1*00b67f09SDavid van Moolenbroek //
2*00b67f09SDavid van Moolenbroek // Automated Testing Framework (atf)
3*00b67f09SDavid van Moolenbroek //
4*00b67f09SDavid van Moolenbroek // Copyright (c) 2007 The NetBSD Foundation, Inc.
5*00b67f09SDavid van Moolenbroek // All rights reserved.
6*00b67f09SDavid van Moolenbroek //
7*00b67f09SDavid van Moolenbroek // Redistribution and use in source and binary forms, with or without
8*00b67f09SDavid van Moolenbroek // modification, are permitted provided that the following conditions
9*00b67f09SDavid van Moolenbroek // are met:
10*00b67f09SDavid van Moolenbroek // 1. Redistributions of source code must retain the above copyright
11*00b67f09SDavid van Moolenbroek // notice, this list of conditions and the following disclaimer.
12*00b67f09SDavid van Moolenbroek // 2. Redistributions in binary form must reproduce the above copyright
13*00b67f09SDavid van Moolenbroek // notice, this list of conditions and the following disclaimer in the
14*00b67f09SDavid van Moolenbroek // documentation and/or other materials provided with the distribution.
15*00b67f09SDavid van Moolenbroek //
16*00b67f09SDavid van Moolenbroek // THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND
17*00b67f09SDavid van Moolenbroek // CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
18*00b67f09SDavid van Moolenbroek // INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
19*00b67f09SDavid van Moolenbroek // MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20*00b67f09SDavid van Moolenbroek // IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY
21*00b67f09SDavid van Moolenbroek // DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22*00b67f09SDavid van Moolenbroek // DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
23*00b67f09SDavid van Moolenbroek // GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
24*00b67f09SDavid van Moolenbroek // INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
25*00b67f09SDavid van Moolenbroek // IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
26*00b67f09SDavid van Moolenbroek // OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
27*00b67f09SDavid van Moolenbroek // IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
28*00b67f09SDavid van Moolenbroek //
29*00b67f09SDavid van Moolenbroek
30*00b67f09SDavid van Moolenbroek extern "C" {
31*00b67f09SDavid van Moolenbroek #include <sys/param.h>
32*00b67f09SDavid van Moolenbroek #include <sys/types.h>
33*00b67f09SDavid van Moolenbroek #include <limits.h>
34*00b67f09SDavid van Moolenbroek #include <unistd.h>
35*00b67f09SDavid van Moolenbroek }
36*00b67f09SDavid van Moolenbroek
37*00b67f09SDavid van Moolenbroek #include <iostream>
38*00b67f09SDavid van Moolenbroek #include <set>
39*00b67f09SDavid van Moolenbroek
40*00b67f09SDavid van Moolenbroek #include "../atf-c++/macros.hpp"
41*00b67f09SDavid van Moolenbroek
42*00b67f09SDavid van Moolenbroek #include "user.hpp"
43*00b67f09SDavid van Moolenbroek
44*00b67f09SDavid van Moolenbroek // ------------------------------------------------------------------------
45*00b67f09SDavid van Moolenbroek // Test cases for the free functions.
