This file is indexed.

/var/lib/pcp/testsuite/1042 is in pcp-testsuite 4.0.1-1.

This file is owned by root:root, with mode 0o755.

The actual contents of the file can be viewed below.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
#!/bin/sh
# PCP QA Test No. 1042
# Check that unauthenticated access to proc.* no longer
# possible using the (deprecated) local pmwebd methods.
#
# Copyright (c) 2015 Red Hat.
#

seq=`basename $0`
echo "QA output created by $seq"

. ./common.webapi
. ./common.python

_check_pmwebd
_check_requests_json

status=1	# failure is the default!
$sudo rm -rf $tmp $tmp.* $seq.full

pyscript=src/test_webprocesses.py
signal=$PCP_BINADM_DIR/pmsignal
username=`id -u -n`
webport=`_find_free_port`
webargs="-U $username -p $webport -v -t5"

_cleanup()
{
    if [ "X$webpid" != "X" ]; then
        $signal -s TERM $webpid
        webpid=""
    fi
    $sudo rm -f $tmp.*
}

trap "_cleanup; exit \$status" 0 1 2 3 15

_filter()
{
    sed \
	-e 's/\#[0-9][0-9]*/#CONTEXT/g' \
	-e "s/:$webport/:WEBPORT/g" \
    # end
}

# real QA test starts here
echo '== "permissive" mode (deprecated behaviour)'
$PCP_BINADM_DIR/pmwebd $webargs -l $tmp.out -P &
webpid=$!
echo "permissive webpid=$webpid" >>$seq.full
_wait_for_pmwebd_logfile $tmp.out $webport
$python $pyscript --port $webport | _filter

# shut it down, then wait for it
$signal -s TERM $webpid
pmsleep 1.25

echo '== enforcing mode (no unauthenticated proc access)'
$PCP_BINADM_DIR/pmwebd $webargs -l $tmp.out &
webpid=$!
echo "enforcing webpid=$webpid" >>$seq.full
_wait_for_pmwebd_logfile $tmp.out $webport
$python $pyscript --port $webport | _filter

# success, all done
status=0
exit