]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/test/test-copy.c
tree-wide: introduce PIPE_EBADF macro
[thirdparty/systemd.git] / src / test / test-copy.c
CommitLineData
db9ecf05 1/* SPDX-License-Identifier: LGPL-2.1-or-later */
641d1f99 2
83412d39 3#include <sys/xattr.h>
641d1f99
RC
4#include <unistd.h>
5
b5efdb8a 6#include "alloc-util.h"
f4351959 7#include "chase-symlinks.h"
641d1f99 8#include "copy.h"
3ffd4af2 9#include "fd-util.h"
641d1f99 10#include "fileio.h"
f4f15635 11#include "fs-util.h"
83412d39 12#include "hexdecoct.h"
ce33fdda 13#include "log.h"
07630cea 14#include "macro.h"
641d1f99 15#include "mkdir.h"
07630cea
LP
16#include "path-util.h"
17#include "rm-rf.h"
18#include "string-util.h"
641d1f99 19#include "strv.h"
6d7c4033 20#include "tests.h"
e4de7287 21#include "tmpfile-util.h"
d01cd401 22#include "user-util.h"
83412d39 23#include "xattr-util.h"
641d1f99 24
4f7452a8 25TEST(copy_file) {
641d1f99
RC
26 _cleanup_free_ char *buf = NULL;
27 char fn[] = "/tmp/test-copy_file.XXXXXX";
28 char fn_copy[] = "/tmp/test-copy_file.XXXXXX";
29 size_t sz = 0;
30 int fd;
31
646853bd 32 fd = mkostemp_safe(fn);
641d1f99
RC
33 assert_se(fd >= 0);
34 close(fd);
35
646853bd 36 fd = mkostemp_safe(fn_copy);
641d1f99
RC
37 assert_se(fd >= 0);
38 close(fd);
39
4c1fc3e4 40 assert_se(write_string_file(fn, "foo bar bar bar foo", WRITE_STRING_FILE_CREATE) == 0);
641d1f99 41
8a016c74 42 assert_se(copy_file(fn, fn_copy, 0, 0644, 0, 0, COPY_REFLINK) == 0);
641d1f99
RC
43
44 assert_se(read_full_file(fn_copy, &buf, &sz) == 0);
45 assert_se(streq(buf, "foo bar bar bar foo\n"));
cda134ab 46 assert_se(sz == 20);
641d1f99
RC
47
48 unlink(fn);
49 unlink(fn_copy);
50}
51
dcb3d093 52static bool read_file_at_and_streq(int dir_fd, const char *path, const char *expected) {
92240955
AW
53 _cleanup_free_ char *buf = NULL;
54
dcb3d093
DDM
55 assert_se(read_full_file_at(dir_fd, path, &buf, NULL) == 0);
56 return streq(buf, expected);
92240955
AW
57}
58
59TEST(copy_tree_replace_file) {
60 _cleanup_free_ char *src = NULL, *dst = NULL;
61
62 assert_se(tempfn_random("/tmp/test-copy_file.XXXXXX", NULL, &src) >= 0);
63 assert_se(tempfn_random("/tmp/test-copy_file.XXXXXX", NULL, &dst) >= 0);
64
65 assert_se(write_string_file(src, "bar bar", WRITE_STRING_FILE_CREATE) == 0);
66 assert_se(write_string_file(dst, "foo foo foo", WRITE_STRING_FILE_CREATE) == 0);
67
5162b2a1 68 /* The file exists- now overwrite original contents, and test the COPY_REPLACE flag. */
92240955 69
a424958a 70 assert_se(copy_tree(src, dst, UID_INVALID, GID_INVALID, COPY_REFLINK, NULL) == -EEXIST);
92240955 71
dcb3d093 72 assert_se(read_file_at_and_streq(AT_FDCWD, dst, "foo foo foo\n"));
92240955 73
a424958a 74 assert_se(copy_tree(src, dst, UID_INVALID, GID_INVALID, COPY_REFLINK|COPY_REPLACE, NULL) == 0);
92240955 75
dcb3d093 76 assert_se(read_file_at_and_streq(AT_FDCWD, dst, "bar bar\n"));
92240955
AW
77}
78
79TEST(copy_tree_replace_dirs) {
