/* SPDX-License-Identifier: LGPL-2.1-or-later */ #include #include #include #include #include "acl-util.h" #include "errno-util.h" #include "fd-util.h" #include "format-util.h" #include "fs-util.h" #include "path-util.h" #include "string-util.h" #include "tests.h" #include "tmpfile-util.h" #include "user-util.h" TEST_RET(add_acls_for_user) { _cleanup_(unlink_tempfilep) char fn[] = "/tmp/test-empty.XXXXXX"; _cleanup_close_ int fd = -EBADF; char *cmd; uid_t uid; int r; FOREACH_STRING(s, "capsh", "getfacl", "ls") { r = find_executable(s, NULL); if (r < 0) return log_tests_skipped_errno(r, "Could not find %s binary: %m", s); } fd = mkostemp_safe(fn); assert_se(fd >= 0); /* Use the mode that user journal files use */ assert_se(fchmod(fd, 0640) == 0); cmd = strjoina("ls -l ", fn); assert_se(system(cmd) == 0); cmd = strjoina("getfacl -p ", fn); assert_se(system(cmd) == 0); if (getuid() == 0) { const char *nobody = NOBODY_USER_NAME; r = get_user_creds(&nobody, &uid, NULL, NULL, NULL, 0); if (r < 0) uid = 0; } else uid = getuid(); r = fd_add_uid_acl_permission(fd, uid, ACL_READ); if (ERRNO_IS_NOT_SUPPORTED(r)) return log_tests_skipped("no ACL support on /tmp"); log_info_errno(r, "fd_add_uid_acl_permission(%i, "UID_FMT", ACL_READ): %m", fd, uid); assert_se(r >= 0); cmd = strjoina("ls -l ", fn); assert_se(system(cmd) == 0); cmd = strjoina("getfacl -p ", fn); assert_se(system(cmd) == 0); /* set the acls again */ r = fd_add_uid_acl_permission(fd, uid, ACL_READ); assert_se(r >= 0); cmd = strjoina("ls -l ", fn); assert_se(system(cmd) == 0); cmd = strjoina("getfacl -p ", fn); assert_se(system(cmd) == 0); return 0; } TEST_RET(fd_acl_make_read_only) { _cleanup_(unlink_tempfilep) char fn[] = "/tmp/test-empty.XXXXXX"; _cleanup_close_ int fd = -EBADF; const char *cmd; struct stat st; int r; FOREACH_STRING(s, "capsh", "getfacl", "ls", "stat") { r = find_executable(s, NULL); if (r < 0) return log_tests_skipped_errno(r, "Could not find %s binary: %m", s); } fd = mkostemp_safe(fn); assert_se(fd >= 0); /* make it more exciting */ (void) fd_add_uid_acl_permission(fd, 1, ACL_READ|ACL_WRITE|ACL_EXECUTE); ASSERT_OK_ERRNO(fstat(fd, &st)); assert_se(FLAGS_SET(st.st_mode, 0200)); cmd = strjoina("getfacl -p ", fn); assert_se(system(cmd) == 0); cmd = strjoina("stat ", fn); assert_se(system(cmd) == 0); log_info("read-only"); assert_se(fd_acl_make_read_only(fd)); ASSERT_OK_ERRNO(fstat(fd, &st)); assert_se((st.st_mode & 0222) == 0000); cmd = strjoina("getfacl -p ", fn); assert_se(system(cmd) == 0); cmd = strjoina("stat ", fn); assert_se(system(cmd) == 0); log_info("writable"); assert_se(fd_acl_make_writable(fd)); ASSERT_OK_ERRNO(fstat(fd, &st)); assert_se((st.st_mode & 0222) == 0200); cmd = strjoina("getfacl -p ", fn); assert_se(system(cmd) == 0); cmd = strjoina("stat ", fn); assert_se(system(cmd) == 0); log_info("read-only"); assert_se(fd_acl_make_read_only(fd)); ASSERT_OK_ERRNO(fstat(fd, &st)); assert_se((st.st_mode & 0222) == 0000); cmd = strjoina("getfacl -p ", fn); assert_se(system(cmd) == 0); cmd = strjoina("stat ", fn); assert_se(system(cmd) == 0); return 0; } DEFINE_TEST_MAIN(LOG_INFO);