xref: /minix3/external/bsd/bind/dist/unit/atf-src/atf-c/detail/user_test.c (revision 00b67f09dd46474d133c95011a48590a8e8f94c7)
1*00b67f09SDavid van Moolenbroek /*	$NetBSD: user_test.c,v 1.3 2014/12/10 04:38:03 christos Exp $	*/
2*00b67f09SDavid van Moolenbroek 
3*00b67f09SDavid van Moolenbroek /*
4*00b67f09SDavid van Moolenbroek  * Automated Testing Framework (atf)
5*00b67f09SDavid van Moolenbroek  *
6*00b67f09SDavid van Moolenbroek  * Copyright (c) 2007 The NetBSD Foundation, Inc.
7*00b67f09SDavid van Moolenbroek  * All rights reserved.
8*00b67f09SDavid van Moolenbroek  *
9*00b67f09SDavid van Moolenbroek  * Redistribution and use in source and binary forms, with or without
10*00b67f09SDavid van Moolenbroek  * modification, are permitted provided that the following conditions
11*00b67f09SDavid van Moolenbroek  * are met:
12*00b67f09SDavid van Moolenbroek  * 1. Redistributions of source code must retain the above copyright
13*00b67f09SDavid van Moolenbroek  *    notice, this list of conditions and the following disclaimer.
14*00b67f09SDavid van Moolenbroek  * 2. Redistributions in binary form must reproduce the above copyright
15*00b67f09SDavid van Moolenbroek  *    notice, this list of conditions and the following disclaimer in the
16*00b67f09SDavid van Moolenbroek  *    documentation and/or other materials provided with the distribution.
17*00b67f09SDavid van Moolenbroek  *
18*00b67f09SDavid van Moolenbroek  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND
19*00b67f09SDavid van Moolenbroek  * CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
20*00b67f09SDavid van Moolenbroek  * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
21*00b67f09SDavid van Moolenbroek  * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
22*00b67f09SDavid van Moolenbroek  * IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY
23*00b67f09SDavid van Moolenbroek  * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24*00b67f09SDavid van Moolenbroek  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
25*00b67f09SDavid van Moolenbroek  * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26*00b67f09SDavid van Moolenbroek  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
27*00b67f09SDavid van Moolenbroek  * IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
28*00b67f09SDavid van Moolenbroek  * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
29*00b67f09SDavid van Moolenbroek  * IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
30*00b67f09SDavid van Moolenbroek  */
31*00b67f09SDavid van Moolenbroek 
32*00b67f09SDavid van Moolenbroek #include <sys/param.h>
33*00b67f09SDavid van Moolenbroek #include <sys/types.h>
34*00b67f09SDavid van Moolenbroek 
35*00b67f09SDavid van Moolenbroek #include <limits.h>
36*00b67f09SDavid van Moolenbroek #include <stdio.h>
37*00b67f09SDavid van Moolenbroek #include <unistd.h>
38*00b67f09SDavid van Moolenbroek 
39*00b67f09SDavid van Moolenbroek #include <atf-c.h>
40*00b67f09SDavid van Moolenbroek 
41*00b67f09SDavid van Moolenbroek #include "test_helpers.h"
42*00b67f09SDavid van Moolenbroek #include "user.h"
43*00b67f09SDavid van Moolenbroek 
44*00b67f09SDavid van Moolenbroek /* ---------------------------------------------------------------------
45*00b67f09SDavid van Moolenbroek  * Test cases for the free functions.
