xref: /netbsd-src/tests/fs/tmpfs/t_create.sh (revision d8f5b04c091e033c7c2978066c7b27dbd1aa9d53)
1*d8f5b04cSrillig# $NetBSD: t_create.sh,v 1.9 2024/04/28 07:27:41 rillig Exp $
29b7401e7Sjmmv#
3454557d7Sjmmv# Copyright (c) 2005, 2006, 2007, 2008 The NetBSD Foundation, Inc.
49b7401e7Sjmmv# All rights reserved.
59b7401e7Sjmmv#
69b7401e7Sjmmv# Redistribution and use in source and binary forms, with or without
79b7401e7Sjmmv# modification, are permitted provided that the following conditions
89b7401e7Sjmmv# are met:
99b7401e7Sjmmv# 1. Redistributions of source code must retain the above copyright
109b7401e7Sjmmv#    notice, this list of conditions and the following disclaimer.
119b7401e7Sjmmv# 2. Redistributions in binary form must reproduce the above copyright
129b7401e7Sjmmv#    notice, this list of conditions and the following disclaimer in the
139b7401e7Sjmmv#    documentation and/or other materials provided with the distribution.
149b7401e7Sjmmv#
159b7401e7Sjmmv# THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
169b7401e7Sjmmv# ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
179b7401e7Sjmmv# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
189b7401e7Sjmmv# PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
199b7401e7Sjmmv# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
209b7401e7Sjmmv# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
219b7401e7Sjmmv# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
229b7401e7Sjmmv# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
239b7401e7Sjmmv# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
249b7401e7Sjmmv# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
259b7401e7Sjmmv# POSSIBILITY OF SUCH DAMAGE.
269b7401e7Sjmmv#
279b7401e7Sjmmv
289b7401e7Sjmmv#
299b7401e7Sjmmv# Verifies that the create operation works.
309b7401e7Sjmmv#
319b7401e7Sjmmv
329b7401e7Sjmmvatf_test_case create
339b7401e7Sjmmvcreate_head() {
349b7401e7Sjmmv	atf_set "descr" "Verifies that files can be created"
359b7401e7Sjmmv	atf_set "require.user" "root"
369b7401e7Sjmmv}
379b7401e7Sjmmvcreate_body() {
389b7401e7Sjmmv	test_mount
399b7401e7Sjmmv
40*d8f5b04cSrillig	atf_check -s exit:1 -o empty -e empty test -f a
41*d8f5b04cSrillig	atf_check -s exit:0 -o empty -e empty touch a
42*d8f5b04cSrillig	atf_check -s exit:0 -o empty -e empty test -f a
439b7401e7Sjmmv
449b7401e7Sjmmv	test_unmount
459b7401e7Sjmmv}
469b7401e7Sjmmv
479b7401e7Sjmmvatf_test_case attrs
489b7401e7Sjmmvattrs_head() {
499b7401e7Sjmmv	atf_set "descr" "Verifies that a new file gets the correct" \
509b7401e7Sjmmv	                "attributes"
519b7401e7Sjmmv	atf_set "require.config" "unprivileged-user"
529b7401e7Sjmmv	atf_set "require.user" "root"
539b7401e7Sjmmv}
549b7401e7Sjmmvattrs_body() {
554adfadb2Spooka	user=$(atf_config_get unprivileged-user)
569b7401e7Sjmmv	# Allow the unprivileged user to access the work directory.
574adfadb2Spooka	chown ${user} .
