freebsd-dev/crypto/openssh/regress/agent-getpeereid.sh

58 lines
1.1 KiB
Bash
Raw Normal View History

2018-05-06 12:27:04 +00:00
# $OpenBSD: agent-getpeereid.sh,v 1.10 2018/02/09 03:40:22 dtucker Exp $
# Placed in the Public Domain.
tid="disallow agent attach from other uid"
UNPRIV=nobody
ASOCK=${OBJ}/agent
SSH_AUTH_SOCK=/nonexistent
2011-02-17 11:47:40 +00:00
if config_defined HAVE_GETPEEREID HAVE_GETPEERUCRED HAVE_SO_PEERCRED ; then
:
else
2004-01-07 11:10:17 +00:00
echo "skipped (not supported on this platform)"
exit 0
fi
2017-01-31 12:29:48 +00:00
case "x$SUDO" in
xsudo) sudo=1;;
xdoas) ;;
x)
echo "need SUDO to switch to uid $UNPRIV"
2018-05-06 12:27:04 +00:00
echo SKIPPED
2017-01-31 12:29:48 +00:00
exit 0 ;;
*)
echo "unsupported $SUDO - "doas" and "sudo" are allowed"
exit 0 ;;
esac
2006-09-30 13:29:51 +00:00
trace "start agent"
eval `${SSHAGENT} -s -a ${ASOCK}` > /dev/null
r=$?
if [ $r -ne 0 ]; then
fail "could not start ssh-agent: exit code $r"
else
chmod 644 ${SSH_AUTH_SOCK}
2017-08-03 10:10:20 +00:00
${SSHADD} -l > /dev/null 2>&1
r=$?
if [ $r -ne 1 ]; then
fail "ssh-add failed with $r != 1"
fi
2017-01-31 12:29:48 +00:00
if test -z "$sudo" ; then
# doas
2017-08-03 10:10:20 +00:00
${SUDO} -n -u ${UNPRIV} ${SSHADD} -l 2>/dev/null
2017-01-31 12:29:48 +00:00
else
# sudo
2017-08-03 10:10:20 +00:00
< /dev/null ${SUDO} -S -u ${UNPRIV} ${SSHADD} -l 2>/dev/null
2017-01-31 12:29:48 +00:00
fi
r=$?
if [ $r -lt 2 ]; then
fail "ssh-add did not fail for ${UNPRIV}: $r < 2"
fi
trace "kill agent"
${SSHAGENT} -k > /dev/null
fi
rm -f ${OBJ}/agent