mirror of
https://github.com/morgan9e/systemd
synced 2026-04-15 00:47:10 +09:00
158 lines
5.7 KiB
C
158 lines
5.7 KiB
C
/* SPDX-License-Identifier: LGPL-2.1-or-later */
|
|
|
|
#include <stdio.h>
|
|
|
|
#include "alloc-util.h"
|
|
#include "capability-list.h"
|
|
#include "capability-util.h"
|
|
#include "parse-util.h"
|
|
#include "random-util.h"
|
|
#include "string-util.h"
|
|
#include "strv.h"
|
|
#include "tests.h"
|
|
|
|
/* verify the capability parser */
|
|
TEST(cap_list) {
|
|
assert_se(!capability_to_name(-1));
|
|
assert_se(!capability_to_name(capability_list_length()));
|
|
assert_se(!capability_to_name(63));
|
|
assert_se(!capability_to_name(64));
|
|
|
|
assert_se(!CAPABILITY_TO_STRING(-1));
|
|
if (capability_list_length() <= 62)
|
|
ASSERT_STREQ(CAPABILITY_TO_STRING(62), "0x3e");
|
|
assert_se(!CAPABILITY_TO_STRING(64));
|
|
|
|
for (unsigned i = 0; i < capability_list_length(); i++) {
|
|
const char *n;
|
|
|
|
ASSERT_NOT_NULL(n = capability_to_name(i));
|
|
ASSERT_OK_EQ(capability_from_name(n), (int) i);
|
|
printf("%s = %u\n", n, i);
|
|
|
|
ASSERT_STREQ(CAPABILITY_TO_STRING(i), n);
|
|
}
|
|
|
|
assert_se(capability_from_name("asdfbsd") == -EINVAL);
|
|
assert_se(capability_from_name("CAP_AUDIT_READ") == CAP_AUDIT_READ);
|
|
assert_se(capability_from_name("cap_audit_read") == CAP_AUDIT_READ);
|
|
assert_se(capability_from_name("cAp_aUdIt_rEAd") == CAP_AUDIT_READ);
|
|
assert_se(capability_from_name("0") == 0);
|
|
assert_se(capability_from_name("15") == 15);
|
|
assert_se(capability_from_name("62") == 62);
|
|
assert_se(capability_from_name("63") == -EINVAL);
|
|
assert_se(capability_from_name("64") == -EINVAL);
|
|
assert_se(capability_from_name("-1") == -EINVAL);
|
|
}
|
|
|
|
static void test_capability_set_one(uint64_t c, const char *t) {
|
|
_cleanup_free_ char *t1 = NULL;
|
|
uint64_t c1, c_masked = c & all_capabilities();
|
|
|
|
assert_se(capability_set_to_string(c, &t1) == 0);
|
|
ASSERT_STREQ(t1, t);
|
|
|
|
assert_se(capability_set_from_string(t1, &c1) > 0);
|
|
assert_se(c1 == c_masked);
|
|
|
|
free(t1);
|
|
assert_se(t1 = strjoin("'cap_chown cap_dac_override' \"cap_setgid cap_setuid\"", t,
|
|
" hogehoge foobar 18446744073709551616 3.14 -3 ", t));
|
|
assert_se(capability_set_from_string(t1, &c1) == 0);
|
|
assert_se(c1 == c_masked);
|
|
}
|
|
|
|
TEST(capability_set_from_string) {
|
|
uint64_t c;
|
|
|
|
assert_se(capability_set_from_string(NULL, &c) > 0);
|
|
assert_se(c == 0);
|
|
|
|
assert_se(capability_set_from_string("", &c) > 0);
|
|
assert_se(c == 0);
|
|
|
|
assert_se(capability_set_from_string("0", &c) > 0);
|
|
assert_se(c == UINT64_C(1));
|
|
|
|
assert_se(capability_set_from_string("1", &c) > 0);
|
