Update Red Hat Copyright Notices
[nbdkit.git] / tests / test-read-password.sh
blob234162bc35c8c08aed3d46f4d514dbba13caf53c
1 #!/usr/bin/env bash
2 # nbdkit
3 # Copyright Red Hat
5 # Redistribution and use in source and binary forms, with or without
6 # modification, are permitted provided that the following conditions are
7 # met:
9 # * Redistributions of source code must retain the above copyright
10 # notice, this list of conditions and the following disclaimer.
12 # * Redistributions in binary form must reproduce the above copyright
13 # notice, this list of conditions and the following disclaimer in the
14 # documentation and/or other materials provided with the distribution.
16 # * Neither the name of Red Hat nor the names of its contributors may be
17 # used to endorse or promote products derived from this software without
18 # specific prior written permission.
20 # THIS SOFTWARE IS PROVIDED BY RED HAT AND CONTRIBUTORS ''AS IS'' AND
21 # ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
22 # THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
23 # PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL RED HAT OR
24 # CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
25 # SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
26 # LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
27 # USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
28 # ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
29 # OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
30 # OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 # SUCH DAMAGE.
33 source ./functions.sh
34 set -e
35 set -x
37 # This is an executable C script using nbdkit-cc-plugin.
38 requires_plugin cc
39 plugin=$SRCDIR/test-read-password-plugin.c
40 requires test -x $plugin
42 # Since we are matching on error messages.
43 export LANG=C
45 f=test-read-password.file
46 tf=test-read-password.tmp
47 out=test-read-password.out
48 rm -f $f $tf $out
49 cleanup_fn rm -f $f $tf $out
51 # Password on the command line.
52 $plugin -U - -fv file=$f password=abc
53 grep '^abc$' $f
55 # Password +FILENAME.
56 echo def > $tf
57 $plugin -U - -fv file=$f password=+$tf
58 grep '^def$' $f
60 # Password +FILENAME, zero length.
61 : > $tf
62 $plugin -U - -fv file=$f password=+$tf
63 test -f $f
64 ! test -s $f
66 # Password -FD.
67 echo 123 > $tf
68 exec 3< $tf
69 $plugin -U - -fv file=$f password=-3
70 exec 3<&-
71 grep '^123$' $f
73 # Password -FD, zero length.
74 : > $tf
75 exec 3< $tf
76 $plugin -U - -fv file=$f password=-3
77 exec 3<&-
78 test -f $f
79 ! test -s $f
81 # Reading a password from stdin/stdout/stderr using -0/-1/-2 should fail.
82 for i in 0 1 2; do
83 if $plugin -U - -fv file=$f password=-$i </dev/null >&$out ; then
84 echo "$0: expected password=-$i to fail"
85 exit 1
87 cat $out
88 grep "cannot use password -FD" $out
89 done