]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/test/test-parse-helpers.c
parse-helpers: add new PATH_CHECK_NON_API_VFS flag
[thirdparty/systemd.git] / src / test / test-parse-helpers.c
1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
2
3 #include <linux/in.h>
4 #include <sys/socket.h>
5 #include <stdio.h>
6
7 #include "macro.h"
8 #include "parse-helpers.h"
9 #include "tests.h"
10
11 static void test_valid_item(
12 const char *str,
13 int expected_af,
14 int expected_ip_protocol,
15 uint16_t expected_nr_ports,
16 uint16_t expected_port_min) {
17 uint16_t nr_ports, port_min;
18 int af, ip_protocol;
19
20 assert_se(parse_socket_bind_item(str, &af, &ip_protocol, &nr_ports, &port_min) >= 0);
21 assert_se(af == expected_af);
22 assert_se(ip_protocol == expected_ip_protocol);
23 assert_se(nr_ports == expected_nr_ports);
24 assert_se(port_min == expected_port_min);
25
26 log_info("%s: \"%s\" ok", __func__, str);
27 }
28
29 static void test_invalid_item(const char *str) {
30 uint16_t nr_ports, port_min;
31 int af, ip_protocol;
32
33 assert_se(parse_socket_bind_item(str, &af, &ip_protocol, &nr_ports, &port_min) == -EINVAL);
34
35 log_info("%s: \"%s\" ok", __func__, str);
36 }
37
38 TEST(valid_items) {
39 test_valid_item("any", AF_UNSPEC, 0, 0, 0);
40 test_valid_item("0-65535", AF_UNSPEC, 0, 0, 0);
41 test_valid_item("ipv4", AF_INET, 0, 0, 0);
42 test_valid_item("ipv6", AF_INET6, 0, 0, 0);
43 test_valid_item("ipv4:any", AF_INET, 0, 0, 0);
44 test_valid_item("ipv6:any", AF_INET6, 0, 0, 0);
45 test_valid_item("tcp", AF_UNSPEC, IPPROTO_TCP, 0, 0);
46 test_valid_item("udp", AF_UNSPEC, IPPROTO_UDP, 0, 0);
47 test_valid_item("tcp:any", AF_UNSPEC, IPPROTO_TCP, 0, 0);
48 test_valid_item("udp:any", AF_UNSPEC, IPPROTO_UDP, 0, 0);
49 test_valid_item("0", AF_UNSPEC, 0, 1, 0);
50 test_valid_item("6666", AF_UNSPEC, 0, 1, 6666);
51 test_valid_item("6666-6667", AF_UNSPEC, 0, 2, 6666);
52 test_valid_item("65535", AF_UNSPEC, 0, 1, 65535);
53 test_valid_item("1-65535", AF_UNSPEC, 0, 65535, 1);
54 test_valid_item("ipv4:tcp", AF_INET, IPPROTO_TCP, 0, 0);
55 test_valid_item("ipv4:udp", AF_INET, IPPROTO_UDP, 0, 0);
56 test_valid_item("ipv6:tcp", AF_INET6, IPPROTO_TCP, 0, 0);
57 test_valid_item("ipv6:udp", AF_INET6, IPPROTO_UDP, 0, 0);
58 test_valid_item("ipv4:6666", AF_INET, 0, 1, 6666);
59 test_valid_item("ipv6:6666", AF_INET6, 0, 1, 6666);
60 test_valid_item("tcp:6666", AF_UNSPEC, IPPROTO_TCP, 1, 6666);
61 test_valid_item("udp:6666", AF_UNSPEC, IPPROTO_UDP, 1, 6666);
62 test_valid_item("ipv4:tcp:6666", AF_INET, IPPROTO_TCP, 1, 6666);
63 test_valid_item("ipv6:tcp:6666", AF_INET6, IPPROTO_TCP, 1, 6666);
64 test_valid_item("ipv6:udp:6666-6667", AF_INET6, IPPROTO_UDP, 2, 6666);