|
assert_se(c == UINT64_C(1) << 1);
|
|
|
|
assert_se(capability_set_from_string("0 1 2 3", &c) > 0);
|
|
assert_se(c == (UINT64_C(1) << 4) - 1);
|
|
}
|
|
|
|
static void test_capability_set_to_strv_one(uint64_t m, char **l) {
|
|
_cleanup_strv_free_ char **b = NULL;
|
|
|
|
assert_se(capability_set_to_strv(m, &b) >= 0);
|
|
assert_se(strv_equal(l, b));
|
|
}
|
|
|
|
TEST(capability_set_to_strv) {
|
|
test_capability_set_to_strv_one(0, STRV_MAKE(NULL));
|
|
test_capability_set_to_strv_one(UINT64_C(1) << CAP_MKNOD, STRV_MAKE("cap_mknod"));
|
|
test_capability_set_to_strv_one((UINT64_C(1) << CAP_MKNOD) |
|
|
(UINT64_C(1) << CAP_NET_BIND_SERVICE), STRV_MAKE("cap_net_bind_service", "cap_mknod"));
|
|
test_capability_set_to_strv_one((UINT64_C(1) << CAP_MKNOD) |
|
|
(UINT64_C(1) << CAP_NET_BIND_SERVICE) |
|
|
(UINT64_C(1) << CAP_IPC_OWNER), STRV_MAKE("cap_net_bind_service", "cap_ipc_owner", "cap_mknod"));
|
|
}
|
|
|
|
static void test_capability_set_to_string_invalid(uint64_t invalid_cap_set) {
|
|
uint64_t c;
|
|
|
|
test_capability_set_one(invalid_cap_set, "");
|
|
|
|
c = (UINT64_C(1) << CAP_DAC_OVERRIDE | invalid_cap_set);
|
|
test_capability_set_one(c, "cap_dac_override");
|
|
|
|
c = (UINT64_C(1) << CAP_CHOWN |
|
|
UINT64_C(1) << CAP_DAC_OVERRIDE |
|
|
UINT64_C(1) << CAP_DAC_READ_SEARCH |
|
|
UINT64_C(1) << CAP_FOWNER |
|
|
UINT64_C(1) << CAP_SETGID |
|
|
UINT64_C(1) << CAP_SETUID |
|
|
UINT64_C(1) << CAP_SYS_PTRACE |
|
|
UINT64_C(1) << CAP_SYS_ADMIN |
|
|
UINT64_C(1) << CAP_AUDIT_CONTROL |
|
|
UINT64_C(1) << CAP_MAC_OVERRIDE |
|
|
UINT64_C(1) << CAP_SYSLOG |
|
|
invalid_cap_set);
|
|
test_capability_set_one(c, ("cap_chown cap_dac_override cap_dac_read_search cap_fowner "
|
|
"cap_setgid cap_setuid cap_sys_ptrace cap_sys_admin "
|
|
"cap_audit_control cap_mac_override cap_syslog"));
|
|
}
|
|
|
|
TEST(capability_set_to_string) {
|
|
test_capability_set_to_string_invalid(0);
|
|
|
|
/* once the kernel supports 62 (CAP_LIMIT) caps, there are no 'invalid' numbers
|
|
* for us to test with */
|
|
if (cap_last_cap() < CAP_LIMIT)
|
|
test_capability_set_to_string_invalid(all_capabilities() + 1);
|
|
}
|
|
|
|
TEST(capability_set_to_string_negative) {
|
|
|
|
for (unsigned i = 0; i < 150; i++) {
|
|
_cleanup_free_ char *a = NULL, *b = NULL;
|
|
|
|
uint64_t m =
|
|
random_u64() % (UINT64_C(1) << (cap_last_cap() + 1));
|
|
|
|
ASSERT_OK(capability_set_to_string(m, &a));
|
|
ASSERT_OK(capability_set_to_string_negative(m, &b));
|
|
|
|
printf("%s (%zu) → ", a, strlen(a));
|
|
|
|
if (streq(a, b))
|
|
printf("same\n");
|
|
else
|
|
printf("%s (%zu)\n", b, strlen(b));
|
|
|
|
ASSERT_LE(strlen(b), strlen(a));
|
|
}
|
|
}
|
|
|
|
DEFINE_TEST_MAIN(LOG_INFO);
|