mirror of
https://github.com/linux-apfs/apfstests.git
synced 2026-05-01 15:01:44 -07:00
xfstests: introduce a common directory
Introduce a top level common directory and move all the common.* files into it. Because there is now a directory named common, the prefix can be dropped from all the files. Convert all the tests to use this new directory for including common files. for f in common.*; do \ git mv `echo -n "$f " ; echo $f | sed -e 's;n\.;n/;'` \ done Signed-off-by: Dave Chinner <dchinner@redhat.com> Reviewed-by: Phil White <pwhite@sgi.com> [rjohnston@sgi.com reworked for TOT changes] Signed-off-by: Rich Johnston <rjohnston@sgi.com>
This commit is contained in:
committed by
Rich Johnston
parent
401680a11c
commit
8c4905a42e
+208
@@ -0,0 +1,208 @@
|
||||
##/bin/bash
|
||||
#-----------------------------------------------------------------------
|
||||
# Copyright (c) 2000-2004 Silicon Graphics, Inc. All Rights Reserved.
|
||||
# This program is free software; you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation; either version 2 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program; if not, write to the Free Software
|
||||
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
|
||||
# USA
|
||||
#
|
||||
# Contact information: Silicon Graphics, Inc., 1500 Crittenden Lane,
|
||||
# Mountain View, CA 94043, USA, or: http://www.sgi.com
|
||||
#-----------------------------------------------------------------------
|
||||
# common extended attribute and ACL support
|
||||
|
||||
# pick three unused user/group ids, store them as $acl[1-3]
|
||||
#
|
||||
_acl_setup_ids()
|
||||
{
|
||||
eval `(_cat_passwd; _cat_group) | awk -F: '
|
||||
{ ids[$3]=1 }
|
||||
END {
|
||||
j=1
|
||||
for(i=1; i<1000000 && j<=3;i++){
|
||||
if (! (i in ids)) {
|
||||
printf "acl%d=%d;", j, i;
|
||||
j++
|
||||
}
|
||||
}
|
||||
}'`
|
||||
}
|
||||
|
||||
# filter for the acl ids selected above
|
||||
#
|
||||
_acl_filter_id()
|
||||
{
|
||||
sed \
|
||||
-e "s/u:$acl1/u:id1/" \
|
||||
-e "s/u:$acl2/u:id2/" \
|
||||
-e "s/u:$acl3/u:id3/" \
|
||||
-e "s/g:$acl1/g:id1/" \
|
||||
-e "s/g:$acl2/g:id2/" \
|
||||
-e "s/g:$acl3/g:id3/" \
|
||||
-e "s/ $acl1 / id1 /" \
|
||||
-e "s/ $acl2 / id2 /" \
|
||||
-e "s/ $acl3 / id3 /"
|
||||
}
|
||||
|
||||
# filtered ls
|
||||
#
|
||||
_acl_ls()
|
||||
{
|
||||
_ls_l -n $* | awk '{ print $1, $3, $4, $NF }' | _acl_filter_id
|
||||
}
|
||||
|
||||
#
|
||||
_acl_list()
|
||||
{
|
||||
_file1=$1
|
||||
|
||||
if [ $HOSTOS = "IRIX" ]; then
|
||||
ls -dD $_file1 | _acl_filter_id
|
||||
else
|
||||
chacl -l $_file1 | _acl_filter_id
|
||||
fi
|
||||
}
|
||||
|
||||
# create an ACL with n ACEs in it
|
||||
#
|
||||
_create_n_aces()
|
||||
{
|
||||
let n=$1-4
|
||||
acl='u::rwx,g::rwx,o::rwx,m::rwx' # 4 ace acl start
|
||||
while [ $n -ne 0 ]; do
|
||||
acl="$acl,u:$n:rwx"
|
||||
let n=$n-1
|
||||
done
|
||||
echo $acl
|
||||
}
|
||||
|
||||
# filter user ace names to user ids
|
||||
#
|
||||
_filter_aces()
|
||||
{
|
||||
tmp_file=`mktemp /tmp/ace.XXXXXX`
|
||||
|
||||
(_cat_passwd; _cat_group) > $tmp_file
|
||||
|
||||
$AWK_PROG -v tmpfile=$tmp_file '
|
||||
BEGIN {
|
||||
FS=":"
|
||||
while ( getline <tmpfile > 0 ) {
|
||||
idlist[$1] = $3
|
||||
}
|
||||
}
|
||||
/^user/ { if ($2 in idlist) sub($2, idlist[$2]); print; next}
|
||||
/^u/ { if ($2 in idlist) sub($2, idlist[$2]); print; next}
|
||||
/^default:user/ { if ($3 in idlist) sub($3, idlist[$3]); print; next}
|
||||
{print}
|
||||
'
|
||||
rm -f $tmp_file
|
||||
}
|
||||
|
||||
_filter_aces_notypes()
|
||||
{
|
||||
tr '\[' '\012' | tr ']' '\012' | tr ',' '\012' | _filter_aces|\
|
||||
sed -e 's/u:/user:/' -e 's/g:/group:/' -e 's/o:/other:/' -e 's/m:/mask:/'
|
||||
}
|
||||
|
||||
_require_acls()
|
||||
{
|
||||
if [ ! -x /bin/chacl -a ! -x /usr/bin/chacl -a ! -x /sbin/chacl ]; then
|
||||
_notrun "chacl command not found"
