]> git.ipfire.org Git - thirdparty/systemd.git/blame_incremental - src/libsystemd/sd-login/test-login.c
openssl-util: allow to build with openssl without UI support (#38041)
[thirdparty/systemd.git] / src / libsystemd / sd-login / test-login.c
... / ...
CommitLineData
1/* SPDX-License-Identifier: LGPL-2.1-or-later */
2
3#include <poll.h>
4#include <sys/socket.h>
5
6#include "sd-login.h"
7
8#include "alloc-util.h"
9#include "argv-util.h"
10#include "errno-list.h"
11#include "fd-util.h"
12#include "format-util.h"
13#include "log.h"
14#include "pidfd-util.h"
15#include "process-util.h"
16#include "string-util.h"
17#include "strv.h"
18#include "tests.h"
19#include "time-util.h"
20#include "user-util.h"
21
22static char* format_uids(char **buf, uid_t* uids, int count) {
23 int pos = 0, inc;
24 size_t size = (DECIMAL_STR_MAX(uid_t) + 1) * count + 1;
25
26 assert_se(*buf = malloc(size));
27
28 for (int k = 0; k < count; k++) {
29 sprintf(*buf + pos, "%s"UID_FMT"%n", k > 0 ? " " : "", uids[k], &inc);
30 pos += inc;
31 }
32
33 assert_se(pos < (ssize_t)size);
34 (*buf)[pos] = '\0';
35
36 return *buf;
37}
38
39static const char *e(int r) {
40 return r == 0 ? "OK" : errno_to_name(r);
41}
42
43TEST(login) {
44 _cleanup_close_pair_ int pair[2] = EBADF_PAIR;
45 _cleanup_free_ char *pp = NULL, *qq = NULL,
46 *display_session = NULL, *cgroup = NULL,
47 *display = NULL, *remote_user = NULL, *remote_host = NULL,
48 *type = NULL, *class = NULL, *state = NULL, *state2 = NULL,
49 *seat = NULL, *session = NULL,
50 *unit = NULL, *user_unit = NULL, *slice = NULL;
51 _cleanup_close_ int pidfd = -EBADF;
52 int r;
53 uid_t u, u2 = UID_INVALID;
54 char *t, **seats = NULL, **sessions = NULL;
55
56 r = sd_pid_get_unit(0, &unit);
57 log_info("sd_pid_get_unit(0, …) → %s / \"%s\"", e(r), strnull(unit));
58 assert_se(IN_SET(r, 0, -ENODATA));
59
60 r = sd_pid_get_user_unit(0, &user_unit);
61 log_info("sd_pid_get_user_unit(0, …) → %s / \"%s\"", e(r), strnull(user_unit));
62 assert_se(IN_SET(r, 0, -ENODATA));
63
64 r = sd_pid_get_slice(0, &slice);
65 log_info("sd_pid_get_slice(0, …) → %s / \"%s\"", e(r), strnull(slice));
66 assert_se(IN_SET(r, 0, -ENODATA));
67
68 r = sd_pid_get_owner_uid(0, &u2);
69 log_info("sd_pid_get_owner_uid(0, …) → %s / "UID_FMT, e(r), u2);
70 assert_se(IN_SET(r, 0, -ENODATA));
71
72 r = sd_pid_get_session(0, &session);
73 log_info("sd_pid_get_session(0, …) → %s / \"%s\"", e(r), strnull(session));
74
75 r = sd_pid_get_cgroup(0, &cgroup);
76 log_info("sd_pid_get_cgroup(0, …) → %s / \"%s\"", e(r), strnull(cgroup));
77 assert_se(IN_SET(r, 0, -ENOMEDIUM));
78
79 pidfd = pidfd_open(getpid_cached(), 0);
80 if (pidfd >= 0) {
81 _cleanup_free_ char *cgroup2 = NULL, *session2 = NULL,
82 *unit2 = NULL, *user_unit2 = NULL, *slice2 = NULL;
83
84 r = sd_pidfd_get_unit(pidfd, &unit2);
