/var/lib/pcp/testsuite/1042 is in pcp-testsuite 4.0.1-1.
This file is owned by root:root, with mode 0o755.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 | #!/bin/sh
# PCP QA Test No. 1042
# Check that unauthenticated access to proc.* no longer
# possible using the (deprecated) local pmwebd methods.
#
# Copyright (c) 2015 Red Hat.
#
seq=`basename $0`
echo "QA output created by $seq"
. ./common.webapi
. ./common.python
_check_pmwebd
_check_requests_json
status=1 # failure is the default!
$sudo rm -rf $tmp $tmp.* $seq.full
pyscript=src/test_webprocesses.py
signal=$PCP_BINADM_DIR/pmsignal
username=`id -u -n`
webport=`_find_free_port`
webargs="-U $username -p $webport -v -t5"
_cleanup()
{
if [ "X$webpid" != "X" ]; then
$signal -s TERM $webpid
webpid=""
fi
$sudo rm -f $tmp.*
}
trap "_cleanup; exit \$status" 0 1 2 3 15
_filter()
{
sed \
-e 's/\#[0-9][0-9]*/#CONTEXT/g' \
-e "s/:$webport/:WEBPORT/g" \
# end
}
# real QA test starts here
echo '== "permissive" mode (deprecated behaviour)'
$PCP_BINADM_DIR/pmwebd $webargs -l $tmp.out -P &
webpid=$!
echo "permissive webpid=$webpid" >>$seq.full
_wait_for_pmwebd_logfile $tmp.out $webport
$python $pyscript --port $webport | _filter
# shut it down, then wait for it
$signal -s TERM $webpid
pmsleep 1.25
echo '== enforcing mode (no unauthenticated proc access)'
$PCP_BINADM_DIR/pmwebd $webargs -l $tmp.out &
webpid=$!
echo "enforcing webpid=$webpid" >>$seq.full
_wait_for_pmwebd_logfile $tmp.out $webport
$python $pyscript --port $webport | _filter
# success, all done
status=0
exit
|