46*00b67f09SDavid van Moolenbroek // ------------------------------------------------------------------------
47*00b67f09SDavid van Moolenbroek
48*00b67f09SDavid van Moolenbroek ATF_TEST_CASE(euid);
ATF_TEST_CASE_HEAD(euid)49*00b67f09SDavid van Moolenbroek ATF_TEST_CASE_HEAD(euid)
50*00b67f09SDavid van Moolenbroek {
51*00b67f09SDavid van Moolenbroek set_md_var("descr", "Tests the euid function");
52*00b67f09SDavid van Moolenbroek }
ATF_TEST_CASE_BODY(euid)53*00b67f09SDavid van Moolenbroek ATF_TEST_CASE_BODY(euid)
54*00b67f09SDavid van Moolenbroek {
55*00b67f09SDavid van Moolenbroek using atf::atf_run::euid;
56*00b67f09SDavid van Moolenbroek
57*00b67f09SDavid van Moolenbroek ATF_REQUIRE_EQ(euid(), ::geteuid());
58*00b67f09SDavid van Moolenbroek }
59*00b67f09SDavid van Moolenbroek
60*00b67f09SDavid van Moolenbroek ATF_TEST_CASE(is_member_of_group);
ATF_TEST_CASE_HEAD(is_member_of_group)61*00b67f09SDavid van Moolenbroek ATF_TEST_CASE_HEAD(is_member_of_group)
62*00b67f09SDavid van Moolenbroek {
63*00b67f09SDavid van Moolenbroek set_md_var("descr", "Tests the is_member_of_group function");
64*00b67f09SDavid van Moolenbroek }
ATF_TEST_CASE_BODY(is_member_of_group)65*00b67f09SDavid van Moolenbroek ATF_TEST_CASE_BODY(is_member_of_group)
66*00b67f09SDavid van Moolenbroek {
67*00b67f09SDavid van Moolenbroek using atf::atf_run::is_member_of_group;
68*00b67f09SDavid van Moolenbroek
69*00b67f09SDavid van Moolenbroek std::set< gid_t > groups;
70*00b67f09SDavid van Moolenbroek gid_t maxgid = 0;
71*00b67f09SDavid van Moolenbroek {
72*00b67f09SDavid van Moolenbroek gid_t gids[NGROUPS_MAX];
73*00b67f09SDavid van Moolenbroek int ngids = ::getgroups(NGROUPS_MAX, gids);
74*00b67f09SDavid van Moolenbroek if (ngids == -1)
75*00b67f09SDavid van Moolenbroek ATF_FAIL("Call to ::getgroups failed");
76*00b67f09SDavid van Moolenbroek for (int i = 0; i < ngids; i++) {
77*00b67f09SDavid van Moolenbroek groups.insert(gids[i]);
78*00b67f09SDavid van Moolenbroek if (gids[i] > maxgid)
79*00b67f09SDavid van Moolenbroek maxgid = gids[i];
80*00b67f09SDavid van Moolenbroek }
81*00b67f09SDavid van Moolenbroek std::cout << "User belongs to " << ngids << " groups\n";
82*00b67f09SDavid van Moolenbroek std::cout << "Last GID is " << maxgid << "\n";
83*00b67f09SDavid van Moolenbroek }
84*00b67f09SDavid van Moolenbroek
85*00b67f09SDavid van Moolenbroek const gid_t maxgid_limit = 1 << 16;
86*00b67f09SDavid van Moolenbroek if (maxgid > maxgid_limit) {
87*00b67f09SDavid van Moolenbroek std::cout << "Test truncated from " << maxgid << " groups to "
88*00b67f09SDavid van Moolenbroek << maxgid_limit << " to keep the run time reasonable "
89*00b67f09SDavid van Moolenbroek "enough\n";
90*00b67f09SDavid van Moolenbroek maxgid = maxgid_limit;
91*00b67f09SDavid van Moolenbroek }
92*00b67f09SDavid van Moolenbroek
93*00b67f09SDavid van Moolenbroek for (gid_t g = 0; g <= maxgid; g++) {
94*00b67f09SDavid van Moolenbroek if (groups.find(g) == groups.end()) {
95*00b67f09SDavid van Moolenbroek std::cout << "Checking if user does not belong to group "
96*00b67f09SDavid van Moolenbroek << g << "\n";