85 log_info("sd_pidfd_get_unit(pidfd, …) → %s / \"%s\"", e(r), strnull(unit2));
86 assert_se(IN_SET(r, 0, -ENODATA));
87
88 r = sd_pidfd_get_user_unit(pidfd, &user_unit2);
89 log_info("sd_pidfd_get_user_unit(pidfd, …) → %s / \"%s\"", e(r), strnull(user_unit2));
90 assert_se(IN_SET(r, 0, -ENODATA));
91
92 r = sd_pidfd_get_slice(pidfd, &slice2);
93 log_info("sd_pidfd_get_slice(pidfd, …) → %s / \"%s\"", e(r), strnull(slice2));
94 assert_se(IN_SET(r, 0, -ENODATA));
95
96 r = sd_pidfd_get_owner_uid(pidfd, &u2);
97 log_info("sd_pidfd_get_owner_uid(pidfd, …) → %s / "UID_FMT, e(r), u2);
98 assert_se(IN_SET(r, 0, -ENODATA));
99
100 r = sd_pidfd_get_session(pidfd, &session2);
101 log_info("sd_pidfd_get_session(pidfd, …) → %s / \"%s\"", e(r), strnull(session2));
102
103 r = sd_pidfd_get_cgroup(pidfd, &cgroup2);
104 log_info("sd_pidfd_get_cgroup(pidfd, …) → %s / \"%s\"", e(r), strnull(cgroup2));
105 assert_se(IN_SET(r, 0, -ENOMEDIUM));
106 }
107
108 r = ASSERT_RETURN_IS_CRITICAL(uid_is_valid(u2), sd_uid_get_display(u2, &display_session));
109 log_info("sd_uid_get_display("UID_FMT", …) → %s / \"%s\"", u2, e(r), strnull(display_session));
110 if (u2 == UID_INVALID)
111 assert_se(r == -EINVAL);
112 else
113 assert_se(IN_SET(r, 0, -ENODATA));
114
115 assert_se(socketpair(AF_UNIX, SOCK_STREAM, 0, pair) == 0);
116 sd_peer_get_session(pair[0], &pp);
117 sd_peer_get_session(pair[1], &qq);
118 assert_se(streq_ptr(pp, qq));
119
120 r = ASSERT_RETURN_IS_CRITICAL(uid_is_valid(u2), sd_uid_get_sessions(u2, false, &sessions));
121 assert_se(t = strv_join(sessions, " "));
122 log_info("sd_uid_get_sessions("UID_FMT", …) → %s \"%s\"", u2, e(r), t);
123 if (u2 == UID_INVALID)
124 assert_se(r == -EINVAL);
125 else {
126 assert_se(r >= 0);
127 assert_se(r == (int) strv_length(sessions));
128 }
129 sessions = strv_free(sessions);
130 free(t);
131
132 assert_se(r == ASSERT_RETURN_IS_CRITICAL(uid_is_valid(u2), sd_uid_get_sessions(u2, false, NULL)));
133
134 r = ASSERT_RETURN_IS_CRITICAL(uid_is_valid(u2), sd_uid_get_seats(u2, false, &seats));
135 assert_se(t = strv_join(seats, " "));
136 log_info("sd_uid_get_seats("UID_FMT", …) → %s \"%s\"", u2, e(r), t);
137 if (u2 == UID_INVALID)
138 assert_se(r == -EINVAL);
139 else {
140 assert_se(r >= 0);
141 assert_se(r == (int) strv_length(seats));
142 }
143 seats = strv_free(seats);
144 free(t);
145
146 assert_se(r == ASSERT_RETURN_IS_CRITICAL(uid_is_valid(u2), sd_uid_get_seats(u2, false, NULL)));
147
148 if (session) {
149 r = sd_session_is_active(session);
150 if (r == -ENXIO)
151 log_notice("sd_session_is_active() failed with ENXIO, it seems logind is not running.");
152 else {
153 /* All those tests will fail with ENXIO, so let's skip them. */
154
155 assert_se(r >= 0);
156 log_info("sd_session_is_active(\"%s\") → %s", session, yes_no(r));
