247 lines
		
	
	
		
			7.4 KiB
		
	
	
	
		
			C++
		
	
	
	
			
		
		
	
	
			247 lines
		
	
	
		
			7.4 KiB
		
	
	
	
		
			C++
		
	
	
	
| /*
 | |
|  * Copyright (C) 2018 The Android Open Source Project
 | |
|  *
 | |
|  * Licensed under the Apache License, Version 2.0 (the "License");
 | |
|  * you may not use this file except in compliance with the License.
 | |
|  * You may obtain a copy of the License at
 | |
|  *
 | |
|  *      http://www.apache.org/licenses/LICENSE-2.0
 | |
|  *
 | |
|  * Unless required by applicable law or agreed to in writing, software
 | |
|  * distributed under the License is distributed on an "AS IS" BASIS,
 | |
|  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|  * See the License for the specific language governing permissions and
 | |
|  * limitations under the License.
 | |
|  */
 | |
| 
 | |
| #include <unistd.h>
 | |
| 
 | |
| #include <gtest/gtest.h>
 | |
| 
 | |
| #include <android-base/file.h>
 | |
| 
 | |
| #if defined(__BIONIC__)
 | |
| #include "../libc/bionic/grp_pwd_file.cpp"
 | |
| 
 | |
| template <typename T>
 | |
| class FileUnmapper {
 | |
|  public:
 | |
|   explicit FileUnmapper(T& file) : file_(file) {
 | |
|   }
 | |
|   ~FileUnmapper() {
 | |
|     file_.Unmap();
 | |
|   }
 | |
| 
 | |
|  private:
 | |
|   T& file_;
 | |
| };
 | |
| 
 | |
| void FindAndCheckPasswdEntry(PasswdFile* file, const char* name, uid_t uid, gid_t gid,
 | |
|                              const char* dir, const char* shell) {
 | |
|   passwd_state_t name_passwd_state;
 | |
|   ASSERT_TRUE(file->FindByName(name, &name_passwd_state)) << name;
 | |
| 
 | |
|   passwd& name_passwd = name_passwd_state.passwd_;
 | |
|   EXPECT_STREQ(name, name_passwd.pw_name);
 | |
|   EXPECT_EQ(nullptr, name_passwd.pw_passwd);
 | |
|   EXPECT_EQ(uid, name_passwd.pw_uid);
 | |
|   EXPECT_EQ(gid, name_passwd.pw_gid);
 | |
|   EXPECT_EQ(nullptr, name_passwd.pw_gecos);
 | |
|   EXPECT_STREQ(dir, name_passwd.pw_dir);
 | |
|   EXPECT_STREQ(shell, name_passwd.pw_shell);
 | |
| 
 | |
|   passwd_state_t id_passwd_state;
 | |
|   ASSERT_TRUE(file->FindById(uid, &id_passwd_state)) << uid;
 | |
| 
 | |
|   passwd& id_passwd = id_passwd_state.passwd_;
 | |
|   EXPECT_STREQ(name, id_passwd.pw_name);
 | |
|   EXPECT_EQ(nullptr, id_passwd.pw_passwd);
 | |
|   EXPECT_EQ(uid, id_passwd.pw_uid);
 | |
|   EXPECT_EQ(gid, id_passwd.pw_gid);
 | |
|   EXPECT_EQ(nullptr, id_passwd.pw_gecos);
 | |
|   EXPECT_STREQ(dir, id_passwd.pw_dir);
 | |
|   EXPECT_STREQ(shell, id_passwd.pw_shell);
 | |
| }
 | |
| 
 | |
| void FindAndCheckGroupEntry(GroupFile* file, const char* name, gid_t gid) {
 | |
|   group_state_t name_group_state;
 | |
|   ASSERT_TRUE(file->FindByName(name, &name_group_state)) << name;
 | |
| 
 | |
|   group& name_group = name_group_state.group_;
 | |
|   EXPECT_STREQ(name, name_group.gr_name);
 | |
|   EXPECT_EQ(nullptr, name_group.gr_passwd);
 | |
|   EXPECT_EQ(gid, name_group.gr_gid);
 | |
|   EXPECT_EQ(name_group.gr_name, name_group.gr_mem[0]);
 | |
|   EXPECT_EQ(nullptr, name_group.gr_mem[1]);
 | |
| 
 | |
|   group_state_t id_group_state;
 | |
