support building them as follows. +require_gcc_shared_() +{ + # Try two different values for gcc_shared_libs_. + gcc_shared_libs_='-ldl' + if gcc_shared_ '-' 'd.so' -xc < /dev/null 2>&1; then + : + else + gcc_shared_libs_= + if gcc_shared_ '-' 'd.so' -xc < /dev/null 2>&1; then + : + else + skip_ '$CC -shared ... failed to build a shared lib' + fi + fi + rm -f d.so +} + +mkfifo_or_skip_() +{ + test $# = 1 || framework_failure_ + if ! mkfifo "$1"; then + # Make an exception of this case -- usually we interpret framework-creation + # failure as a test failure. However, in this case, when running on a SunOS + # system using a file system NFS mounted from OpenBSD, the above fails like + # this: + # mkfifo: cannot make fifo 'fifo-10558': Not owner + skip_ 'unable to create a fifo' + fi +} + +trap_sigpipe_or_skip_() +{ + (trap '' PIPE && yes | :) 2>&1 | grep -qF 'Broken pipe' || + skip_ 'trapping SIGPIPE is not supported' +} + +require_bash_as_SHELL_() +{ + if bash --version >/dev/null 2>&1; then + SHELL='bash' + else + skip_ 'bash is required' + fi +} + +# Disable the current test if the working directory seems to have +# the setgid bit set. +skip_if_setgid_() +{ + setgid_tmpdir=setgid-$$ + (umask 77; mkdir $setgid_tmpdir) + perms=$(stat --printf %A $setgid_tmpdir) + rmdir $setgid_tmpdir + case $perms in + drwx------);; + drwxr-xr-x);; # Windows98 + DJGPP 2.03 + *) skip_ 'this directory has the setgid bit set';; + esac +} + +# Skip if files are created with a different group to the current user +# This can happen due to a setgid dir, or by some other mechanism on OS X: +# https://unix.stackexchange.com/q/63865 +# https://bugs.gnu.org/14024#41 +skip_if_nondefault_group_() +{ + touch grp.$$ + gen_ug=$(stat -c '%u:%g' grp.$$) + rm grp.$$ + test "$gen_ug" = "$(id -ru):$(id -rg)" || + skip_ 'Files are created with a different gid' +} + +skip_if_mcstransd_is_running_() +{ + test $# = 0 || framework_failure_ + + # When mcstransd is running, you'll see only the 3-component + # version of file-system context strings. Detect that, + # and if it's running, skip this test. + __ctx=$(stat --printf='%C\n' .) || framework_failure_ + case $__ctx in + *:*:*:*) __ctx_ok=1 ;; # four components is ok + *:*:*) # three components is ok too if there is no MLS + mls_enabled_ || __ctx_ok=1 ;; + esac + + test "$__ctx_ok" || + skip_ "unexpected context '$__ctx'; turn off mcstransd" +} + +# Skip the current test if umask doesn't work as usual. +# This test should be run in the temporary directory that ends +# up being removed via the trap commands. +working_umask_or_skip_() +{ + umask 022 + touch file1 file2 + chmod 644 file2 + perms=$(ls -l file1 file2 | sed 's/ .*//' | uniq) + rm -f file1 file2 + + case $perms in + *' + '*) skip_ 'your build directory has unusual umask semantics' + esac +} + +# Retry a function requiring a sufficient delay to _pass_ +# using a truncated exponential backoff method. +# Example: retry_delay_ dd_reblock_1 .1 6 +# This example will call the dd_reblock_1 function with +# an initial delay of .1 second and call it at most 6 times +# with a max delay of 3.2s (doubled each time), or a total of 6.3s +# Note ensure you do _not_ quote the parameter to GNU sleep in +# your function, as it may contain separate values that sleep +# needs to accumulate. +# Further function arguments will be forwarded to the test function. +retry_delay_() +{ + local test_func=$1 + local init_delay=$2 + local max_n_tries=$3 + shift 3 || return 1 + + local attempt=1 + local num_sleeps=$attempt + local time_fail + while test $attempt -le $max_n_tries; do + local delay=$($AWK -v n=$num_sleeps -v s="$init_delay" \ + 'BEGIN { print s * n }') + "$test_func" "$delay" "$@" && { time_fail=0; break; } || time_fail=1 + attempt=$(expr $attempt + 1) + num_sleeps=$(expr $num_sleeps '*' 2) + done + test "$time_fail" = 0 +} + +# Call this with a list of programs under test immediately after +# sourcing init.sh. +print_ver_() +{ + require_built_ "$@" + if test "$VERBOSE" = yes; then + local i + for i in $*; do + env $i --version + done + fi +} + +# Are we running on GNU/Hurd? +require_gnu_() +{ + test "$(uname)" = GNU \ + || skip_ 'not running on GNU/Hurd' +} + +sanitize_path_ |