c9a1202e
DDM
80 _cleanup_(rm_rf_physical_and_freep) char *srcp = NULL, *dstp = NULL;
81 _cleanup_close_ int src = -1, dst = -1;
92240955
AW
82
83 /* Create the random source/destination directories */
c9a1202e
DDM
84 assert_se((src = mkdtemp_open(NULL, 0, &srcp)) >= 0);
85 assert_se((dst = mkdtemp_open(NULL, 0, &dstp)) >= 0);
92240955
AW
86
87 /* Populate some data to differentiate the files. */
dcb3d093
DDM
88 assert_se(write_string_file_at(src, "foo", "src file 1", WRITE_STRING_FILE_CREATE) >= 0);
89 assert_se(write_string_file_at(src, "bar", "src file 2", WRITE_STRING_FILE_CREATE) == 0);
92240955 90
dcb3d093
DDM
91 assert_se(write_string_file_at(dst, "foo", "dest file 1", WRITE_STRING_FILE_CREATE) == 0);
92 assert_se(write_string_file_at(dst, "bar", "dest file 2", WRITE_STRING_FILE_CREATE) == 0);
92240955
AW
93
94 /* Copying without COPY_REPLACE should fail because the destination file already exists. */
a424958a 95 assert_se(copy_tree_at(src, ".", dst, ".", UID_INVALID, GID_INVALID, COPY_REFLINK, NULL) == -EEXIST);
dcb3d093
DDM
96
97 assert_se(read_file_at_and_streq(src, "foo", "src file 1\n"));
98 assert_se(read_file_at_and_streq(src, "bar", "src file 2\n"));
99 assert_se(read_file_at_and_streq(dst, "foo", "dest file 1\n"));
100 assert_se(read_file_at_and_streq(dst, "bar", "dest file 2\n"));
101
a424958a 102 assert_se(copy_tree_at(src, ".", dst, ".", UID_INVALID, GID_INVALID, COPY_REFLINK|COPY_REPLACE|COPY_MERGE, NULL) == 0);
dcb3d093
DDM
103
104 assert_se(read_file_at_and_streq(src, "foo", "src file 1\n"));
105 assert_se(read_file_at_and_streq(src, "bar", "src file 2\n"));
106 assert_se(read_file_at_and_streq(dst, "foo", "src file 1\n"));
107 assert_se(read_file_at_and_streq(dst, "bar", "src file 2\n"));
92240955
AW
108}
109
4f7452a8 110TEST(copy_file_fd) {
cda134ab
LP
111 char in_fn[] = "/tmp/test-copy-file-fd-XXXXXX";
112 char out_fn[] = "/tmp/test-copy-file-fd-XXXXXX";
254d1313 113 _cleanup_close_ int in_fd = -EBADF, out_fd = -EBADF;
2aa07538
ZJS
114 const char *text = "boohoo\nfoo\n\tbar\n";
115 char buf[64] = {};
cda134ab 116
646853bd 117 in_fd = mkostemp_safe(in_fn);
cda134ab 118 assert_se(in_fd >= 0);
646853bd 119 out_fd = mkostemp_safe(out_fn);
cda134ab
LP
120 assert_se(out_fd >= 0);
121
4c1fc3e4 122 assert_se(write_string_file(in_fn, text, WRITE_STRING_FILE_CREATE) == 0);
1c876927
LP
123 assert_se(copy_file_fd("/a/file/which/does/not/exist/i/guess", out_fd, COPY_REFLINK) < 0);
124 assert_se(copy_file_fd(in_fn, out_fd, COPY_REFLINK) >= 0);
cda134ab
LP
125 assert_se(lseek(out_fd, SEEK_SET, 0) == 0);
126
2aa07538 127 assert_se(read(out_fd, buf, sizeof buf) == (ssize_t) strlen(text));
cda134ab
LP
128 assert_se(streq(buf, text));
129
130 unlink(in_fn);
131 unlink(out_fn);
132}
133
4f7452a8 134TEST(copy_tree) {
a424958a
DDM
135 _cleanup_set_free_ Set *denylist = NULL;
136 _cleanup_free_ char *cp = NULL;
3c14dc61
TM
137 char original_dir[] = "/tmp/test-copy_tree/";