46*00b67f09SDavid van Moolenbroek  * --------------------------------------------------------------------- */
47*00b67f09SDavid van Moolenbroek 
48*00b67f09SDavid van Moolenbroek ATF_TC(euid);
ATF_TC_HEAD(euid,tc)49*00b67f09SDavid van Moolenbroek ATF_TC_HEAD(euid, tc)
50*00b67f09SDavid van Moolenbroek {
51*00b67f09SDavid van Moolenbroek     atf_tc_set_md_var(tc, "descr", "Tests the atf_user_euid function");
52*00b67f09SDavid van Moolenbroek }
ATF_TC_BODY(euid,tc)53*00b67f09SDavid van Moolenbroek ATF_TC_BODY(euid, tc)
54*00b67f09SDavid van Moolenbroek {
55*00b67f09SDavid van Moolenbroek     ATF_REQUIRE_EQ(atf_user_euid(), geteuid());
56*00b67f09SDavid van Moolenbroek }
57*00b67f09SDavid van Moolenbroek 
58*00b67f09SDavid van Moolenbroek ATF_TC(is_member_of_group);
ATF_TC_HEAD(is_member_of_group,tc)59*00b67f09SDavid van Moolenbroek ATF_TC_HEAD(is_member_of_group, tc)
60*00b67f09SDavid van Moolenbroek {
61*00b67f09SDavid van Moolenbroek     atf_tc_set_md_var(tc, "descr", "Tests the atf_user_is_member_of_group "
62*00b67f09SDavid van Moolenbroek                       "function");
63*00b67f09SDavid van Moolenbroek }
ATF_TC_BODY(is_member_of_group,tc)64*00b67f09SDavid van Moolenbroek ATF_TC_BODY(is_member_of_group, tc)
65*00b67f09SDavid van Moolenbroek {
66*00b67f09SDavid van Moolenbroek     gid_t gids[NGROUPS_MAX];
67*00b67f09SDavid van Moolenbroek     gid_t g, maxgid;
68*00b67f09SDavid van Moolenbroek     int ngids;
69*00b67f09SDavid van Moolenbroek     const gid_t maxgid_limit = 1 << 16;
70*00b67f09SDavid van Moolenbroek 
71*00b67f09SDavid van Moolenbroek     {
72*00b67f09SDavid van Moolenbroek         int i;
73*00b67f09SDavid van Moolenbroek 
74*00b67f09SDavid van Moolenbroek         ngids = getgroups(NGROUPS_MAX, gids);
75*00b67f09SDavid van Moolenbroek         if (ngids == -1)
76*00b67f09SDavid van Moolenbroek             atf_tc_fail("Call to getgroups failed");
77*00b67f09SDavid van Moolenbroek         maxgid = 0;
78*00b67f09SDavid van Moolenbroek         for (i = 0; i < ngids; i++) {
79*00b67f09SDavid van Moolenbroek             printf("User group %d is %u\n", i, gids[i]);
80*00b67f09SDavid van Moolenbroek             if (maxgid < gids[i])
81*00b67f09SDavid van Moolenbroek                 maxgid = gids[i];
82*00b67f09SDavid van Moolenbroek         }
83*00b67f09SDavid van Moolenbroek         printf("User belongs to %d groups\n", ngids);
84*00b67f09SDavid van Moolenbroek         printf("Last GID is %u\n", maxgid);
85*00b67f09SDavid van Moolenbroek     }
86*00b67f09SDavid van Moolenbroek 
87*00b67f09SDavid van Moolenbroek     if (maxgid > maxgid_limit) {
88*00b67f09SDavid van Moolenbroek         printf("Test truncated from %u groups to %u to keep the run time "
89*00b67f09SDavid van Moolenbroek                "reasonable enough\n", maxgid, maxgid_limit);
90*00b67f09SDavid van Moolenbroek         maxgid = maxgid_limit;
91*00b67f09SDavid van Moolenbroek     }
92*00b67f09SDavid van Moolenbroek 
93*00b67f09SDavid van Moolenbroek     for (g = 0; g < maxgid; g++) {
94*00b67f09SDavid van Moolenbroek         bool found = false;
95*00b67f09SDavid van Moolenbroek         int i;
96*00b67f09SDavid van Moolenbroek 
97*00b67f09SDavid van Moolenbroek         for (i = 0; !found && i < ngids; i++) {
98*00b67f09SDavid van Moolenbroek             if (gids[i] == g)
