3 # Exercise the pmParseHostAttrsSpec API family
6 echo "QA output created by $seq"
8 # get standard environment, filters and checks
15 status
=0 # success is the default!
16 $sudo rm -rf $tmp.
* $seq.full
17 trap "rm -f $tmp.*; exit \$status" 0 1 2 3 15
19 _run_valgrind src
/parsehostattrs pcps
://nas1.servers.com
:44321,4321@firewall.servers.com
:44322?
compress
20 _run_valgrind src
/parsehostattrs pcp
://localhost
:23?
compress
21 _run_valgrind src
/parsehostattrs pcp
://some.
host?user
=pcpqa\
&compress\
&pass
=blah
22 _run_valgrind src
/parsehostattrs pcp
://some.
host?user
=pcpqa
23 _run_valgrind src
/parsehostattrs some.
host?user
=pcpqa
24 _run_valgrind src
/parsehostattrs some.
host
25 _run_valgrind src
/parsehostattrs pcp
://?
compress\
&exclusive
29 # filter all the wierd and wonderful ways that SASL and its merry modules
30 # might fail, into one canonical form ("authentication failure").
33 # [Fri Feb 13 23:00:29] pminfo(9819) Alert: GSSAPI Error: Unspecified GSS failure. Minor code may provide more information (Credentials cache file '/tmp/krb5cc_1000' not found)
34 # [Fri Mar 6 19:14:35] pminfo(20207) Alert: No worthy mechs found
37 # pminfo: ...notApassword": Authentication - generic failure
39 # Error: Authentication - user not found
41 # pminfo: ...notApassword": Authentication - authentication failure
43 # pminfo: ...notApassword": Operation not supported
44 # are considered equivalent to
45 # Error: Authentication - authentication failure
49 -e '/pminfo.* GSSAPI Error:/d' \
50 -e '/pminfo.* No worthy mechs found/d' \
51 -e 's/^pminfo: .*Authentication -/Error: Authentication -/g' \
52 -e 's/^pminfo: .*Operation/Error: Authentication -/g' \
53 -e '/Error: Authentication/s/ - generic failure/ - authentication failure/g' \
54 -e '/Error: Authentication/s/ - no mechanism available/ - authentication failure/g' \
55 -e '/Error: Authentication/s/ - user not found/ - authentication failure/g' \
56 -e '/Error: Authentication/s/ - not supported/ - authentication failure/g' \
60 echo "pminfo username/password failure valgrind checking" >> $seq.full
61 _run_valgrind pminfo
-h pcp
://localhost?user
=NOsuchUSER\
&pass
=DEFINITELYnotApassword
2>&1 | _filter_auth