1*00b67f09SDavid van Moolenbroek /* $NetBSD: user_test.c,v 1.3 2014/12/10 04:38:03 christos Exp $ */
2*00b67f09SDavid van Moolenbroek
3*00b67f09SDavid van Moolenbroek /*
4*00b67f09SDavid van Moolenbroek * Automated Testing Framework (atf)
5*00b67f09SDavid van Moolenbroek *
6*00b67f09SDavid van Moolenbroek * Copyright (c) 2007 The NetBSD Foundation, Inc.
7*00b67f09SDavid van Moolenbroek * All rights reserved.
8*00b67f09SDavid van Moolenbroek *
9*00b67f09SDavid van Moolenbroek * Redistribution and use in source and binary forms, with or without
10*00b67f09SDavid van Moolenbroek * modification, are permitted provided that the following conditions
11*00b67f09SDavid van Moolenbroek * are met:
12*00b67f09SDavid van Moolenbroek * 1. Redistributions of source code must retain the above copyright
13*00b67f09SDavid van Moolenbroek * notice, this list of conditions and the following disclaimer.
14*00b67f09SDavid van Moolenbroek * 2. Redistributions in binary form must reproduce the above copyright
15*00b67f09SDavid van Moolenbroek * notice, this list of conditions and the following disclaimer in the
16*00b67f09SDavid van Moolenbroek * documentation and/or other materials provided with the distribution.
17*00b67f09SDavid van Moolenbroek *
18*00b67f09SDavid van Moolenbroek * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND
19*00b67f09SDavid van Moolenbroek * CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
20*00b67f09SDavid van Moolenbroek * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
21*00b67f09SDavid van Moolenbroek * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
22*00b67f09SDavid van Moolenbroek * IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY
23*00b67f09SDavid van Moolenbroek * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24*00b67f09SDavid van Moolenbroek * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
25*00b67f09SDavid van Moolenbroek * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26*00b67f09SDavid van Moolenbroek * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
27*00b67f09SDavid van Moolenbroek * IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
28*00b67f09SDavid van Moolenbroek * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
29*00b67f09SDavid van Moolenbroek * IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
30*00b67f09SDavid van Moolenbroek */
31*00b67f09SDavid van Moolenbroek
32*00b67f09SDavid van Moolenbroek #include <sys/param.h>
33*00b67f09SDavid van Moolenbroek #include <sys/types.h>
34*00b67f09SDavid van Moolenbroek
35*00b67f09SDavid van Moolenbroek #include <limits.h>
36*00b67f09SDavid van Moolenbroek #include <stdio.h>
37*00b67f09SDavid van Moolenbroek #include <unistd.h>
38*00b67f09SDavid van Moolenbroek
39*00b67f09SDavid van Moolenbroek #include <atf-c.h>
40*00b67f09SDavid van Moolenbroek
41*00b67f09SDavid van Moolenbroek #include "test_helpers.h"
42*00b67f09SDavid van Moolenbroek #include "user.h"
43*00b67f09SDavid van Moolenbroek
44*00b67f09SDavid van Moolenbroek /* ---------------------------------------------------------------------
45*00b67f09SDavid van Moolenbroek * Test cases for the free functions.
