[kdbus] KDBUS_ITEM_PAYLOAD_OFF items are (once again) relative to msg header
[platform/upstream/glib.git] / gio / tests / credentials.c
1 /* GLib testing framework examples and tests
2  *
3  * Copyright © 2012 Collabora Ltd.
4  *
5  * This work is provided "as is"; redistribution and modification
6  * in whole or in part, in any medium, physical or electronic is
7  * permitted without restriction.
8  *
9  * This work is distributed in the hope that it will be useful,
10  * but WITHOUT ANY WARRANTY; without even the implied warranty of
11  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
12  *
13  * In no event shall the authors or contributors be liable for any
14  * direct, indirect, incidental, special, exemplary, or consequential
15  * damages (including, but not limited to, procurement of substitute
16  * goods or services; loss of use, data, or profits; or business
17  * interruption) however caused and on any theory of liability, whether
18  * in contract, strict liability, or tort (including negligence or
19  * otherwise) arising in any way out of the use of this software, even
20  * if advised of the possibility of such damage.
21  */
22
23 #include "config.h"
24
25 #include <gio/gio.h>
26 #include <gio/gcredentialsprivate.h>
27
28 static void
29 test_basic (void)
30 {
31   GCredentials *creds = g_credentials_new ();
32   GCredentials *other = g_credentials_new ();
33   gpointer bad_native_creds;
34 #if G_CREDENTIALS_SUPPORTED
35   GError *error = NULL;
36   gboolean set;
37   pid_t not_me;
38   gchar *stringified;
39 #endif
40
41   /* You can always get a credentials object, but it might not work. */
42   g_assert (creds != NULL);
43   g_assert (other != NULL);
44
45 #if G_CREDENTIALS_SUPPORTED
46   g_assert (g_credentials_is_same_user (creds, other, &error));
47   g_assert_no_error (error);
48
49   if (geteuid () == 0)
50     not_me = 65534; /* traditionally 'nobody' */
51   else
52     not_me = 0;
53
54   g_assert_cmpuint (g_credentials_get_unix_user (creds, &error), ==,
55       geteuid ());
56   g_assert_no_error (error);
57   g_assert_cmpuint (g_credentials_get_unix_pid (creds, &error), ==,
58       getpid ());
59   g_assert_no_error (error);
60
61   set = g_credentials_set_unix_user (other, not_me, &error);
62 #if G_CREDENTIALS_SPOOFING_SUPPORTED
63   g_assert_no_error (error);
64   g_assert (set);
65
66   g_assert_cmpuint (g_credentials_get_unix_user (other, &error), ==, not_me);
67   g_assert (!g_credentials_is_same_user (creds, other, &error));
68   g_assert_no_error (error);
69 #else
70   g_assert_error (error, G_IO_ERROR, G_IO_ERROR_PERMISSION_DENIED);
71   g_assert (!set);
72   g_clear_error (&error);
73
74   g_assert_cmpuint (g_credentials_get_unix_user (other, &error), ==, geteuid ());
75   g_assert (g_credentials_is_same_user (creds, other, &error));
76   g_assert_no_error (error);
77 #endif
78
79   stringified = g_credentials_to_string (creds);
80   g_test_message ("%s", stringified);
81   g_free (stringified);
82
83   stringified = g_credentials_to_string (other);
84   g_test_message ("%s", stringified);
85   g_free (stringified);
86
87 #if G_CREDENTIALS_USE_LINUX_UCRED
88         {
89           struct ucred *native = g_credentials_get_native (creds,
90               G_CREDENTIALS_TYPE_LINUX_UCRED);
91
92           g_assert_cmpuint (native->uid, ==, geteuid ());
93           g_assert_cmpuint (native->pid, ==, getpid ());
94         }
95 #elif G_CREDENTIALS_USE_FREEBSD_CMSGCRED
96         {
97           struct cmsgcred *native = g_credentials_get_native (creds,
98               G_CREDENTIALS_TYPE_FREEBSD_CMSGCRED);
99
100           g_assert_cmpuint (native->cmcred_euid, ==, geteuid ());
101           g_assert_cmpuint (native->cmcred_pid, ==, getpid ());
102         }
103 #elif G_CREDENTIALS_USE_NETBSD_UNPCBID
104         {
105           struct unpcbid *native = g_credentials_get_native (creds,
106               G_CREDENTIALS_TYPE_NETBSD_UNPCBID);
107
108           g_assert_cmpuint (native->unp_euid, ==, geteuid ());
109           g_assert_cmpuint (native->unp_pid, ==, getpid ());
110         }
111 #elif G_CREDENTIALS_USE_OPENBSD_SOCKPEERCRED
112         {
113           struct sockpeercred *native = g_credentials_get_native (creds,
114               G_CREDENTIALS_TYPE_OPENBSD_SOCKPEERCRED);
115
116           g_assert_cmpuint (native->uid, ==, geteuid ());
117           g_assert_cmpuint (native->pid, ==, getpid ());
118         }
119 #elif G_CREDENTIALS_USE_SOLARIS_UCRED
120         {
121           ucred_t *native = g_credentials_get_native (creds,
122               G_CREDENTIALS_TYPE_SOLARIS_UCRED);
123
124           g_assert_cmpuint (ucred_geteuid (native), ==, geteuid ());
125           g_assert_cmpuint (ucred_getpid (native), ==, getpid ());
126         }
127 #else
128 #error "G_CREDENTIALS_SUPPORTED is set but there is no test for this platform"
129 #endif
130
131
132 #if G_CREDENTIALS_USE_LINUX_UCRED
133   g_test_expect_message (G_LOG_DOMAIN, G_LOG_LEVEL_WARNING,
134                          "*g_credentials_get_native: Trying to get*"
135                          "G_CREDENTIALS_TYPE_FREEBSD_CMSGCRED "
136                          "but only G_CREDENTIALS_TYPE_LINUX_UCRED*"
137                          "supported*");
138   bad_native_creds = g_credentials_get_native (creds, G_CREDENTIALS_TYPE_FREEBSD_CMSGCRED);
139   g_test_assert_expected_messages ();
140   g_assert_null (bad_native_creds);
141 #else
142   g_test_expect_message (G_LOG_DOMAIN, G_LOG_LEVEL_WARNING,
143                          "*g_credentials_get_native: Trying to get*"
144                          "G_CREDENTIALS_TYPE_LINUX_UCRED "
145                          "but only G_CREDENTIALS_TYPE_*supported*");
146   bad_native_creds = g_credentials_get_native (creds, G_CREDENTIALS_TYPE_LINUX_UCRED);
147   g_test_assert_expected_messages ();
148   g_assert_null (bad_native_creds);
149 #endif
150
151 #else /* ! G_CREDENTIALS_SUPPORTED */
152
153   g_test_expect_message (G_LOG_DOMAIN, G_LOG_LEVEL_WARNING,
154                          "*g_credentials_get_native: Trying to get "
155                          "credentials *but*no support*");
156   bad_native_creds = g_credentials_get_native (creds, G_CREDENTIALS_TYPE_LINUX_UCRED);
157   g_test_assert_expected_messages ();
158   g_assert_null (bad_native_creds);
159 #endif
160
161   g_object_unref (creds);
162   g_object_unref (other);
163 }
164
165 int
166 main (int   argc,
167       char *argv[])
168 {
169   g_test_init (&argc, &argv, NULL);
170
171   g_test_add_func ("/credentials/basic", test_basic);
172
173   return g_test_run();
174 }