Blame SOURCES/acl-2.2.49-tests.patch

0f16a9
diff --git a/test/cp.test b/test/cp.test
0f16a9
index a888c04..4a75ffd 100644
0f16a9
--- a/test/cp.test
0f16a9
+++ b/test/cp.test
0f16a9
@@ -9,7 +9,7 @@ The cp utility should only copy ACLs if `-p' is given.
0f16a9
 	> -rw-rw-r--+
0f16a9
 	
0f16a9
 	$ cp f g
0f16a9
-	$ ls -l g | awk -- '{ print $1 }'
0f16a9
+	$ ls -l g | awk -- '{ print $1 }' | sed 's/\\.$//'
0f16a9
 	> -rw-r--r--
0f16a9
 	
0f16a9
 	$ rm g
0f16a9
diff --git a/test/getfacl-recursive.test b/test/getfacl-recursive.test
0f16a9
index b88c211..a72192e 100644
0f16a9
--- a/test/getfacl-recursive.test
0f16a9
+++ b/test/getfacl-recursive.test
0f16a9
@@ -1,5 +1,6 @@
0f16a9
 Tests for proper path recursion
0f16a9
 
0f16a9
+	$ umask 022
0f16a9
 	$ mkdir -p 1/2/3
0f16a9
 	$ mkdir 1/link
0f16a9
 	$ touch 1/link/file
0f16a9
diff --git a/test/misc.test b/test/misc.test
0f16a9
index 7c62c64..e6140da 100644
0f16a9
--- a/test/misc.test
0f16a9
+++ b/test/misc.test
0f16a9
@@ -254,7 +254,7 @@ Add some users and groups
0f16a9
 Symlink in directory with default ACL?
0f16a9
 	 
0f16a9
 	$ ln -s d d/l
0f16a9
-	$ ls -dl d/l | awk '{print $1}'
0f16a9
+	$ ls -dl d/l | awk '{print $1}' | sed 's/\\.$//'
0f16a9
 	> lrwxrwxrwx
0f16a9
 
0f16a9
 	$ ls -dl -L d/l | awk '{print $1}'
0f16a9
@@ -343,7 +343,7 @@ Remove the default ACL
0f16a9
 Reset to base entries
0f16a9
 	 
0f16a9
 	$ setfacl -b d
0f16a9
-	$ ls -dl d | awk '{print $1}'
0f16a9
+	$ ls -dl d | awk '{print $1}' | sed 's/\\.$//'
0f16a9
 	> drwxr-x---
0f16a9
 
0f16a9
 	$ getfacl --omit-header d
0f16a9
@@ -355,7 +355,7 @@ Reset to base entries
0f16a9
 Now, chmod should change the group_obj entry
0f16a9
 	 
0f16a9
 	$ chmod 775 d
0f16a9
-	$ ls -dl d | awk '{print $1}'
0f16a9
+	$ ls -dl d | awk '{print $1}' | sed 's/\\.$//'
0f16a9
 	> drwxrwxr-x
0f16a9
 	
0f16a9
 	$ getfacl --omit-header d
0f16a9
diff --git a/test/root/permissions.test b/test/root/permissions.test
0f16a9
index afaf5f0..4880bd2 100644
0f16a9
--- a/test/root/permissions.test
0f16a9
+++ b/test/root/permissions.test
0f16a9
@@ -20,7 +20,7 @@ defined permissions.
0f16a9
 	$ cd d
0f16a9
 	$ umask 027
0f16a9
 	$ touch f
0f16a9
-	$ ls -l f | awk -- '{ print $1, $3, $4 }'
0f16a9
+	$ ls -l f | awk -- '{ print $1, $3, $4 }' | sed 's/---\\./---/'
0f16a9
 	> -rw-r----- root root
0f16a9
 
0f16a9
 
0f16a9
@@ -40,7 +40,7 @@ Now, change the ownership of the file to bin:bin and verify that this
0f16a9
 gives user bin write access.
0f16a9
 