157
158 r = sd_session_is_remote(session);
159 assert_se(r >= 0);
160 log_info("sd_session_is_remote(\"%s\") → %s", session, yes_no(r));
161
162 r = sd_session_get_state(session, &state);
163 assert_se(r == 0);
164 log_info("sd_session_get_state(\"%s\") → \"%s\"", session, state);
165
166 assert_se(sd_session_get_uid(session, &u) >= 0);
167 log_info("sd_session_get_uid(\"%s\") → "UID_FMT, session, u);
168 assert_se(u == u2);
169
170 assert_se(sd_session_get_type(session, &type) >= 0);
171 log_info("sd_session_get_type(\"%s\") → \"%s\"", session, type);
172
173 assert_se(sd_session_get_class(session, &class) >= 0);
174 log_info("sd_session_get_class(\"%s\") → \"%s\"", session, class);
175
176 r = sd_session_get_display(session, &display);
177 assert_se(IN_SET(r, 0, -ENODATA));
178 log_info("sd_session_get_display(\"%s\") → \"%s\"", session, strna(display));
179
180 r = sd_session_get_remote_user(session, &remote_user);
181 assert_se(IN_SET(r, 0, -ENODATA));
182 log_info("sd_session_get_remote_user(\"%s\") → \"%s\"",
183 session, strna(remote_user));
184
185 r = sd_session_get_remote_host(session, &remote_host);
186 assert_se(IN_SET(r, 0, -ENODATA));
187 log_info("sd_session_get_remote_host(\"%s\") → \"%s\"",
188 session, strna(remote_host));
189
190 r = sd_session_get_seat(session, &seat);
191 if (r >= 0) {
192 assert_se(seat);
193
194 log_info("sd_session_get_seat(\"%s\") → \"%s\"", session, seat);
195
196#pragma GCC diagnostic push
197#pragma GCC diagnostic ignored "-Wdeprecated-declarations"
198 r = sd_seat_can_multi_session(seat);
199#pragma GCC diagnostic pop
200 assert_se(r == 1);
201 log_info("sd_session_can_multi_seat(\"%s\") → %s", seat, yes_no(r));
202
203 r = sd_seat_can_tty(seat);
204 assert_se(r >= 0);
205 log_info("sd_session_can_tty(\"%s\") → %s", seat, yes_no(r));
206
207 r = sd_seat_can_graphical(seat);
208 assert_se(r >= 0);
209 log_info("sd_session_can_graphical(\"%s\") → %s", seat, yes_no(r));
210 } else {
211 log_info_errno(r, "sd_session_get_seat(\"%s\"): %m", session);
212 assert_se(r == -ENODATA);
213 }
214
215 assert_se(sd_uid_get_state(u, &state2) == 0);
216 log_info("sd_uid_get_state("UID_FMT", …) → %s", u, state2);
217 }
218 }
219
220 if (seat) {
221 _cleanup_free_ char *session2 = NULL, *buf = NULL;
222 _cleanup_free_ uid_t *uids = NULL;
223 unsigned n;
224
225 assert_se(sd_uid_is_on_seat(u, 0, seat) > 0);
226
227 r = sd_seat_get_active(seat, &session2, &u2);
228 assert_se(r == 0);
229 log_info("sd_seat_get_active(\"%s\", …) → \"%s\", "UID_FMT, seat, session2, u2);
230
231 r = sd_uid_is_on_seat(u, 1, seat);
232 assert_se(IN_SET(r, 0, 1));
233 assert_se(!!r == streq(session, session2));
234
235 r = sd_seat_get_sessions(seat, &sessions, &uids, &n);
236 assert_se(r >= 0);
237 assert_se(r == (int) strv_length(sessions));