|   ASSERT_TRUE(file->FindById(gid, &id_group_state)) << gid;
 | |
| 
 | |
|   group& id_group = id_group_state.group_;
 | |
|   EXPECT_STREQ(name, id_group.gr_name);
 | |
|   EXPECT_EQ(nullptr, id_group.gr_passwd);
 | |
|   EXPECT_EQ(gid, id_group.gr_gid);
 | |
|   EXPECT_EQ(id_group.gr_name, id_group.gr_mem[0]);
 | |
|   EXPECT_EQ(nullptr, id_group.gr_mem[1]);
 | |
| }
 | |
| 
 | |
| #endif  // __BIONIC__
 | |
| 
 | |
| TEST(grp_pwd_file, passwd_file_one_entry) {
 | |
| #if defined(__BIONIC__)
 | |
|   TemporaryFile file;
 | |
|   ASSERT_NE(-1, file.fd);
 | |
|   static const char test_string[] = "name:password:1:2:user_info:dir:shell\n";
 | |
|   write(file.fd, test_string, sizeof(test_string) - 1);
 | |
| 
 | |
|   PasswdFile passwd_file(file.path, nullptr);
 | |
|   FileUnmapper unmapper(passwd_file);
 | |
| 
 | |
|   FindAndCheckPasswdEntry(&passwd_file, "name", 1, 2, "dir", "shell");
 | |
| 
 | |
|   EXPECT_FALSE(passwd_file.FindByName("not_name", nullptr));
 | |
|   EXPECT_FALSE(passwd_file.FindById(3, nullptr));
 | |
| 
 | |
| #else   // __BIONIC__
 | |
|   GTEST_SKIP() << "bionic-only test";
 | |
| #endif  // __BIONIC__
 | |
| }
 | |
| 
 | |
| TEST(grp_pwd_file, group_file_one_entry) {
 | |
| #if defined(__BIONIC__)
 | |
|   TemporaryFile file;
 | |
|   ASSERT_NE(-1, file.fd);
 | |
|   static const char test_string[] = "name:password:1:one,two,three\n";
 | |
|   write(file.fd, test_string, sizeof(test_string) - 1);
 | |
| 
 | |
|   GroupFile group_file(file.path, nullptr);
 | |
|   FileUnmapper unmapper(group_file);
 | |
| 
 | |
|   FindAndCheckGroupEntry(&group_file, "name", 1);
 | |
| 
 | |
|   EXPECT_FALSE(group_file.FindByName("not_name", nullptr));
 | |
|   EXPECT_FALSE(group_file.FindById(3, nullptr));
 | |
| 
 | |
| #else   // __BIONIC__
 | |
|   GTEST_SKIP() << "bionic-only test";
 | |
| #endif  // __BIONIC__
 | |
| }
 | |
| 
 | |
| TEST(grp_pwd_file, passwd_file_many_entries) {
 | |
| #if defined(__BIONIC__)
 | |
|   TemporaryFile file;
 | |
|   ASSERT_NE(-1, file.fd);
 | |
|   static const char test_string[] =
 | |
|       "first:x:1:2::dir:shell\n"
 | |
|       "abc1::3:4::def:abc\n"
 | |
|       "abc2::5:4:abc::abc\n"
 | |
|       "abc3::7:4:abc:def:\n"
 | |
|       "abc4::9:4:::abc\n"
 | |
|       "abc5::11:4:abc:def:abc\n"
 | |
|       "middle-ish::13:4::/:/system/bin/sh\n"
 | |
|       "abc7::15:4:abc::\n"
 | |
|       "abc8::17:4:::\n"
 | |
|       "abc9::19:4:abc:def:abc\n"
 | |
|       "abc10::21:4:abc:def:abc\n"
 | |
|       "abc11::23:4:abc:def:abc\n"
 | |
|       "abc12::25:4:abc:def:abc\n"
 | |
|       "abc13::27:4:abc:def:abc\n"
 | |
|       "last::29:4::last_user_dir:last_user_shell\n";
 | |
| 
 | |
|   write(file.fd, test_string, sizeof(test_string) - 1);
 | |
| 
 | |
|   PasswdFile passwd_file(file.path, nullptr);
 | |
|   FileUnmapper unmapper(passwd_file);
 | |
| 
 | |
|   FindAndCheckPasswdEntry(&passwd_file, "first", 1, 2, "dir", "shell");
 | |
|   FindAndCheckPasswdEntry(&passwd_file, "middle-ish", 13, 4, "/", "/system/bin/sh");
 | |
|   FindAndCheckPasswdEntry(&passwd_file, "last", 29, 4, "last_user_dir", "last_user_shell");
 | |
| 
 | |