|
||||
fi
|
||||
|
||||
#
|
||||
# Test if chacl is able to list ACLs on the target filesystems. On really
|
||||
# old kernels the system calls might not be implemented at all, but the
|
||||
# more common case is that the tested filesystem simply doesn't support
|
||||
# ACLs.
|
||||
#
|
||||
touch $TEST_DIR/syscalltest
|
||||
chacl -l $TEST_DIR/syscalltest > $TEST_DIR/syscalltest.out 2>&1
|
||||
cat $TEST_DIR/syscalltest.out >> $RESULT_DIR/$seq.full
|
||||
|
||||
if grep -q 'Function not implemented' $TEST_DIR/syscalltest.out; then
|
||||
_notrun "kernel does not support ACLs"
|
||||
fi
|
||||
if grep -q 'Operation not supported' $TEST_DIR/syscalltest.out; then
|
||||
_notrun "ACLs not supported by this filesystem type: $FSTYP"
|
||||
fi
|
||||
|
||||
rm -f $TEST_DIR/syscalltest.out
|
||||
}
|
||||
|
||||
_list_acl()
|
||||
{
|
||||
file=$1
|
||||
|
||||
ls -dD $file | _acl_filter_id
|
||||
}
|
||||
|
||||
_require_attrs()
|
||||
{
|
||||
[ -n $ATTR_PROG ] || _notrun "attr command not found"
|
||||
[ -n $GETFATTR_PROG ] || _notrun "getfattr command not found"
|
||||
[ -n $SETFATTR_PROG ] || _notrun "setfattr command not found"
|
||||
|
||||
#
|
||||
# Test if chacl is able to write an attribute on the target filesystems.
|
||||
# On really old kernels the system calls might not be implemented at all,
|
||||
# but the more common case is that the tested filesystem simply doesn't
|
||||
# support attributes. Note that we can't simply list attributes as
|
||||
# various security modules generate synthetic attributes not actually
|
||||
# stored on disk.
|
||||
#
|
||||
touch $TEST_DIR/syscalltest
|
||||
attr -s "user.xfstests" -V "attr" $TEST_DIR > $TEST_DIR/syscalltest.out 2>&1
|
||||
cat $TEST_DIR/syscalltest.out >> $RESULT_DIR/$seq.full
|
||||
|
||||
if grep -q 'Function not implemented' $TEST_DIR/syscalltest.out; then
|
||||
_notrun "kernel does not support attrs"
|
||||
fi
|
||||
if grep -q 'Operation not supported' $TEST_DIR/syscalltest.out; then
|
||||
_notrun "attrs not supported by this filesystem type: $FSTYP"
|
||||
fi
|
||||
|
||||
rm -f $TEST_DIR/syscalltest.out
|
||||
}
|
||||
|
||||
# getfattr -R returns info in readdir order which varies from fs to fs.
|
||||
# This sorts the output by filename
|
||||
_sort_getfattr_output()
|
||||
{
|
||||
awk '{a[FNR]=$0}END{n = asort(a); for(i=1; i <= n; i++) print a[i]"\n"}' RS=''
|
||||
}
|
||||
|
||||
# set maximum total attr space based on fs type
|
||||
if [ "$FSTYP" == "xfs" -o "$FSTYP" == "udf" ]; then
|
||||
MAX_ATTRS=1000
|
||||
else # Assume max ~1 block of attrs
|
||||
BLOCK_SIZE=`stat -f $TEST_DIR | grep "Block size" | cut -d " " -f3`
|
||||
# user.attribute_XXX="value.XXX" is about 32 bytes; leave some overhead
|
||||
let MAX_ATTRS=$BLOCK_SIZE/40
|
||||
fi
|
||||
|
||||
export MAX_ATTRS
|
||||
|
||||
# Set max attr value size based on fs type
|
||||
if [ "$FSTYP" == "xfs" -o "$FSTYP" == "udf" -o "$FSTYP" == "btrfs" ]; then
|
||||
MAX_ATTRVAL_SIZE=64
|
||||
else # Assume max ~1 block of attrs
|
||||
BLOCK_SIZE=`stat -f $TEST_DIR | grep "Block size" | cut -d " " -f3`
|
||||
# leave a little overhead
|
||||
let MAX_ATTRVAL_SIZE=$BLOCK_SIZE-256
|
||||
fi
|
||||
|
||||
export MAX_ATTRVAL_SIZE
|
||||
# make sure this script returns success
|
||||
/bin/true
|
||||
Reference in New Issue
Block a user