0f16a9
 	$ chown bin:bin f
0f16a9
-	$ ls -l f | awk -- '{ print $1, $3, $4 }'
0f16a9
+	$ ls -l f | awk -- '{ print $1, $3, $4 }' | sed 's/---\\./---/'
0f16a9
 	> -rw-r----- bin bin
0f16a9
 	$ su bin
0f16a9
 	$ echo bin >> f
0f16a9
@@ -257,12 +257,12 @@ directories if the file has an ACL and only CAP_FOWNER would grant them.
0f16a9
 	$ mkdir -m 600 x
0f16a9
 	$ chown daemon:daemon x
0f16a9
 	$ echo j > x/j
0f16a9
-	$ ls -l x/j | awk -- '{ print $1, $3, $4 }'
0f16a9
+	$ ls -l x/j | awk -- '{ print $1, $3, $4 }' | sed 's/---\\./---/'
0f16a9
 	> -rw-r----- root root
0f16a9
 
0f16a9
 	$ setfacl -m u:daemon:r x
0f16a9
 
0f16a9
-	$ ls -l x/j | awk -- '{ print $1, $3, $4 }'
0f16a9
+	$ ls -l x/j | awk -- '{ print $1, $3, $4 }' | sed 's/---\\./---/'
0f16a9
 	> -rw-r----- root root
0f16a9
 	(With the bug this gives: `ls: x/j: Permission denied'.)
0f16a9
 
0f16a9
diff --git a/test/root/restore.test b/test/root/restore.test
0f16a9
index 6003cd4..5dbf73c 100644
0f16a9
--- a/test/root/restore.test
0f16a9
+++ b/test/root/restore.test
0f16a9
@@ -17,7 +17,7 @@ Ensure setuid bit is restored when the owner changes
0f16a9
 	$ chown bin passwd
0f16a9
 	$ chmod u+s passwd
0f16a9
 	$ setfacl --restore passwd.acl
0f16a9
-	$ ls -dl passwd | awk '{print $1 " " $3 " " $4}'
0f16a9
+	$ ls -dl passwd | awk '{print $1 " " $3 " " $4}' | sed 's/\\. root/ root/'
0f16a9
 	> -rwsr-xr-x root root
0f16a9
 
0f16a9
 	$ rm passwd passwd.acl
0f16a9
diff --git a/test/root/setfacl.test b/test/root/setfacl.test
0f16a9
index 630e9fb..dd7fe08 100644
0f16a9
--- a/test/root/setfacl.test
0f16a9
+++ b/test/root/setfacl.test
0f16a9
@@ -8,7 +8,7 @@ Setfacl utility tests. Run these tests on a filesystem with ACL support.
0f16a9
 	$ sg bin
0f16a9
 	$ umask 027
0f16a9
 	$ touch g
0f16a9
-	$ ls -dl g | awk '{print $1}'
0f16a9
+	$ ls -dl g | awk '{print $1}' | sed 's/\\.$//'
0f16a9
 	> -rw-r-----
0f16a9
 
0f16a9
 	$ setfacl -m m:- g
0f16a9
diff --git a/test/sbits-restore.test b/test/sbits-restore.test
0f16a9
index e5e4fb2..abdb58a 100644
0f16a9
--- a/test/sbits-restore.test
0f16a9
+++ b/test/sbits-restore.test
0f16a9
@@ -13,10 +13,10 @@ Ensure setting of SUID/SGID/sticky via --restore works
0f16a9
 	$ touch d/g
0f16a9
 	$ touch d/u
0f16a9
 	$ setfacl --restore d.acl
0f16a9
-	$ ls -dl d | awk '{print $1}'
0f16a9
+	$ ls -dl d | awk '{print $1}' | sed 's/\\.$//'
0f16a9
 	> drwxr-xr-t
0f16a9
-	$ ls -dl d/u | awk '{print $1}'
0f16a9
+	$ ls -dl d/u | awk '{print $1}' | sed 's/\\.$//'
0f16a9
 	> -rwSr--r--
0f16a9
-	$ ls -dl d/g | awk '{print $1}'
0f16a9
+	$ ls -dl d/g | awk '{print $1}' | sed 's/\\.$//'
0f16a9
 	> -rw-r-Sr--
0f16a9
 	$ rm -Rf d