1*d8f5b04cSrillig# $NetBSD: t_create.sh,v 1.9 2024/04/28 07:27:41 rillig Exp $ 29b7401e7Sjmmv# 3454557d7Sjmmv# Copyright (c) 2005, 2006, 2007, 2008 The NetBSD Foundation, Inc. 49b7401e7Sjmmv# All rights reserved. 59b7401e7Sjmmv# 69b7401e7Sjmmv# Redistribution and use in source and binary forms, with or without 79b7401e7Sjmmv# modification, are permitted provided that the following conditions 89b7401e7Sjmmv# are met: 99b7401e7Sjmmv# 1. Redistributions of source code must retain the above copyright 109b7401e7Sjmmv# notice, this list of conditions and the following disclaimer. 119b7401e7Sjmmv# 2. Redistributions in binary form must reproduce the above copyright 129b7401e7Sjmmv# notice, this list of conditions and the following disclaimer in the 139b7401e7Sjmmv# documentation and/or other materials provided with the distribution. 149b7401e7Sjmmv# 159b7401e7Sjmmv# THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 169b7401e7Sjmmv# ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 179b7401e7Sjmmv# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 189b7401e7Sjmmv# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 199b7401e7Sjmmv# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 209b7401e7Sjmmv# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 219b7401e7Sjmmv# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 229b7401e7Sjmmv# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 239b7401e7Sjmmv# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 249b7401e7Sjmmv# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 259b7401e7Sjmmv# POSSIBILITY OF SUCH DAMAGE. 269b7401e7Sjmmv# 279b7401e7Sjmmv 289b7401e7Sjmmv# 299b7401e7Sjmmv# Verifies that the create operation works. 309b7401e7Sjmmv# 319b7401e7Sjmmv 329b7401e7Sjmmvatf_test_case create 339b7401e7Sjmmvcreate_head() { 349b7401e7Sjmmv atf_set "descr" "Verifies that files can be created" 359b7401e7Sjmmv atf_set "require.user" "root" 369b7401e7Sjmmv} 379b7401e7Sjmmvcreate_body() { 389b7401e7Sjmmv test_mount 399b7401e7Sjmmv 40*d8f5b04cSrillig atf_check -s exit:1 -o empty -e empty test -f a 41*d8f5b04cSrillig atf_check -s exit:0 -o empty -e empty touch a 42*d8f5b04cSrillig atf_check -s exit:0 -o empty -e empty test -f a 439b7401e7Sjmmv 449b7401e7Sjmmv test_unmount 459b7401e7Sjmmv} 469b7401e7Sjmmv 479b7401e7Sjmmvatf_test_case attrs 489b7401e7Sjmmvattrs_head() { 499b7401e7Sjmmv atf_set "descr" "Verifies that a new file gets the correct" \ 509b7401e7Sjmmv "attributes" 519b7401e7Sjmmv atf_set "require.config" "unprivileged-user" 529b7401e7Sjmmv atf_set "require.user" "root" 539b7401e7Sjmmv} 549b7401e7Sjmmvattrs_body() { 554adfadb2Spooka user=$(atf_config_get unprivileged-user) 569b7401e7Sjmmv # Allow the unprivileged user to access the work directory. 574adfadb2Spooka chown ${user} . 589b7401e7Sjmmv 599b7401e7Sjmmv test_mount 609b7401e7Sjmmv 619b7401e7Sjmmv umask 022 62*d8f5b04cSrillig atf_check -s exit:1 -o empty -e empty test -f a 63*d8f5b04cSrillig atf_check -s exit:0 -o empty -e empty touch a 64*d8f5b04cSrillig atf_check -s exit:0 -o empty -e empty test -f a 659b7401e7Sjmmv 669b7401e7Sjmmv eval $(stat -s . | sed -e 's|st_|dst_|g') 679b7401e7Sjmmv eval $(stat -s a) 689b7401e7Sjmmv test ${st_flags} -eq 0 || atf_fail "Incorrect flags" 699b7401e7Sjmmv test ${st_size} -eq 0 || atf_fail "Incorrect size" 709b7401e7Sjmmv test ${st_uid} -eq $(id -u) || atf_fail "Incorrect uid" 719b7401e7Sjmmv test ${st_gid} -eq ${dst_gid} || atf_fail "Incorrect gid" 729b7401e7Sjmmv test ${st_mode} = 0100644 || atf_fail "Incorrect mode" 739b7401e7Sjmmv 74*d8f5b04cSrillig atf_check -s exit:0 -o empty -e empty mkdir b c 759b7401e7Sjmmv 76*d8f5b04cSrillig atf_check -s exit:0 -o empty -e empty chown ${user}:0 b 779b7401e7Sjmmv eval $(stat -s b) 789b7401e7Sjmmv [ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner" 799b7401e7Sjmmv [ ${st_gid} -eq 0 ] || atf_fail "Incorrect group" 809b7401e7Sjmmv 81*d8f5b04cSrillig atf_check -s exit:0 -o empty -e empty chown ${user}:100 c 829b7401e7Sjmmv eval $(stat -s c) 839b7401e7Sjmmv [ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner" 849b7401e7Sjmmv [ ${st_gid} -eq 100 ] || atf_fail "Incorrect group" 859b7401e7Sjmmv 86*d8f5b04cSrillig atf_check -s exit:0 -o empty -e empty su -m ${user} -c 'touch b/a' 879b7401e7Sjmmv eval $(stat -s b/a) 889b7401e7Sjmmv [ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner" 899b7401e7Sjmmv [ ${st_gid} -eq 0 ] || atf_fail "Incorrect group" 909b7401e7Sjmmv 91*d8f5b04cSrillig atf_check -s exit:0 -o empty -e empty su -m ${user} -c 'touch c/a' 929b7401e7Sjmmv eval $(stat -s c/a) 939b7401e7Sjmmv [ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner" 949b7401e7Sjmmv [ ${st_gid} -eq 100 ] || atf_fail "Incorrect group" 959b7401e7Sjmmv 969b7401e7Sjmmv test_unmount 979b7401e7Sjmmv} 989b7401e7Sjmmv 999b7401e7Sjmmvatf_test_case kqueue 1009b7401e7Sjmmvkqueue_head() { 1019b7401e7Sjmmv atf_set "descr" "Verifies that creating a file raises the correct" \ 1029b7401e7Sjmmv "kqueue events" 1039b7401e7Sjmmv atf_set "require.user" "root" 1049b7401e7Sjmmv} 1059b7401e7Sjmmvkqueue_body() { 1069b7401e7Sjmmv test_mount 1079b7401e7Sjmmv 108*d8f5b04cSrillig atf_check -s exit:0 -o empty -e empty mkdir dir 1099b7401e7Sjmmv echo 'touch dir/a' | kqueue_monitor 1 dir 1109b7401e7Sjmmv kqueue_check dir NOTE_WRITE 1119b7401e7Sjmmv 1129b7401e7Sjmmv test_unmount 1139b7401e7Sjmmv} 1149b7401e7Sjmmv 1159b7401e7Sjmmvatf_init_test_cases() { 1169b7401e7Sjmmv . $(atf_get_srcdir)/../h_funcs.subr 1179b7401e7Sjmmv . $(atf_get_srcdir)/h_funcs.subr 1189b7401e7Sjmmv 1199b7401e7Sjmmv atf_add_test_case create 1209b7401e7Sjmmv atf_add_test_case attrs 1219b7401e7Sjmmv atf_add_test_case kqueue 1229b7401e7Sjmmv} 123