46*00b67f09SDavid van Moolenbroek * --------------------------------------------------------------------- */
47*00b67f09SDavid van Moolenbroek
48*00b67f09SDavid van Moolenbroek ATF_TC(euid);
ATF_TC_HEAD(euid,tc)49*00b67f09SDavid van Moolenbroek ATF_TC_HEAD(euid, tc)
50*00b67f09SDavid van Moolenbroek {
51*00b67f09SDavid van Moolenbroek atf_tc_set_md_var(tc, "descr", "Tests the atf_user_euid function");
52*00b67f09SDavid van Moolenbroek }
ATF_TC_BODY(euid,tc)53*00b67f09SDavid van Moolenbroek ATF_TC_BODY(euid, tc)
54*00b67f09SDavid van Moolenbroek {
55*00b67f09SDavid van Moolenbroek ATF_REQUIRE_EQ(atf_user_euid(), geteuid());
56*00b67f09SDavid van Moolenbroek }
57*00b67f09SDavid van Moolenbroek
58*00b67f09SDavid van Moolenbroek ATF_TC(is_member_of_group);
ATF_TC_HEAD(is_member_of_group,tc)59*00b67f09SDavid van Moolenbroek ATF_TC_HEAD(is_member_of_group, tc)
60*00b67f09SDavid van Moolenbroek {
61*00b67f09SDavid van Moolenbroek atf_tc_set_md_var(tc, "descr", "Tests the atf_user_is_member_of_group "
62*00b67f09SDavid van Moolenbroek "function");
63*00b67f09SDavid van Moolenbroek }
ATF_TC_BODY(is_member_of_group,tc)64*00b67f09SDavid van Moolenbroek ATF_TC_BODY(is_member_of_group, tc)
65*00b67f09SDavid van Moolenbroek {
66*00b67f09SDavid van Moolenbroek gid_t gids[NGROUPS_MAX];
67*00b67f09SDavid van Moolenbroek gid_t g, maxgid;
68*00b67f09SDavid van Moolenbroek int ngids;
69*00b67f09SDavid van Moolenbroek const gid_t maxgid_limit = 1 << 16;
70*00b67f09SDavid van Moolenbroek
71*00b67f09SDavid van Moolenbroek {
72*00b67f09SDavid van Moolenbroek int i;
73*00b67f09SDavid van Moolenbroek
74*00b67f09SDavid van Moolenbroek ngids = getgroups(NGROUPS_MAX, gids);
75*00b67f09SDavid van Moolenbroek if (ngids == -1)
76*00b67f09SDavid van Moolenbroek atf_tc_fail("Call to getgroups failed");
77*00b67f09SDavid van Moolenbroek maxgid = 0;
78*00b67f09SDavid van Moolenbroek for (i = 0; i < ngids; i++) {
79*00b67f09SDavid van Moolenbroek printf("User group %d is %u\n", i, gids[i]);
80*00b67f09SDavid van Moolenbroek if (maxgid < gids[i])
81*00b67f09SDavid van Moolenbroek maxgid = gids[i];
82*00b67f09SDavid van Moolenbroek }
83*00b67f09SDavid van Moolenbroek printf("User belongs to %d groups\n", ngids);
84*00b67f09SDavid van Moolenbroek printf("Last GID is %u\n", maxgid);
85*00b67f09SDavid van Moolenbroek }
86*00b67f09SDavid van Moolenbroek
87*00b67f09SDavid van Moolenbroek if (maxgid > maxgid_limit) {
88*00b67f09SDavid van Moolenbroek printf("Test truncated from %u groups to %u to keep the run time "
89*00b67f09SDavid van Moolenbroek "reasonable enough\n", maxgid, maxgid_limit);
90*00b67f09SDavid van Moolenbroek maxgid = maxgid_limit;
91*00b67f09SDavid van Moolenbroek }
92*00b67f09SDavid van Moolenbroek
93*00b67f09SDavid van Moolenbroek for (g = 0; g < maxgid; g++) {
94*00b67f09SDavid van Moolenbroek bool found = false;
95*00b67f09SDavid van Moolenbroek int i;
96*00b67f09SDavid van Moolenbroek
97*00b67f09SDavid van Moolenbroek for (i = 0; !found && i < ngids; i++) {
98*00b67f09SDavid van Moolenbroek if (gids[i] == g)
