]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/test/test-user-util.c
user-util: synthesize user records for "nobody" the same way as for "root"
[thirdparty/systemd.git] / src / test / test-user-util.c
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
d0260817
LP
2/***
3 This file is part of systemd.
4
5 Copyright 2015 Lennart Poettering
6
7 systemd is free software; you can redistribute it and/or modify it
8 under the terms of the GNU Lesser General Public License as published by
9 the Free Software Foundation; either version 2.1 of the License, or
10 (at your option) any later version.
11
12 systemd is distributed in the hope that it will be useful, but
13 WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 Lesser General Public License for more details.
16
17 You should have received a copy of the GNU Lesser General Public License
18 along with systemd; If not, see <http://www.gnu.org/licenses/>.
19***/
20
b5efdb8a 21#include "alloc-util.h"
d0260817
LP
22#include "macro.h"
23#include "string-util.h"
24#include "user-util.h"
25#include "util.h"
7e61fd02 26#include "path-util.h"
d0260817
LP
27
28static void test_uid_to_name_one(uid_t uid, const char *name) {
29 _cleanup_free_ char *t = NULL;
30
31 assert_se(t = uid_to_name(uid));
32 assert_se(streq_ptr(t, name));
33}
34
35static void test_gid_to_name_one(gid_t gid, const char *name) {
36 _cleanup_free_ char *t = NULL;
37
38 assert_se(t = gid_to_name(gid));
39 assert_se(streq_ptr(t, name));
40}
41
d5b29bb5
RC
42static void test_parse_uid(void) {
43 int r;
44 uid_t uid;
45
46 r = parse_uid("100", &uid);
47 assert_se(r == 0);
48 assert_se(uid == 100);
49
50 r = parse_uid("65535", &uid);
51 assert_se(r == -ENXIO);
52
53 r = parse_uid("asdsdas", &uid);
54 assert_se(r == -EINVAL);
55}
56
57static void test_uid_ptr(void) {
58
59 assert_se(UID_TO_PTR(0) != NULL);
60 assert_se(UID_TO_PTR(1000) != NULL);
61
62 assert_se(PTR_TO_UID(UID_TO_PTR(0)) == 0);
63 assert_se(PTR_TO_UID(UID_TO_PTR(1000)) == 1000);
64}
65
e4631b48
LP
66static void test_valid_user_group_name(void) {
67 assert_se(!valid_user_group_name(NULL));
68 assert_se(!valid_user_group_name(""));
69 assert_se(!valid_user_group_name("1"));
70 assert_se(!valid_user_group_name("65535"));
71 assert_se(!valid_user_group_name("-1"));
72 assert_se(!valid_user_group_name("-kkk"));
73 assert_se(!valid_user_group_name("rööt"));
74 assert_se(!valid_user_group_name("."));
75 assert_se(!valid_user_group_name("eff.eff"));
76 assert_se(!valid_user_group_name("foo\nbar"));
77 assert_se(!valid_user_group_name("0123456789012345678901234567890123456789"));
78 assert_se(!valid_user_group_name_or_id("aaa:bbb"));
79
80 assert_se(valid_user_group_name("root"));
81 assert_se(valid_user_group_name("lennart"));
82 assert_se(valid_user_group_name("LENNART"));
83 assert_se(valid_user_group_name("_kkk"));
84 assert_se(valid_user_group_name("kkk-"));
85 assert_se(valid_user_group_name("kk-k"));
86
87 assert_se(valid_user_group_name("some5"));
88 assert_se(!valid_user_group_name("5some"));
89 assert_se(valid_user_group_name("INNER5NUMBER"));
90}
91
92static void test_valid_user_group_name_or_id(void) {
93 assert_se(!valid_user_group_name_or_id(NULL));
94 assert_se(!valid_user_group_name_or_id(""));
95 assert_se(valid_user_group_name_or_id("0"));
96 assert_se(valid_user_group_name_or_id("1"));
97 assert_se(valid_user_group_name_or_id("65534"));
98 assert_se(!valid_user_group_name_or_id("65535"));
99 assert_se(valid_user_group_name_or_id("65536"));
100 assert_se(!valid_user_group_name_or_id("-1"));
101 assert_se(!valid_user_group_name_or_id("-kkk"));
102 assert_se(!valid_user_group_name_or_id("rööt"));