138 char copy_dir[] = "/tmp/test-copy_tree-copy/";
641d1f99 139 char **files = STRV_MAKE("file", "dir1/file", "dir1/dir2/file", "dir1/dir2/dir3/dir4/dir5/file");
dd480f78
LP
140 char **symlinks = STRV_MAKE("link", "file",
141 "link2", "dir1/file");
142 char **hardlinks = STRV_MAKE("hlink", "file",
143 "hlink2", "dir1/file");
a424958a 144 const char *unixsockp, *ignorep;
0e2b2cac 145 struct stat st;
83412d39
LP
146 int xattr_worked = -1; /* xattr support is optional in temporary directories, hence use it if we can,
147 * but don't fail if we can't */
641d1f99 148
c6878637
LP
149 (void) rm_rf(copy_dir, REMOVE_ROOT|REMOVE_PHYSICAL);
150 (void) rm_rf(original_dir, REMOVE_ROOT|REMOVE_PHYSICAL);
641d1f99
RC
151
152 STRV_FOREACH(p, files) {
83412d39
LP
153 _cleanup_free_ char *f, *c;
154 int k;
2397bc43 155
b910cc72 156 assert_se(f = path_join(original_dir, *p));
641d1f99 157
8ff5fa16 158 assert_se(write_string_file(f, "file", WRITE_STRING_FILE_CREATE|WRITE_STRING_FILE_MKDIR_0755) == 0);
83412d39
LP
159
160 assert_se(base64mem(*p, strlen(*p), &c) >= 0);
161
162 k = setxattr(f, "user.testxattr", c, strlen(c), 0);
163 assert_se(xattr_worked < 0 || ((k >= 0) == !!xattr_worked));
164 xattr_worked = k >= 0;
641d1f99
RC
165 }
166
dd480f78 167 STRV_FOREACH_PAIR(ll, p, symlinks) {
2397bc43
LP
168 _cleanup_free_ char *f, *l;
169
b910cc72 170 assert_se(f = path_join(original_dir, *p));
dd480f78 171 assert_se(l = path_join(original_dir, *ll));
641d1f99
RC
172
173 assert_se(mkdir_parents(l, 0755) >= 0);
174 assert_se(symlink(f, l) == 0);
175 }
176
dd480f78
LP
177 STRV_FOREACH_PAIR(ll, p, hardlinks) {
178 _cleanup_free_ char *f, *l;
179
180 assert_se(f = path_join(original_dir, *p));
181 assert_se(l = path_join(original_dir, *ll));
182
183 assert_se(mkdir_parents(l, 0755) >= 0);
184 assert_se(link(f, l) == 0);
185 }
186
0e2b2cac
LP
187 unixsockp = strjoina(original_dir, "unixsock");
188 assert_se(mknod(unixsockp, S_IFSOCK|0644, 0) >= 0);
189
a424958a
DDM
190 ignorep = strjoina(original_dir, "ignore/file");
191 assert_se(write_string_file(ignorep, "ignore", WRITE_STRING_FILE_CREATE|WRITE_STRING_FILE_MKDIR_0755) == 0);
192 assert_se(RET_NERRNO(stat(ignorep, &st)) >= 0);
193 assert_se(cp = memdup(&st, sizeof(st)));
194 assert_se(set_ensure_put(&denylist, &inode_hash_ops, cp) >= 0);
195 TAKE_PTR(cp);
196
197 assert_se(copy_tree(original_dir, copy_dir, UID_INVALID, GID_INVALID, COPY_REFLINK|COPY_MERGE|COPY_HARDLINKS, denylist) == 0);
641d1f99
RC
198
199 STRV_FOREACH(p, files) {
83412d39 200 _cleanup_free_ char *buf, *f, *c = NULL;
9421cab6 201 size_t sz;
83412d39 202 int k;
2397bc43 203
b910cc72 204 assert_se(f = path_join(copy_dir, *p));
641d1f99
RC
205
206 assert_se(access(f, F_OK) == 0);
207 assert_se(read_full_file(f, &buf, &sz) == 0);
208 assert_se(streq(buf, "file\n"));
83412d39 209
c53e07e2 210 k = lgetxattr_malloc(f, "user.testxattr", &c);
83412d39
LP
