1228753Smm/*-
2228753Smm * Copyright (c) 2003-2009 Tim Kientzle
3228753Smm * All rights reserved.
4228753Smm *
5228753Smm * Redistribution and use in source and binary forms, with or without
6228753Smm * modification, are permitted provided that the following conditions
7228753Smm * are met:
8228753Smm * 1. Redistributions of source code must retain the above copyright
9228753Smm *    notice, this list of conditions and the following disclaimer.
10228753Smm * 2. Redistributions in binary form must reproduce the above copyright
11228753Smm *    notice, this list of conditions and the following disclaimer in the
12228753Smm *    documentation and/or other materials provided with the distribution.
13228753Smm *
14228753Smm * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
15228753Smm * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16228753Smm * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17228753Smm * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
18228753Smm * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19228753Smm * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20228753Smm * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21228753Smm * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22228753Smm * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23228753Smm * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24228753Smm */
25228753Smm#include "test.h"
26228753Smm__FBSDID("$FreeBSD$");
27228753Smm
28228753Smm#include "../cpio.h"
29228753Smm#include "err.h"
30228753Smm
31228753Smm#if !defined(_WIN32)
32228753Smm#define ROOT "root"
33232153Smmstatic const int root_uids[] = { 0 };
34232153Smmstatic const int root_gids[] = { 0, 1 };
35228753Smm#elif defined(__CYGWIN__)
36228753Smm/* On cygwin, the Administrator user most likely exists (unless
37228753Smm * it has been renamed or is in a non-English localization), but
38228753Smm * its primary group membership depends on how the user set up
39228753Smm * their /etc/passwd. Likely values are 513 (None), 545 (Users),
40228753Smm * or 544 (Administrators). Just check for one of those...
41228753Smm * TODO: Handle non-English localizations...e.g. French 'Administrateur'
42228753Smm *       Use CreateWellKnownSID() and LookupAccountName()?
43228753Smm */
44228753Smm#define ROOT "Administrator"
45232153Smmstatic const int root_uids[] = { 500 };
46232153Smmstatic const int root_gids[] = { 513, 545, 544 };
47228753Smm#endif
48228753Smm
49228753Smm#if defined(ROOT)
50228753Smmstatic int
51232153Smmint_in_list(int i, const int *l, size_t n)
52228753Smm{
53228753Smm	while (n-- > 0)
54228753Smm		if (*l++ == i)
55228753Smm			return (1);
56228753Smm	failure("%d", i);
57228753Smm	return (0);
58228753Smm}
59228753Smm#endif
60228753Smm
61228753SmmDEFINE_TEST(test_owner_parse)
62228753Smm{
63228753Smm#if !defined(ROOT)
64228753Smm	skipping("No uid/gid configuration for this OS");
65228753Smm#else
66228753Smm	int uid, gid;
67228753Smm
68228753Smm	assert(NULL == owner_parse(ROOT, &uid, &gid));
69228753Smm	assert(int_in_list(uid, root_uids,
70228753Smm		sizeof(root_uids)/sizeof(root_uids[0])));
71228753Smm	assertEqualInt(-1, gid);
72228753Smm
73228753Smm
74228753Smm	assert(NULL == owner_parse(ROOT ":", &uid, &gid));
75228753Smm	assert(int_in_list(uid, root_uids,
76228753Smm		sizeof(root_uids)/sizeof(root_uids[0])));
77228753Smm	assert(int_in_list(gid, root_gids,
78228753Smm		sizeof(root_gids)/sizeof(root_gids[0])));
79228753Smm
80228753Smm	assert(NULL == owner_parse(ROOT ".", &uid, &gid));
81228753Smm	assert(int_in_list(uid, root_uids,
82228753Smm		sizeof(root_uids)/sizeof(root_uids[0])));
83228753Smm	assert(int_in_list(gid, root_gids,
84228753Smm		sizeof(root_gids)/sizeof(root_gids[0])));
85228753Smm
86228753Smm	assert(NULL == owner_parse("111", &uid, &gid));
87228753Smm	assertEqualInt(111, uid);
88228753Smm	assertEqualInt(-1, gid);
89228753Smm
90228753Smm	assert(NULL == owner_parse("112:", &uid, &gid));
91228753Smm	assertEqualInt(112, uid);
92228753Smm	/* Can't assert gid, since we don't know gid for user #112. */
93228753Smm
94228753Smm	assert(NULL == owner_parse("113.", &uid, &gid));
95228753Smm	assertEqualInt(113, uid);
96228753Smm	/* Can't assert gid, since we don't know gid for user #113. */
97228753Smm
98228753Smm	assert(NULL == owner_parse(":114", &uid, &gid));
99228753Smm	assertEqualInt(-1, uid);
100228753Smm	assertEqualInt(114, gid);
101228753Smm
102228753Smm	assert(NULL == owner_parse(".115", &uid, &gid));
103228753Smm	assertEqualInt(-1, uid);
104228753Smm	assertEqualInt(115, gid);
105228753Smm
106228753Smm	assert(NULL == owner_parse("116:117", &uid, &gid));
107228753Smm	assertEqualInt(116, uid);
108228753Smm	assertEqualInt(117, gid);
109228753Smm
110228753Smm	/*
111228753Smm	 * TODO: Lookup current user/group name, build strings and
112228753Smm	 * use those to verify username/groupname lookups for ordinary
113228753Smm	 * users.
114228753Smm	 */
115228753Smm
116228753Smm	assert(NULL != owner_parse(":nonexistentgroup", &uid, &gid));
117228753Smm	assert(NULL != owner_parse(ROOT ":nonexistentgroup", &uid, &gid));
118228753Smm	assert(NULL !=
119228753Smm	    owner_parse("nonexistentuser:nonexistentgroup", &uid, &gid));
120228753Smm#endif
121228753Smm}
122