|   EXPECT_FALSE(passwd_file.FindByName("not_name", nullptr));
 | |
|   EXPECT_FALSE(passwd_file.FindById(50, nullptr));
 | |
| 
 | |
| #else   // __BIONIC__
 | |
|   GTEST_SKIP() << "bionic-only test";
 | |
| #endif  // __BIONIC__
 | |
| }
 | |
| 
 | |
| TEST(grp_pwd_file, group_file_many_entries) {
 | |
| #if defined(__BIONIC__)
 | |
|   TemporaryFile file;
 | |
|   ASSERT_NE(-1, file.fd);
 | |
|   static const char test_string[] =
 | |
|       "first:password:1:one,two,three\n"
 | |
|       "abc:def:2:group1,group2,group3\n"
 | |
|       "abc:def:3:\n"
 | |
|       "abc:def:4:\n"
 | |
|       "abc:def:5:\n"
 | |
|       "middle-ish:def_a_password_that_is_over_32_characters_long:6:\n"
 | |
|       "abc:def:7:\n"
 | |
|       "abc:def:8:\n"
 | |
|       "abc:def:20:\n"
 | |
|       "abc:def:25:\n"
 | |
|       "abc:def:27:\n"
 | |
|       "abc:def:52:\n"
 | |
|       "last::800:\n";
 | |
| 
 | |
|   write(file.fd, test_string, sizeof(test_string) - 1);
 | |
| 
 | |
|   GroupFile group_file(file.path, nullptr);
 | |
|   FileUnmapper unmapper(group_file);
 | |
| 
 | |
|   FindAndCheckGroupEntry(&group_file, "first", 1);
 | |
|   FindAndCheckGroupEntry(&group_file, "middle-ish", 6);
 | |
|   FindAndCheckGroupEntry(&group_file, "last", 800);
 | |
| 
 | |
|   EXPECT_FALSE(group_file.FindByName("not_name", nullptr));
 | |
|   EXPECT_FALSE(group_file.FindById(799, nullptr));
 | |
| 
 | |
| #else   // __BIONIC__
 | |
|   GTEST_SKIP() << "bionic-only test";
 | |
| #endif  // __BIONIC__
 | |
| }
 | |
| 
 | |
| TEST(grp_pwd_file, passwd_file_required_prefix) {
 | |
| #if defined(__BIONIC__)
 | |
|   TemporaryFile file;
 | |
|   ASSERT_NE(-1, file.fd);
 | |
|   static const char test_string[] =
 | |
|       "name:password:1:2:user_info:dir:shell\n"
 | |
|       "vendor_name:password:3:4:user_info:dir:shell\n";
 | |
|   write(file.fd, test_string, sizeof(test_string) - 1);
 | |
| 
 | |
|   PasswdFile passwd_file(file.path, "vendor_");
 | |
|   FileUnmapper unmapper(passwd_file);
 | |
| 
 | |
|   EXPECT_FALSE(passwd_file.FindByName("name", nullptr));
 | |
|   EXPECT_FALSE(passwd_file.FindById(1, nullptr));
 | |
| 
 | |
|   FindAndCheckPasswdEntry(&passwd_file, "vendor_name", 3, 4, "dir", "shell");
 | |
| 
 | |
| #else   // __BIONIC__
 | |
|   GTEST_SKIP() << "bionic-only test";
 | |
| #endif  // __BIONIC__
 | |
| }
 | |
| 
 | |
| TEST(grp_pwd_file, group_file_required_prefix) {
 | |
| #if defined(__BIONIC__)
 | |
|   TemporaryFile file;
 | |
|   ASSERT_NE(-1, file.fd);
 | |
|   static const char test_string[] =
 | |
|       "name:password:1:one,two,three\n"
 | |
|       "vendor_name:password:2:one,two,three\n";
 | |
|   write(file.fd, test_string, sizeof(test_string) - 1);
 | |
| 
 | |
|   GroupFile group_file(file.path, "vendor_");
 | |
|   FileUnmapper unmapper(group_file);
 | |
| 
 | |
|   EXPECT_FALSE(group_file.FindByName("name", nullptr));
 | |
|   EXPECT_FALSE(group_file.FindById(1, nullptr));
 | |
| 
 | |
|   FindAndCheckGroupEntry(&group_file, "vendor_name", 2);
 | |
| 
 | |
| #else   // __BIONIC__
 | |
|   GTEST_SKIP() << "bionic-only test";
 | |
| #endif  // __BIONIC__
 | |
| }
 |