211 assert_se(xattr_worked < 0 || ((k >= 0) == !!xattr_worked));
212
213 if (k >= 0) {
214 _cleanup_free_ char *d = NULL;
215
216 assert_se(base64mem(*p, strlen(*p), &d) >= 0);
217 assert_se(streq(d, c));
218 }
641d1f99
RC
219 }
220
dd480f78 221 STRV_FOREACH_PAIR(ll, p, symlinks) {
9421cab6 222 _cleanup_free_ char *target, *f, *l;
2397bc43 223
dcd6361e 224 assert_se(f = strjoin(original_dir, *p));
dd480f78 225 assert_se(l = strjoin(copy_dir, *ll));
641d1f99 226
a5648b80 227 assert_se(chase_symlinks(l, NULL, 0, &target, NULL) == 1);
641d1f99
RC
228 assert_se(path_equal(f, target));
229 }
230
dd480f78
LP
231 STRV_FOREACH_PAIR(ll, p, hardlinks) {
232 _cleanup_free_ char *f, *l;
233 struct stat a, b;
234
235 assert_se(f = strjoin(copy_dir, *p));
236 assert_se(l = strjoin(copy_dir, *ll));
237
238 assert_se(lstat(f, &a) >= 0);
239 assert_se(lstat(l, &b) >= 0);
240
241 assert_se(a.st_ino == b.st_ino);
242 assert_se(a.st_dev == b.st_dev);
243 }
244
0e2b2cac
LP
245 unixsockp = strjoina(copy_dir, "unixsock");
246 assert_se(stat(unixsockp, &st) >= 0);
247 assert_se(S_ISSOCK(st.st_mode));
248
a424958a
DDM
249 assert_se(copy_tree(original_dir, copy_dir, UID_INVALID, GID_INVALID, COPY_REFLINK, denylist) < 0);
250 assert_se(copy_tree("/tmp/inexistent/foo/bar/fsdoi", copy_dir, UID_INVALID, GID_INVALID, COPY_REFLINK, denylist) < 0);
251
252 ignorep = strjoina(copy_dir, "ignore/file");
253 assert_se(RET_NERRNO(access(ignorep, F_OK)) == -ENOENT);
641d1f99 254
c6878637
LP
255 (void) rm_rf(copy_dir, REMOVE_ROOT|REMOVE_PHYSICAL);
256 (void) rm_rf(original_dir, REMOVE_ROOT|REMOVE_PHYSICAL);
641d1f99
RC
257}
258
4f7452a8 259TEST(copy_bytes) {
19ee48a6 260 _cleanup_close_pair_ int pipefd[2] = PIPE_EBADF;
254d1313 261 _cleanup_close_ int infd = -EBADF;
ad5ecc11
ZJS
262 int r, r2;
263 char buf[1024], buf2[1024];
264
4f36d400
DJL
265 infd = open("/usr/lib/os-release", O_RDONLY|O_CLOEXEC);
266 if (infd < 0)
267 infd = open("/etc/os-release", O_RDONLY|O_CLOEXEC);
ad5ecc11
ZJS
268 assert_se(infd >= 0);
269
270 assert_se(pipe2(pipefd, O_CLOEXEC) == 0);
271
f5fbe71d 272 r = copy_bytes(infd, pipefd[1], UINT64_MAX, 0);
ad5ecc11
ZJS
273 assert_se(r == 0);
274
275 r = read(pipefd[0], buf, sizeof(buf));
276 assert_se(r >= 0);
277
278 assert_se(lseek(infd, 0, SEEK_SET) == 0);
279 r2 = read(infd, buf2, sizeof(buf2));
280 assert_se(r == r2);
281
282 assert_se(strneq(buf, buf2, r));
283
284 /* test copy_bytes with invalid descriptors */
1c876927 285 r = copy_bytes(pipefd[0], pipefd[0], 1, 0);
ad5ecc11
ZJS
286 assert_se(r == -EBADF);
287
1c876927 288 r = copy_bytes(pipefd[1], pipefd[1], 1, 0);
ad5ecc11
ZJS
289 assert_se(r == -EBADF);
290
1c876927 291 r = copy_bytes(pipefd[1], infd, 1, 0);
ad5ecc11
ZJS
292 assert_se(r == -EBADF);
293}
294
4f7452a8 295static void test_copy_bytes_regular_file_one(const char *src, bool try_reflink, uint64_t max_bytes) {
ce33fdda
ZJS
296 char fn2[] = "/tmp/test-copy-file-XXXXXX";