589b7401e7Sjmmv
599b7401e7Sjmmv	test_mount
609b7401e7Sjmmv
619b7401e7Sjmmv	umask 022
62*d8f5b04cSrillig	atf_check -s exit:1 -o empty -e empty test -f a
63*d8f5b04cSrillig	atf_check -s exit:0 -o empty -e empty touch a
64*d8f5b04cSrillig	atf_check -s exit:0 -o empty -e empty test -f a
659b7401e7Sjmmv
669b7401e7Sjmmv	eval $(stat -s . | sed -e 's|st_|dst_|g')
679b7401e7Sjmmv	eval $(stat -s a)
689b7401e7Sjmmv	test ${st_flags} -eq 0 || atf_fail "Incorrect flags"
699b7401e7Sjmmv	test ${st_size} -eq 0 || atf_fail "Incorrect size"
709b7401e7Sjmmv	test ${st_uid} -eq $(id -u) || atf_fail "Incorrect uid"
719b7401e7Sjmmv	test ${st_gid} -eq ${dst_gid} || atf_fail "Incorrect gid"
729b7401e7Sjmmv	test ${st_mode} = 0100644 || atf_fail "Incorrect mode"
739b7401e7Sjmmv
74*d8f5b04cSrillig	atf_check -s exit:0 -o empty -e empty mkdir b c
759b7401e7Sjmmv
76*d8f5b04cSrillig	atf_check -s exit:0 -o empty -e empty chown ${user}:0 b
779b7401e7Sjmmv	eval $(stat -s b)
789b7401e7Sjmmv	[ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner"
799b7401e7Sjmmv	[ ${st_gid} -eq 0 ] || atf_fail "Incorrect group"
809b7401e7Sjmmv
81*d8f5b04cSrillig	atf_check -s exit:0 -o empty -e empty chown ${user}:100 c
829b7401e7Sjmmv	eval $(stat -s c)
839b7401e7Sjmmv	[ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner"
849b7401e7Sjmmv	[ ${st_gid} -eq 100 ] || atf_fail "Incorrect group"
859b7401e7Sjmmv
86*d8f5b04cSrillig	atf_check -s exit:0 -o empty -e empty su -m ${user} -c 'touch b/a'
879b7401e7Sjmmv	eval $(stat -s b/a)
889b7401e7Sjmmv	[ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner"
899b7401e7Sjmmv	[ ${st_gid} -eq 0 ] || atf_fail "Incorrect group"
909b7401e7Sjmmv
91*d8f5b04cSrillig	atf_check -s exit:0 -o empty -e empty su -m ${user} -c 'touch c/a'
929b7401e7Sjmmv	eval $(stat -s c/a)
939b7401e7Sjmmv	[ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner"
949b7401e7Sjmmv	[ ${st_gid} -eq 100 ] || atf_fail "Incorrect group"
959b7401e7Sjmmv
969b7401e7Sjmmv	test_unmount
979b7401e7Sjmmv}
989b7401e7Sjmmv
999b7401e7Sjmmvatf_test_case kqueue
1009b7401e7Sjmmvkqueue_head() {
1019b7401e7Sjmmv	atf_set "descr" "Verifies that creating a file raises the correct" \
1029b7401e7Sjmmv	                "kqueue events"
1039b7401e7Sjmmv	atf_set "require.user" "root"
1049b7401e7Sjmmv}
1059b7401e7Sjmmvkqueue_body() {
1069b7401e7Sjmmv	test_mount
1079b7401e7Sjmmv
108*d8f5b04cSrillig	atf_check -s exit:0 -o empty -e empty mkdir dir
1099b7401e7Sjmmv	echo 'touch dir/a' | kqueue_monitor 1 dir
1109b7401e7Sjmmv	kqueue_check dir NOTE_WRITE
1119b7401e7Sjmmv
1129b7401e7Sjmmv	test_unmount
1139b7401e7Sjmmv}
1149b7401e7Sjmmv
1159b7401e7Sjmmvatf_init_test_cases() {
1169b7401e7Sjmmv	. $(atf_get_srcdir)/../h_funcs.subr
1179b7401e7Sjmmv	. $(atf_get_srcdir)/h_funcs.subr
1189b7401e7Sjmmv
1199b7401e7Sjmmv	atf_add_test_case create
1209b7401e7Sjmmv	atf_add_test_case attrs
1219b7401e7Sjmmv	atf_add_test_case kqueue
1229b7401e7Sjmmv}
123