99*00b67f09SDavid van Moolenbroek found = true;
100*00b67f09SDavid van Moolenbroek }
101*00b67f09SDavid van Moolenbroek
102*00b67f09SDavid van Moolenbroek if (found) {
103*00b67f09SDavid van Moolenbroek printf("Checking if user belongs to group %d\n", g);
104*00b67f09SDavid van Moolenbroek ATF_REQUIRE(atf_user_is_member_of_group(g));
105*00b67f09SDavid van Moolenbroek } else {
106*00b67f09SDavid van Moolenbroek printf("Checking if user does not belong to group %d\n", g);
107*00b67f09SDavid van Moolenbroek ATF_REQUIRE(!atf_user_is_member_of_group(g));
108*00b67f09SDavid van Moolenbroek }
109*00b67f09SDavid van Moolenbroek }
110*00b67f09SDavid van Moolenbroek }
111*00b67f09SDavid van Moolenbroek
112*00b67f09SDavid van Moolenbroek ATF_TC(is_root);
ATF_TC_HEAD(is_root,tc)113*00b67f09SDavid van Moolenbroek ATF_TC_HEAD(is_root, tc)
114*00b67f09SDavid van Moolenbroek {
115*00b67f09SDavid van Moolenbroek atf_tc_set_md_var(tc, "descr", "Tests the atf_user_is_root function");
116*00b67f09SDavid van Moolenbroek }
ATF_TC_BODY(is_root,tc)117*00b67f09SDavid van Moolenbroek ATF_TC_BODY(is_root, tc)
118*00b67f09SDavid van Moolenbroek {
119*00b67f09SDavid van Moolenbroek if (geteuid() == 0)
120*00b67f09SDavid van Moolenbroek ATF_REQUIRE(atf_user_is_root());
121*00b67f09SDavid van Moolenbroek else
122*00b67f09SDavid van Moolenbroek ATF_REQUIRE(!atf_user_is_root());
123*00b67f09SDavid van Moolenbroek }
124*00b67f09SDavid van Moolenbroek
125*00b67f09SDavid van Moolenbroek ATF_TC(is_unprivileged);
ATF_TC_HEAD(is_unprivileged,tc)126*00b67f09SDavid van Moolenbroek ATF_TC_HEAD(is_unprivileged, tc)
127*00b67f09SDavid van Moolenbroek {
128*00b67f09SDavid van Moolenbroek atf_tc_set_md_var(tc, "descr", "Tests the atf_user_is_unprivileged "
129*00b67f09SDavid van Moolenbroek "function");
130*00b67f09SDavid van Moolenbroek }
ATF_TC_BODY(is_unprivileged,tc)131*00b67f09SDavid van Moolenbroek ATF_TC_BODY(is_unprivileged, tc)
132*00b67f09SDavid van Moolenbroek {
133*00b67f09SDavid van Moolenbroek if (geteuid() != 0)
134*00b67f09SDavid van Moolenbroek ATF_REQUIRE(atf_user_is_unprivileged());
135*00b67f09SDavid van Moolenbroek else
136*00b67f09SDavid van Moolenbroek ATF_REQUIRE(!atf_user_is_unprivileged());
137*00b67f09SDavid van Moolenbroek }
138*00b67f09SDavid van Moolenbroek
139*00b67f09SDavid van Moolenbroek /* ---------------------------------------------------------------------
140*00b67f09SDavid van Moolenbroek * Main.
141*00b67f09SDavid van Moolenbroek * --------------------------------------------------------------------- */
142*00b67f09SDavid van Moolenbroek
ATF_TP_ADD_TCS(tp)143*00b67f09SDavid van Moolenbroek ATF_TP_ADD_TCS(tp)
144*00b67f09SDavid van Moolenbroek {
145*00b67f09SDavid van Moolenbroek ATF_TP_ADD_TC(tp, euid);
146*00b67f09SDavid van Moolenbroek ATF_TP_ADD_TC(tp, is_member_of_group);
147*00b67f09SDavid van Moolenbroek ATF_TP_ADD_TC(tp, is_root);
148*00b67f09SDavid van Moolenbroek ATF_TP_ADD_TC(tp, is_unprivileged);
149*00b67f09SDavid van Moolenbroek
150*00b67f09SDavid van Moolenbroek return atf_no_error();
151*00b67f09SDavid van Moolenbroek }
152