97*00b67f09SDavid van Moolenbroek ATF_REQUIRE(!is_member_of_group(g));
98*00b67f09SDavid van Moolenbroek } else {
99*00b67f09SDavid van Moolenbroek std::cout << "Checking if user belongs to group " << g << "\n";
100*00b67f09SDavid van Moolenbroek ATF_REQUIRE(is_member_of_group(g));
101*00b67f09SDavid van Moolenbroek }
102*00b67f09SDavid van Moolenbroek }
103*00b67f09SDavid van Moolenbroek }
104*00b67f09SDavid van Moolenbroek
105*00b67f09SDavid van Moolenbroek ATF_TEST_CASE(is_root);
ATF_TEST_CASE_HEAD(is_root)106*00b67f09SDavid van Moolenbroek ATF_TEST_CASE_HEAD(is_root)
107*00b67f09SDavid van Moolenbroek {
108*00b67f09SDavid van Moolenbroek set_md_var("descr", "Tests the is_root function");
109*00b67f09SDavid van Moolenbroek }
ATF_TEST_CASE_BODY(is_root)110*00b67f09SDavid van Moolenbroek ATF_TEST_CASE_BODY(is_root)
111*00b67f09SDavid van Moolenbroek {
112*00b67f09SDavid van Moolenbroek using atf::atf_run::is_root;
113*00b67f09SDavid van Moolenbroek
114*00b67f09SDavid van Moolenbroek if (::geteuid() == 0) {
115*00b67f09SDavid van Moolenbroek ATF_REQUIRE(is_root());
116*00b67f09SDavid van Moolenbroek } else {
117*00b67f09SDavid van Moolenbroek ATF_REQUIRE(!is_root());
118*00b67f09SDavid van Moolenbroek }
119*00b67f09SDavid van Moolenbroek }
120*00b67f09SDavid van Moolenbroek
121*00b67f09SDavid van Moolenbroek ATF_TEST_CASE(is_unprivileged);
ATF_TEST_CASE_HEAD(is_unprivileged)122*00b67f09SDavid van Moolenbroek ATF_TEST_CASE_HEAD(is_unprivileged)
123*00b67f09SDavid van Moolenbroek {
124*00b67f09SDavid van Moolenbroek set_md_var("descr", "Tests the is_unprivileged function");
125*00b67f09SDavid van Moolenbroek }
ATF_TEST_CASE_BODY(is_unprivileged)126*00b67f09SDavid van Moolenbroek ATF_TEST_CASE_BODY(is_unprivileged)
127*00b67f09SDavid van Moolenbroek {
128*00b67f09SDavid van Moolenbroek using atf::atf_run::is_unprivileged;
129*00b67f09SDavid van Moolenbroek
130*00b67f09SDavid van Moolenbroek if (::geteuid() != 0) {
131*00b67f09SDavid van Moolenbroek ATF_REQUIRE(is_unprivileged());
132*00b67f09SDavid van Moolenbroek } else {
133*00b67f09SDavid van Moolenbroek ATF_REQUIRE(!is_unprivileged());
134*00b67f09SDavid van Moolenbroek }
135*00b67f09SDavid van Moolenbroek }
136*00b67f09SDavid van Moolenbroek
137*00b67f09SDavid van Moolenbroek // ------------------------------------------------------------------------
138*00b67f09SDavid van Moolenbroek // Main.
139*00b67f09SDavid van Moolenbroek // ------------------------------------------------------------------------
140*00b67f09SDavid van Moolenbroek
ATF_INIT_TEST_CASES(tcs)141*00b67f09SDavid van Moolenbroek ATF_INIT_TEST_CASES(tcs)
142*00b67f09SDavid van Moolenbroek {
143*00b67f09SDavid van Moolenbroek // Add the tests for the free functions.
144*00b67f09SDavid van Moolenbroek ATF_ADD_TEST_CASE(tcs, euid);
145*00b67f09SDavid van Moolenbroek ATF_ADD_TEST_CASE(tcs, is_member_of_group);
146*00b67f09SDavid van Moolenbroek ATF_ADD_TEST_CASE(tcs, is_root);
147*00b67f09SDavid van Moolenbroek ATF_ADD_TEST_CASE(tcs, is_unprivileged);
148*00b67f09SDavid van Moolenbroek }
149