summaryrefslogtreecommitdiffstats
path: root/src/test/test-rm-rf.c
blob: 4c69bd28c9d183c2ccd8aea4bbbb45dc3a774e96 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
/* SPDX-License-Identifier: LGPL-2.1-or-later */

#include <unistd.h>

#include "alloc-util.h"
#include "process-util.h"
#include "rm-rf.h"
#include "string-util.h"
#include "tests.h"
#include "tmpfile-util.h"

static void test_rm_rf_chmod_inner(void) {
        _cleanup_(rm_rf_physical_and_freep) char *d = NULL;
        const char *a, *b, *x, *y;
        struct stat st;

        assert_se(getuid() != 0);

        assert_se(mkdtemp_malloc("/tmp/test-rm-rf.XXXXXXX", &d) >= 0);
        a = strjoina(d, "/a");
        b = strjoina(a, "/b");
        x = strjoina(d, "/x");
        y = strjoina(x, "/y");

        assert_se(mkdir(x, 0700) >= 0);
        assert_se(mknod(y, S_IFREG | 0600, 0) >= 0);

        assert_se(chmod(y, 0400) >= 0);
        assert_se(chmod(x, 0500) >= 0);
        assert_se(chmod(d, 0500) >= 0);

        assert_se(rm_rf(d, REMOVE_PHYSICAL) == -EACCES);

        assert_se(access(d, F_OK) >= 0);
        assert_se(access(x, F_OK) >= 0);
        assert_se(access(y, F_OK) >= 0);

        assert_se(rm_rf(d, REMOVE_PHYSICAL|REMOVE_CHMOD) >= 0);

        assert_se(access(d, F_OK) >= 0);
        assert_se(access(x, F_OK) < 0 && errno == ENOENT);
        assert_se(access(y, F_OK) < 0 && errno == ENOENT);

        assert_se(mkdir(a, 0700) >= 0);
        assert_se(mkdir(b, 0700) >= 0);
        assert_se(mkdir(x, 0700) >= 0);
        assert_se(mknod(y, S_IFREG | 0600, 0) >= 0);

        assert_se(chmod(b, 0000) >= 0);
        assert_se(chmod(a, 0000) >= 0);
        assert_se(chmod(y, 0000) >= 0);
        assert_se(chmod(x, 0000) >= 0);
        assert_se(chmod(d, 0500) >= 0);

        assert_se(rm_rf(d, REMOVE_PHYSICAL|REMOVE_CHMOD|REMOVE_CHMOD_RESTORE|REMOVE_ONLY_DIRECTORIES) == -ENOTEMPTY);

        assert_se(access(a, F_OK) < 0 && errno == ENOENT);
        assert_se(access(d, F_OK) >= 0);
        assert_se(stat(d, &st) >= 0 && (st.st_mode & 07777) == 0500);
        assert_se(access(x, F_OK) >= 0);
        assert_se(stat(x, &st) >= 0 && (st.st_mode & 07777) == 0000);
        assert_se(chmod(x, 0700) >= 0);
        assert_se(access(y, F_OK) >= 0);
        assert_se(stat(y, &st) >= 0 && (st.st_mode & 07777) == 0000);

        assert_se(chmod(y, 0000) >= 0);
        assert_se(chmod(x, 0000) >= 0);
        assert_se(chmod(d, 0000) >= 0);

        assert_se(rm_rf(d, REMOVE_PHYSICAL|REMOVE_CHMOD|REMOVE_CHMOD_RESTORE) >= 0);

        assert_se(stat(d, &st) >= 0 && (st.st_mode & 07777) == 0000);
        assert_se(access(d, F_OK) >= 0);
        assert_se(chmod(d, 0700) >= 0);
        assert_se(access(x, F_OK) < 0 && errno == ENOENT);

        assert_se(mkdir(x, 0700) >= 0);
        assert_se(mknod(y, S_IFREG | 0600, 0) >= 0);

        assert_se(chmod(y, 0000) >= 0);
        assert_se(chmod(x, 0000) >= 0);
        assert_se(chmod(d, 0000) >= 0);

        assert_se(rm_rf(d, REMOVE_PHYSICAL|REMOVE_CHMOD|REMOVE_ROOT) >= 0);

        assert_se(access(d, F_OK) < 0 && errno == ENOENT);
}

TEST(rm_rf_chmod) {
        int r;

        if (getuid() == 0) {
                /* This test only works unpriv (as only then the access mask for the owning user matters),
                 * hence drop privs here */

                r = safe_fork("(setresuid)", FORK_DEATHSIG_SIGTERM|FORK_WAIT, NULL);
                assert_se(r >= 0);

                if (r == 0) {
                        /* child */

                        assert_se(setresuid(1, 1, 1) >= 0);

                        test_rm_rf_chmod_inner();
                        _exit(EXIT_SUCCESS);
                }

                return;
        }

        test_rm_rf_chmod_inner();
}

DEFINE_TEST_MAIN(LOG_DEBUG);