238 assert_se(t = strv_join(sessions, " "));
239 strv_free(sessions);
240 log_info("sd_seat_get_sessions(\"%s\", …) → %s, \"%s\", [%u] {%s}",
241 seat, e(r), t, n, format_uids(&buf, uids, n));
242 free(t);
243
244 assert_se(sd_seat_get_sessions(seat, NULL, NULL, NULL) == r);
245 }
246
247 r = sd_get_seats(&seats);
248 assert_se(r >= 0);
249 assert_se(r == (int) strv_length(seats));
250 assert_se(t = strv_join(seats, ", "));
251 strv_free(seats);
252 log_info("sd_get_seats(…) → [%i] \"%s\"", r, t);
253 t = mfree(t);
254
255 assert_se(sd_get_seats(NULL) == r);
256
257 r = sd_seat_get_active(NULL, &t, NULL);
258 assert_se(IN_SET(r, 0, -ENODATA, -ENXIO));
259 log_info("sd_seat_get_active(NULL, …) (active session on current seat) → %s / \"%s\"", e(r), strnull(t));
260 free(t);
261
262 r = sd_get_sessions(&sessions);
263 assert_se(r >= 0);
264 assert_se(r == (int) strv_length(sessions));
265 assert_se(t = strv_join(sessions, ", "));
266 strv_free(sessions);
267 log_info("sd_get_sessions(…) → [%i] \"%s\"", r, t);
268 free(t);
269
270 assert_se(sd_get_sessions(NULL) == r);
271
272 {
273 _cleanup_free_ uid_t *uids = NULL;
274 _cleanup_free_ char *buf = NULL;
275
276 r = sd_get_uids(&uids);
277 assert_se(r >= 0);
278 log_info("sd_get_uids(…) → [%i] {%s}", r, format_uids(&buf, uids, r));
279
280 assert_se(sd_get_uids(NULL) == r);
281 }
282
283 {
284 _cleanup_strv_free_ char **machines = NULL;
285 _cleanup_free_ char *buf = NULL;
286
287 r = sd_get_machine_names(&machines);
288 assert_se(r >= 0);
289 assert_se(r == (int) strv_length(machines));
290 assert_se(buf = strv_join(machines, " "));
291 log_info("sd_get_machines(…) → [%i] \"%s\"", r, buf);
292
293 assert_se(sd_get_machine_names(NULL) == r);
294 }
295}
296
297TEST(monitor) {
298 sd_login_monitor *m = NULL;
299 int r;
300
301 if (!streq_ptr(saved_argv[1], "-m"))
302 return;
303
304 assert_se(sd_login_monitor_new("session", &m) == 0);
305
306 for (unsigned n = 0; n < 5; n++) {
307 struct pollfd pollfd = {};
308 usec_t timeout, nw;
309
310 assert_se((pollfd.fd = sd_login_monitor_get_fd(m)) >= 0);
311 assert_se((pollfd.events = sd_login_monitor_get_events(m)) >= 0);
312
313 assert_se(sd_login_monitor_get_timeout(m, &timeout) >= 0);
314
315 nw = now(CLOCK_MONOTONIC);
316
317 r = poll(&pollfd, 1,
318 timeout == UINT64_MAX ? -1 :
319 timeout > nw ? (int) ((timeout - nw) / 1000) :
320 0);
321
322 assert_se(r >= 0);
323
324 sd_login_monitor_flush(m);
325 printf("Wake!\n");
326 }
327
328 sd_login_monitor_unref(m);
329}
330
331static int intro(void) {
332 if (IN_SET(cg_unified(), -ENOENT, -ENOMEDIUM))
333 return log_tests_skipped("cgroupfs is not mounted");
334
335 log_info("/* Information printed is from the live system */");
336 return EXIT_SUCCESS;
337}
338
339DEFINE_TEST_MAIN_WITH_INTRO(LOG_INFO, intro);