99*00b67f09SDavid van Moolenbroek                 found = true;
100*00b67f09SDavid van Moolenbroek         }
101*00b67f09SDavid van Moolenbroek 
102*00b67f09SDavid van Moolenbroek         if (found) {
103*00b67f09SDavid van Moolenbroek             printf("Checking if user belongs to group %d\n", g);
104*00b67f09SDavid van Moolenbroek             ATF_REQUIRE(atf_user_is_member_of_group(g));
105*00b67f09SDavid van Moolenbroek         } else {
106*00b67f09SDavid van Moolenbroek             printf("Checking if user does not belong to group %d\n", g);
107*00b67f09SDavid van Moolenbroek             ATF_REQUIRE(!atf_user_is_member_of_group(g));
108*00b67f09SDavid van Moolenbroek         }
109*00b67f09SDavid van Moolenbroek     }
110*00b67f09SDavid van Moolenbroek }
111*00b67f09SDavid van Moolenbroek 
112*00b67f09SDavid van Moolenbroek ATF_TC(is_root);
ATF_TC_HEAD(is_root,tc)113*00b67f09SDavid van Moolenbroek ATF_TC_HEAD(is_root, tc)
114*00b67f09SDavid van Moolenbroek {
115*00b67f09SDavid van Moolenbroek     atf_tc_set_md_var(tc, "descr", "Tests the atf_user_is_root function");
116*00b67f09SDavid van Moolenbroek }
ATF_TC_BODY(is_root,tc)117*00b67f09SDavid van Moolenbroek ATF_TC_BODY(is_root, tc)
118*00b67f09SDavid van Moolenbroek {
119*00b67f09SDavid van Moolenbroek     if (geteuid() == 0)
120*00b67f09SDavid van Moolenbroek         ATF_REQUIRE(atf_user_is_root());
121*00b67f09SDavid van Moolenbroek     else
122*00b67f09SDavid van Moolenbroek         ATF_REQUIRE(!atf_user_is_root());
123*00b67f09SDavid van Moolenbroek }
124*00b67f09SDavid van Moolenbroek 
125*00b67f09SDavid van Moolenbroek ATF_TC(is_unprivileged);
ATF_TC_HEAD(is_unprivileged,tc)126*00b67f09SDavid van Moolenbroek ATF_TC_HEAD(is_unprivileged, tc)
127*00b67f09SDavid van Moolenbroek {
128*00b67f09SDavid van Moolenbroek     atf_tc_set_md_var(tc, "descr", "Tests the atf_user_is_unprivileged "
129*00b67f09SDavid van Moolenbroek                       "function");
130*00b67f09SDavid van Moolenbroek }
ATF_TC_BODY(is_unprivileged,tc)131*00b67f09SDavid van Moolenbroek ATF_TC_BODY(is_unprivileged, tc)
132*00b67f09SDavid van Moolenbroek {
133*00b67f09SDavid van Moolenbroek     if (geteuid() != 0)
134*00b67f09SDavid van Moolenbroek         ATF_REQUIRE(atf_user_is_unprivileged());
135*00b67f09SDavid van Moolenbroek     else
136*00b67f09SDavid van Moolenbroek         ATF_REQUIRE(!atf_user_is_unprivileged());
137*00b67f09SDavid van Moolenbroek }
138*00b67f09SDavid van Moolenbroek 
139*00b67f09SDavid van Moolenbroek /* ---------------------------------------------------------------------
140*00b67f09SDavid van Moolenbroek  * Main.
141*00b67f09SDavid van Moolenbroek  * --------------------------------------------------------------------- */
142*00b67f09SDavid van Moolenbroek 
ATF_TP_ADD_TCS(tp)143*00b67f09SDavid van Moolenbroek ATF_TP_ADD_TCS(tp)
144*00b67f09SDavid van Moolenbroek {
145*00b67f09SDavid van Moolenbroek     ATF_TP_ADD_TC(tp, euid);
146*00b67f09SDavid van Moolenbroek     ATF_TP_ADD_TC(tp, is_member_of_group);
147*00b67f09SDavid van Moolenbroek     ATF_TP_ADD_TC(tp, is_root);
148*00b67f09SDavid van Moolenbroek     ATF_TP_ADD_TC(tp, is_unprivileged);
149*00b67f09SDavid van Moolenbroek 
150*00b67f09SDavid van Moolenbroek     return atf_no_error();
151*00b67f09SDavid van Moolenbroek }
152