Displaying 8 results from an estimated 8 matches for "stop_sshd".
2014 Oct 24
1
[Bug 2300] New: reexec.sh and login-timeout.sh fail due to a race condition
https://bugzilla.mindrot.org/show_bug.cgi?id=2300
Bug ID: 2300
Summary: reexec.sh and login-timeout.sh fail due to a race
condition
Product: Portable OpenSSH
Version: 6.7p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component:
2025 Jan 10
2
[PATCH v2] ssh-add: support external parsing of key listing
...t;
-fi
+check_keys_present "after readd again"
check_key_absent() {
${SSHADD} -L | grep "^$1 " >/dev/null
diff --git a/regress/test-exec.sh b/regress/test-exec.sh
index 62c00fd8c..89170657e 100644
--- a/regress/test-exec.sh
+++ b/regress/test-exec.sh
@@ -495,6 +495,28 @@ stop_sshd ()
PIDFILE=""
}
+_check_keys_present() {
+ AGENT_LISTING=$(${SSHADD} -l 2> /dev/null)
+ r=$?
+ if [ $r -ne 0 ]; then
+ fail "$1: ssh-add -l returned unexpected exit code: $r"
+ fi
+ NUM_LINES=$(printf "%s" "$AGENT_LISTING" | wc -l)
+ [ "$NUM_LIN...
2017 Jun 16
2
[PATCH] allow relative path in streamlocal forwarding
...ocalsock > /dev/null &
+netcat_pid=$!
+${SSH} -F $OBJ/ssh_config -p$PORT -o ExitOnForwardFailure=yes -R ./remotesock:$OBJ/localsock somehost true
+r=$?
+kill $netcat_pid 2>&1 >/dev/null
+if [ $r -eq 0 ]; then
+ fail "should fail if relative socket path is disabled"
+fi
+
+stop_sshd
+
+start_sshd -o StreamLocalBindRootDirectory=$OBJ/remote-%i
+
+trace "remote forwarding, relative socket path enabled on server, but has wrong permission"
+rm -fr $REMOTE_DIR
+mkdir $REMOTE_DIR
+chmod 0777 $REMOTE_DIR
+rm -f $OBJ/localsock
+$NC -U -l $OBJ/localsock > /dev/null &
+...
2018 Aug 17
3
Call for testing: OpenSSH 7.8
On SPARC Solaris 10, using Solaris' native OpenSSL and Solaris
Studio 12.2, I got the following errors:
run test agent-getpeereid.sh ...
ssh-add did not fail for nobody: 1 < 2
failed disallow agent attach from other uid
gmake[1]: *** [t-exec] Error 1
gmake[1]: Leaving directory
`/scratch/wieland/src/openssh/openssh-SNAP-20180817/regress'
gmake: *** [tests] Error 2
--
Jeff Wieland,
2025 Jan 10
1
[PATCH v2] ssh-add: support external parsing of key listing
..."
-fi
+check_keys_present "after readd again"
check_key_absent() {
${SSHADD} -L | grep "^$1 " >/dev/null
diff --git a/regress/test-exec.sh b/regress/test-exec.sh
index 62c00fd8c..89170657e 100644
--- a/regress/test-exec.sh
+++ b/regress/test-exec.sh
@@ -495,6 +495,28 @@ stop_sshd ()
PIDFILE=""
}
+_check_keys_present() {
+ AGENT_LISTING=$(${SSHADD} -l 2> /dev/null)
+ r=$?
+ if [ $r -ne 0 ]; then
+ fail "$1: ssh-add -l returned unexpected exit code: $r"
+ fi
+ NUM_LINES=$(printf "%s" "$AGENT_LISTING" | wc -l)
+ [ "$NUM_LINES&qu...
2025 Jan 09
2
[PATCH] ssh-add: support parser-friendly operation
From: Corey Hickey <chickey at tagged.com>
When ssh-add is used in a script like:
if ! KEY_LISTING=$(ssh-add -l 2>&1) ; then
echo "SSH agent error" >&2
exit 2
fi
...the operation fails when there is an agent but there are no keys in
the agent. This is because ssh-add exits with status of 1. If the
intent is to examine the keys in the agent,
2016 Dec 14
17
Call for testing: OpenSSH 7.4
Hi,
OpenSSH 7.4 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This release contains some
substantial new features and a number of bugfixes.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable OpenSSH is
2016 Dec 31
2
Baffling regress/forwarding.sh failure, new in 7.4p1
...3301 -o ConnectionAttempts=4 somehost cat /bin/ls
+ test -s /tmp/autopkgtest-virt-lxc.shared.hhquaatj/downtmp/autopkgtest_tmp/user/tree/regress/copy
+ cmp /bin/ls /tmp/autopkgtest-virt-lxc.shared.hhquaatj/downtmp/autopkgtest_tmp/user/tree/regress/copy
+ sleep 10
+ cleanup
+ [ x != x ]
+ stop_sshd
+ [ -f /tmp/autopkgtest-virt-lxc.shared.hhquaatj/downtmp/autopkgtest_tmp/user/tree/regress/pidfile ]
+ sudo cat /tmp/autopkgtest-virt-lxc.shared.hhquaatj/downtmp/autopkgtest_tmp/user/tree/regress/pidfile
+ pid=32570
+ [ X32570 = X ]
+ [ 32570 -lt 2 ]
+ sudo kill 32570
+ trace wait for...