| /* |
| * Copyright (C) 2015 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| #include "util.h" |
| |
| #include <errno.h> |
| #include <fcntl.h> |
| #include <sys/stat.h> |
| |
| #include <android-base/file.h> |
| #include <android-base/stringprintf.h> |
| #include <gtest/gtest.h> |
| |
| using namespace std::literals::string_literals; |
| |
| namespace android { |
| namespace init { |
| |
| TEST(util, ReadFile_ENOENT) { |
| errno = 0; |
| auto file_contents = ReadFile("/proc/does-not-exist"); |
| EXPECT_EQ(ENOENT, errno); |
| ASSERT_FALSE(file_contents.ok()); |
| EXPECT_EQ("open() failed: No such file or directory", file_contents.error().message()); |
| } |
| |
| TEST(util, ReadFileGroupWriteable) { |
| std::string s("hello"); |
| TemporaryFile tf; |
| ASSERT_TRUE(tf.fd != -1); |
| EXPECT_RESULT_OK(WriteFile(tf.path, s)); |
| EXPECT_NE(-1, fchmodat(AT_FDCWD, tf.path, 0620, AT_SYMLINK_NOFOLLOW)) << strerror(errno); |
| auto file_contents = ReadFile(tf.path); |
| ASSERT_FALSE(file_contents.ok()) << strerror(errno); |
| EXPECT_EQ("Skipping insecure file", file_contents.error().message()); |
| } |
| |
| TEST(util, ReadFileWorldWiteable) { |
| std::string s("hello"); |
| TemporaryFile tf; |
| ASSERT_TRUE(tf.fd != -1); |
| EXPECT_RESULT_OK(WriteFile(tf.path, s)); |
| EXPECT_NE(-1, fchmodat(AT_FDCWD, tf.path, 0602, AT_SYMLINK_NOFOLLOW)) << strerror(errno); |
| auto file_contents = ReadFile(tf.path); |
| ASSERT_FALSE(file_contents.ok()); |
| EXPECT_EQ("Skipping insecure file", file_contents.error().message()); |
| } |
| |
| TEST(util, ReadFileSymbolicLink) { |
| errno = 0; |
| // lrwxr-xr-x 1 root shell 6 2009-01-01 09:00 /system/bin/ps -> toybox |
| auto file_contents = ReadFile("/system/bin/ps"); |
| EXPECT_EQ(ELOOP, errno); |
| ASSERT_FALSE(file_contents.ok()); |
| EXPECT_EQ("open() failed: Too many symbolic links encountered", |
| file_contents.error().message()); |
| } |
| |
| TEST(util, ReadFileSuccess) { |
| auto file_contents = ReadFile("/proc/version"); |
| ASSERT_TRUE(file_contents.ok()); |
| EXPECT_GT(file_contents->length(), 6U); |
| EXPECT_EQ('\n', file_contents->at(file_contents->length() - 1)); |
| (*file_contents)[5] = 0; |
| EXPECT_STREQ("Linux", file_contents->c_str()); |
| } |
| |
| TEST(util, WriteFileBinary) { |
| std::string contents("abcd"); |
| contents.push_back('\0'); |
| contents.push_back('\0'); |
| contents.append("dcba"); |
| ASSERT_EQ(10u, contents.size()); |
| |
| TemporaryFile tf; |
| ASSERT_TRUE(tf.fd != -1); |
| EXPECT_RESULT_OK(WriteFile(tf.path, contents)); |
| |
| auto read_back_contents = ReadFile(tf.path); |
| ASSERT_RESULT_OK(read_back_contents); |
| EXPECT_EQ(contents, *read_back_contents); |
| EXPECT_EQ(10u, read_back_contents->size()); |
| } |
| |
| TEST(util, WriteFileNotExist) { |
| std::string s("hello"); |
| TemporaryDir test_dir; |
| std::string path = android::base::StringPrintf("%s/does-not-exist", test_dir.path); |
| EXPECT_RESULT_OK(WriteFile(path, s)); |
| auto file_contents = ReadFile(path); |
| ASSERT_RESULT_OK(file_contents); |
| EXPECT_EQ(s, *file_contents); |
| struct stat sb; |