65 test_valid_item("ipv6:tcp:any", AF_INET6, IPPROTO_TCP, 0, 0);
66 test_valid_item("ipv6:tcp:0", AF_INET6, IPPROTO_TCP, 1, 0);
67 }
68
69 TEST(invalid_items) {
70 test_invalid_item("");
71 test_invalid_item(":");
72 test_invalid_item("::");
73 test_invalid_item("any:");
74 test_invalid_item("meh");
75 test_invalid_item("zupa:meh");
76 test_invalid_item("zupa:meh:eh");
77 test_invalid_item("ip");
78 test_invalid_item("dccp");
79 test_invalid_item("ipv6meh");
80 test_invalid_item("ipv6::");
81 test_invalid_item("ipv6:ipv6");
82 test_invalid_item("ipv6:icmp");
83 test_invalid_item("65536");
84 test_invalid_item("ipv6:tcp:6666-6665");
85 test_invalid_item("ipv6:tcp:6666-100000");
86 test_invalid_item("ipv6::6666");
87 test_invalid_item("ipv6:tcp:any:");
88 test_invalid_item("ipv6:tcp:any:ipv6");
89 test_invalid_item("ipv6:tcp:6666:zupa");
90 test_invalid_item("ipv6:tcp:6666:any");
91 test_invalid_item("ipv6:tcp:6666 zupa");
92 test_invalid_item("ipv6:tcp:6666: zupa");
93 test_invalid_item("ipv6:tcp:6666\n zupa");
94 }
95
96 static int test_path_simplify_and_warn_one(const char *p, const char *q, PathSimplifyWarnFlags f) {
97 _cleanup_free_ char *s = ASSERT_PTR(strdup(p));
98 int a, b;
99
100 a = path_simplify_and_warn(s, f, /* unit= */ NULL, /* filename= */ NULL, /* line= */ 0, "Foobar=");
101 assert(streq_ptr(s, q));
102
103 free(s);
104 s = ASSERT_PTR(strdup(p));
105
106 b = path_simplify_and_warn(s, f|PATH_CHECK_FATAL, /* unit= */ NULL, /* filename= */ NULL, /* line= */ 0, "Foobar=");
107 assert(streq_ptr(s, q));
108
109 assert(a == b);
110
111 return a;
112 }
113
114 TEST(path_simplify_and_warn) {
115
116 assert_se(test_path_simplify_and_warn_one("", "", 0) == -EINVAL);
117 assert_se(test_path_simplify_and_warn_one("/", "/", 0) == 0);
118 assert_se(test_path_simplify_and_warn_one("/foo/../bar", "/foo/../bar", 0) == -EINVAL);
119 assert_se(test_path_simplify_and_warn_one("/foo/./bar", "/foo/bar", 0) == 0);
120 assert_se(test_path_simplify_and_warn_one("/proc/self///fd", "/proc/self/fd", 0) == 0);
121 assert_se(test_path_simplify_and_warn_one("/proc/self///fd", "/proc/self/fd", PATH_CHECK_NON_API_VFS) == -EINVAL);
122 assert_se(test_path_simplify_and_warn_one("aaaa", "aaaa", 0) == 0);
123 assert_se(test_path_simplify_and_warn_one("aaaa", "aaaa", PATH_CHECK_ABSOLUTE) == -EINVAL);
124 assert_se(test_path_simplify_and_warn_one("aaaa", "aaaa", PATH_CHECK_RELATIVE) == 0);
125 assert_se(test_path_simplify_and_warn_one("/aaaa", "/aaaa", 0) == 0);
126 assert_se(test_path_simplify_and_warn_one("/aaaa", "/aaaa", PATH_CHECK_ABSOLUTE) == 0);
127 assert_se(test_path_simplify_and_warn_one("/aaaa", "/aaaa", PATH_CHECK_RELATIVE) == -EINVAL);
128
129 }
130
131 DEFINE_TEST_MAIN(LOG_INFO);