103 assert_se(!valid_user_group_name_or_id("."));
104 assert_se(!valid_user_group_name_or_id("eff.eff"));
105 assert_se(!valid_user_group_name_or_id("foo\nbar"));
106 assert_se(!valid_user_group_name_or_id("0123456789012345678901234567890123456789"));
107 assert_se(!valid_user_group_name_or_id("aaa:bbb"));
108
109 assert_se(valid_user_group_name_or_id("root"));
110 assert_se(valid_user_group_name_or_id("lennart"));
111 assert_se(valid_user_group_name_or_id("LENNART"));
112 assert_se(valid_user_group_name_or_id("_kkk"));
113 assert_se(valid_user_group_name_or_id("kkk-"));
114 assert_se(valid_user_group_name_or_id("kk-k"));
115
116 assert_se(valid_user_group_name_or_id("some5"));
117 assert_se(!valid_user_group_name_or_id("5some"));
118 assert_se(valid_user_group_name_or_id("INNER5NUMBER"));
119}
120
121static void test_valid_gecos(void) {
122
123 assert_se(!valid_gecos(NULL));
124 assert_se(valid_gecos(""));
125 assert_se(valid_gecos("test"));
126 assert_se(valid_gecos("Ümläüt"));
127 assert_se(!valid_gecos("In\nvalid"));
128 assert_se(!valid_gecos("In:valid"));
129}
130
131static void test_valid_home(void) {
132
133 assert_se(!valid_home(NULL));
134 assert_se(!valid_home(""));
135 assert_se(!valid_home("."));
136 assert_se(!valid_home("/home/.."));
137 assert_se(!valid_home("/home/../"));
138 assert_se(!valid_home("/home\n/foo"));
139 assert_se(!valid_home("./piep"));
140 assert_se(!valid_home("piep"));
141 assert_se(!valid_home("/home/user:lennart"));
142
143 assert_se(valid_home("/"));
144 assert_se(valid_home("/home"));
145 assert_se(valid_home("/home/foo"));
146}
147
7e61fd02
LP
148static void test_get_user_creds_one(const char *id, const char *name, uid_t uid, gid_t gid, const char *home, const char *shell) {
149 const char *rhome;
150 const char *rshell;
151 uid_t ruid;
152 gid_t rgid;
153
154 assert_se(get_user_creds(&id, &ruid, &rgid, &rhome, &rshell) >= 0);
155 assert_se(streq_ptr(id, name));
156 assert_se(ruid == uid);
157 assert_se(rgid == gid);
158 assert_se(path_equal(rhome, home));
159 assert_se(path_equal(rshell, shell));
160}
161
162static void test_get_group_creds_one(const char *id, const char *name, gid_t gid) {
163 gid_t rgid;
164
165 assert_se(get_group_creds(&id, &rgid) >= 0);
166 assert_se(streq_ptr(id, name));
167 assert_se(rgid == gid);
168}
169
d0260817
LP
170int main(int argc, char*argv[]) {
171
172 test_uid_to_name_one(0, "root");
7e61fd02 173 test_uid_to_name_one(UID_NOBODY, NOBODY_USER_NAME);
d0260817
LP
174 test_uid_to_name_one(0xFFFF, "65535");
175 test_uid_to_name_one(0xFFFFFFFF, "4294967295");
176
177 test_gid_to_name_one(0, "root");
7e61fd02 178 test_gid_to_name_one(GID_NOBODY, NOBODY_GROUP_NAME);
d0260817
LP
179 test_gid_to_name_one(TTY_GID, "tty");
180 test_gid_to_name_one(0xFFFF, "65535");
181 test_gid_to_name_one(0xFFFFFFFF, "4294967295");
182
7e61fd02
LP
183 test_get_user_creds_one("root", "root", 0, 0, "/root", "/bin/sh");
184 test_get_user_creds_one("0", "root", 0, 0, "/root", "/bin/sh");
185 test_get_user_creds_one(NOBODY_USER_NAME, NOBODY_USER_NAME, UID_NOBODY, GID_NOBODY, "/", "/sbin/nologin");
186 test_get_user_creds_one("65534", NOBODY_USER_NAME, UID_NOBODY, GID_NOBODY, "/", "/sbin/nologin");
187
188 test_get_group_creds_one("root", "root", 0);
189 test_get_group_creds_one("0", "root", 0);
190 test_get_group_creds_one(NOBODY_GROUP_NAME, NOBODY_GROUP_NAME, GID_NOBODY);
191 test_get_group_creds_one("65534", NOBODY_GROUP_NAME, GID_NOBODY);
192
d5b29bb5
RC
193 test_parse_uid();
194 test_uid_ptr();
195
e4631b48
LP
196 test_valid_user_group_name();
197 test_valid_user_group_name_or_id();
198 test_valid_gecos();
199 test_valid_home();
200
d0260817
LP
201 return 0;
202}