297 char fn3[] = "/tmp/test-copy-file-XXXXXX";
254d1313 298 _cleanup_close_ int fd = -EBADF, fd2 = -EBADF, fd3 = -EBADF;
ce33fdda
ZJS
299 int r;
300 struct stat buf, buf2, buf3;
301
fa13cf9e 302 log_info("%s try_reflink=%s max_bytes=%" PRIu64, __func__, yes_no(try_reflink), max_bytes);
ce33fdda
ZJS
303
304 fd = open(src, O_RDONLY | O_CLOEXEC | O_NOCTTY);
305 assert_se(fd >= 0);
306
646853bd 307 fd2 = mkostemp_safe(fn2);
ce33fdda
ZJS
308 assert_se(fd2 >= 0);
309
646853bd 310 fd3 = mkostemp_safe(fn3);
ce33fdda
ZJS
311 assert_se(fd3 >= 0);
312
1c876927 313 r = copy_bytes(fd, fd2, max_bytes, try_reflink ? COPY_REFLINK : 0);
f5fbe71d 314 if (max_bytes == UINT64_MAX)
7a827fcb
ZJS
315 assert_se(r == 0);
316 else
317 assert_se(IN_SET(r, 0, 1));
ce33fdda 318
6fbdf424
ZJS
319 assert_se(fstat(fd, &buf) == 0);
320 assert_se(fstat(fd2, &buf2) == 0);
321 assert_se((uint64_t) buf2.st_size == MIN((uint64_t) buf.st_size, max_bytes));
322
f5fbe71d 323 if (max_bytes < UINT64_MAX)
6fbdf424
ZJS
324 /* Make sure the file is now higher than max_bytes */
325 assert_se(ftruncate(fd2, max_bytes + 1) == 0);
326
ce33fdda
ZJS
327 assert_se(lseek(fd2, 0, SEEK_SET) == 0);
328
1c876927 329 r = copy_bytes(fd2, fd3, max_bytes, try_reflink ? COPY_REFLINK : 0);
f5fbe71d 330 if (max_bytes == UINT64_MAX)
7a827fcb
ZJS
331 assert_se(r == 0);
332 else
333 /* We cannot distinguish between the input being exactly max_bytes
334 * or longer than max_bytes (without trying to read one more byte,
335 * or calling stat, or FION_READ, etc, and we don't want to do any
336 * of that). So we expect "truncation" since we know that file we
337 * are copying is exactly max_bytes bytes. */
338 assert_se(r == 1);
ce33fdda 339
ce33fdda
ZJS
340 assert_se(fstat(fd3, &buf3) == 0);
341
f5fbe71d 342 if (max_bytes == UINT64_MAX)
6fbdf424
ZJS
343 assert_se(buf3.st_size == buf2.st_size);
344 else
345 assert_se((uint64_t) buf3.st_size == max_bytes);
ce33fdda
ZJS
346
347 unlink(fn2);
348 unlink(fn3);
349}
350
4f7452a8
JJ
351TEST(copy_bytes_regular_file) {
352 test_copy_bytes_regular_file_one(saved_argv[0], false, UINT64_MAX);
353 test_copy_bytes_regular_file_one(saved_argv[0], true, UINT64_MAX);
354 test_copy_bytes_regular_file_one(saved_argv[0], false, 1000); /* smaller than copy buffer size */
355 test_copy_bytes_regular_file_one(saved_argv[0], true, 1000);
356 test_copy_bytes_regular_file_one(saved_argv[0], false, 32000); /* larger than copy buffer size */
357 test_copy_bytes_regular_file_one(saved_argv[0], true, 32000);
358}
359
360TEST(copy_atomic) {
ec6bdf72
LP
361 _cleanup_(rm_rf_physical_and_freep) char *p = NULL;
362 const char *q;
363 int r;
364
365 assert_se(mkdtemp_malloc(NULL, &p) >= 0);
366
367 q = strjoina(p, "/fstab");
368
8a016c74 369 r = copy_file_atomic("/etc/fstab", q, 0644, 0, 0, COPY_REFLINK);
3c14dc61 370 if (r == -ENOENT || ERRNO_IS_PRIVILEGE(r))
ec6bdf72
LP
371 return;
372