| int fd = open(path.c_str(), O_RDONLY | O_NOFOLLOW | O_CLOEXEC); |
| EXPECT_NE(-1, fd); |
| EXPECT_EQ(0, fstat(fd, &sb)); |
| EXPECT_EQ(0, close(fd)); |
| EXPECT_EQ((const unsigned int)(S_IRUSR | S_IWUSR), sb.st_mode & 0777); |
| EXPECT_EQ(0, unlink(path.c_str())); |
| } |
| |
| TEST(util, WriteFileExist) { |
| TemporaryFile tf; |
| ASSERT_TRUE(tf.fd != -1); |
| EXPECT_RESULT_OK(WriteFile(tf.path, "1hello1")); |
| auto file_contents = ReadFile(tf.path); |
| ASSERT_RESULT_OK(file_contents); |
| EXPECT_EQ("1hello1", *file_contents); |
| EXPECT_RESULT_OK(WriteFile(tf.path, "2ll2")); |
| file_contents = ReadFile(tf.path); |
| ASSERT_RESULT_OK(file_contents); |
| EXPECT_EQ("2ll2", *file_contents); |
| } |
| |
| TEST(util, DecodeUid) { |
| auto decoded_uid = DecodeUid("root"); |
| EXPECT_TRUE(decoded_uid.ok()); |
| EXPECT_EQ(0U, *decoded_uid); |
| |
| decoded_uid = DecodeUid("toot"); |
| EXPECT_FALSE(decoded_uid.ok()); |
| EXPECT_EQ("getpwnam failed: No such file or directory", decoded_uid.error().message()); |
| |
| decoded_uid = DecodeUid("123"); |
| EXPECT_RESULT_OK(decoded_uid); |
| EXPECT_EQ(123U, *decoded_uid); |
| } |
| |
| TEST(util, is_dir) { |
| TemporaryDir test_dir; |
| EXPECT_TRUE(is_dir(test_dir.path)); |
| TemporaryFile tf; |
| EXPECT_FALSE(is_dir(tf.path)); |
| } |
| |
| TEST(util, mkdir_recursive) { |
| TemporaryDir test_dir; |
| std::string path = android::base::StringPrintf("%s/three/directories/deep", test_dir.path); |
| EXPECT_TRUE(mkdir_recursive(path, 0755)); |
| std::string path1 = android::base::StringPrintf("%s/three", test_dir.path); |
| EXPECT_TRUE(is_dir(path1.c_str())); |
| std::string path2 = android::base::StringPrintf("%s/three/directories", test_dir.path); |
| EXPECT_TRUE(is_dir(path1.c_str())); |
| std::string path3 = android::base::StringPrintf("%s/three/directories/deep", test_dir.path); |
| EXPECT_TRUE(is_dir(path1.c_str())); |
| } |
| |
| TEST(util, mkdir_recursive_extra_slashes) { |
| TemporaryDir test_dir; |
| std::string path = android::base::StringPrintf("%s/three////directories/deep//", test_dir.path); |
| EXPECT_TRUE(mkdir_recursive(path, 0755)); |
| std::string path1 = android::base::StringPrintf("%s/three", test_dir.path); |
| EXPECT_TRUE(is_dir(path1.c_str())); |
| std::string path2 = android::base::StringPrintf("%s/three/directories", test_dir.path); |
| EXPECT_TRUE(is_dir(path1.c_str())); |
| std::string path3 = android::base::StringPrintf("%s/three/directories/deep", test_dir.path); |
| EXPECT_TRUE(is_dir(path1.c_str())); |
| } |
| |
| TEST(util, CleanDirPath) { |
| EXPECT_EQ("", CleanDirPath("")); |
| EXPECT_EQ("/", CleanDirPath("/")); |
| EXPECT_EQ("/", CleanDirPath("//")); |
| EXPECT_EQ("/foo", CleanDirPath("/foo")); |
| EXPECT_EQ("/foo", CleanDirPath("//foo")); |
| EXPECT_EQ("/foo", CleanDirPath("/foo/")); |
| EXPECT_EQ("/foo/bar", CleanDirPath("/foo/bar")); |
| EXPECT_EQ("/foo/bar", CleanDirPath("/foo/bar/")); |
| EXPECT_EQ("/foo/bar", CleanDirPath("/foo/bar////")); |
| EXPECT_EQ("/foo/bar", CleanDirPath("//foo//bar")); |
| } |
| |
| } // namespace init |
| } // namespace android |