8a016c74 373 assert_se(copy_file_atomic("/etc/fstab", q, 0644, 0, 0, COPY_REFLINK) == -EEXIST);
ec6bdf72 374
8a016c74 375 assert_se(copy_file_atomic("/etc/fstab", q, 0644, 0, 0, COPY_REPLACE) >= 0);
ec6bdf72
LP
376}
377
4f7452a8 378TEST(copy_proc) {
ee1aa61c
LP
379 _cleanup_(rm_rf_physical_and_freep) char *p = NULL;
380 _cleanup_free_ char *f = NULL, *a = NULL, *b = NULL;
381
382 /* Check if copying data from /proc/ works correctly, i.e. let's see if https://lwn.net/Articles/846403/ is a problem for us */
383
384 assert_se(mkdtemp_malloc(NULL, &p) >= 0);
385 assert_se(f = path_join(p, "version"));
f5fbe71d 386 assert_se(copy_file("/proc/version", f, 0, MODE_INVALID, 0, 0, 0) >= 0);
ee1aa61c
LP
387
388 assert_se(read_one_line_file("/proc/version", &a) >= 0);
389 assert_se(read_one_line_file(f, &b) >= 0);
390 assert_se(streq(a, b));
57ac6959 391 assert_se(!isempty(a));
ee1aa61c
LP
392}
393
12727c2b
DDM
394TEST_RET(copy_holes) {
395 char fn[] = "/var/tmp/test-copy-hole-fd-XXXXXX";
396 char fn_copy[] = "/var/tmp/test-copy-hole-fd-XXXXXX";
397 struct stat stat;
f82f0b99 398 off_t blksz;
12727c2b 399 int r, fd, fd_copy;
2a97a4b3 400 char *buf;
12727c2b
DDM
401
402 fd = mkostemp_safe(fn);
403 assert_se(fd >= 0);
404
405 fd_copy = mkostemp_safe(fn_copy);
f67b4351 406 assert_se(fd_copy >= 0);
12727c2b
DDM
407
408 r = RET_NERRNO(fallocate(fd, FALLOC_FL_PUNCH_HOLE | FALLOC_FL_KEEP_SIZE, 0, 1));
409 if (ERRNO_IS_NOT_SUPPORTED(r))
410 return log_tests_skipped("Filesystem doesn't support hole punching");
411 assert_se(r >= 0);
412
f82f0b99
DDM
413 assert_se(fstat(fd, &stat) >= 0);
414 blksz = stat.st_blksize;
d66b77b4 415 buf = alloca_safe(blksz);
416 memset(buf, 1, blksz);
12727c2b 417
f82f0b99
DDM
418 /* We need to make sure to create hole in multiples of the block size, otherwise filesystems (btrfs)
419 * might silently truncate/extend the holes. */
420
421 assert_se(lseek(fd, blksz, SEEK_CUR) >= 0);
422 assert_se(write(fd, buf, blksz) >= 0);
423 assert_se(lseek(fd, 0, SEEK_END) == 2 * blksz);
424 /* Only ftruncate() can create holes at the end of a file. */
425 assert_se(ftruncate(fd, 3 * blksz) >= 0);
12727c2b
DDM
426 assert_se(lseek(fd, 0, SEEK_SET) >= 0);
427
428 assert_se(copy_bytes(fd, fd_copy, UINT64_MAX, COPY_HOLES) >= 0);
429
430 /* Test that the hole starts at the beginning of the file. */
431 assert_se(lseek(fd_copy, 0, SEEK_HOLE) == 0);
432 /* Test that the hole has the expected size. */
f82f0b99
DDM
433 assert_se(lseek(fd_copy, 0, SEEK_DATA) == blksz);
434 assert_se(lseek(fd_copy, blksz, SEEK_HOLE) == 2 * blksz);
435 assert_se(lseek(fd_copy, 2 * blksz, SEEK_DATA) < 0 && errno == ENXIO);
12727c2b
DDM
436
437 /* Test that the copied file has the correct size. */
438 assert_se(fstat(fd_copy, &stat) >= 0);
f82f0b99 439 assert_se(stat.st_size == 3 * blksz);
12727c2b
DDM
440
441 close(fd);
442 close(fd_copy);
443
444 unlink(fn);
445 unlink(fn_copy);
446
447 return 0;
448}
449
4f7452a8 450DEFINE_TEST_MAIN(LOG_DEBUG);