mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-28 01:41:14 -06:00
78ad1cfe4f
Refactor nsswitch operations in ipa-extdom-extop plugin to allow use of timeout-enabled nsswitch calls provided by libsss_nss_idmap. Standard POSIX nsswitch API has no way to cancel requests which may cause ipa-extdom-extop requests to hang far too long and potentially exhaust LDAP server workers. In addition, glibc nsswitch API iterates through all nsswitch modules one by one and with multiple parallel requests a lock up may happen in an unrelated nsswitch module like nss_files.so.2. A solution to the latter issue is to directly load nss_sss.so.2 plugin and utilize it. This, however, does not solve a problem with lack of cancellable API. With SSSD 1.16.1, libsss_nss_idmap provides a timeout-enabled variant of nsswitch API that is directly integrated with SSSD client side machinery used by nss_sss.so.2. As result, this API can be used instead of loading nss_sss.so.2 directly. To support older SSSD version, both direct loading of nss_sss.so.2 and new timeout-enabled API are supported by this changeset. An API to abstract both is designed to be a mix between internal glibc nsswitch API and external nsswitch API that libsss_nss_idmap mimics. API does not expose per-call timeout. Instead, it allows to set a timeout per nsswitch operation context to reduce requirements on information a caller has to maintain. A choice which API to use is made at configure time. In order to test the API, a cmocka test is updated to explicitly load nss_files.so.2 as a backend. Since use of nss_sss.so.2 would always depend on availablility of SSSD, predictable testing would not be possible without it otherwise. Also, cmocka test does not use nss_wrapper anymore because nss_wrapper overrides higher level glibc nsswitch API while we are loading an individual nsswitch module directly. As result, cmocka test overrides fopen() call used by nss_files.so.2 to load /etc/passwd and /etc/group. An overridden version changes paths to /etc/passwd and /etc/group to a local test_data/passwd and test_data/group. This way we can continue testing a backend API for ipa-extdom-extop with the same data as with nss_wrapper. Fixes https://pagure.io/freeipa/issue/5464 Reviewed-By: Christian Heimes <cheimes@redhat.com> Reviewed-By: Simo Sorce <ssorce@redhat.com> Reviewed-By: Robbie Harwood <rharwood@redhat.com>
632 lines
20 KiB
C
632 lines
20 KiB
C
/*
|
|
Authors:
|
|
Sumit Bose <sbose@redhat.com>
|
|
|
|
Copyright (C) 2015 Red Hat
|
|
|
|
Extdom tests
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
#define _GNU_SOURCE
|
|
|
|
#include <errno.h>
|
|
#include <stdarg.h>
|
|
#include <stddef.h>
|
|
#include <setjmp.h>
|
|
#include <cmocka.h>
|
|
|
|
#include <sys/types.h>
|
|
#include <pwd.h>
|
|
|
|
|
|
#include "ipa_extdom.h"
|
|
#include "back_extdom.h"
|
|
#include <stdio.h>
|
|
#include <dlfcn.h>
|
|
|
|
#define MAX_BUF (1024*1024*1024)
|
|
struct test_data {
|
|
struct extdom_req *req;
|
|
struct ipa_extdom_ctx *ctx;
|
|
};
|
|
|
|
/*
|
|
* redefine logging for mocks
|
|
*/
|
|
#ifdef __GNUC__
|
|
__attribute__((format(printf, 3, 4)))
|
|
#endif
|
|
int slapi_log_error(int loglevel, char *subsystem, char *fmt, ...)
|
|
{
|
|
va_list ap;
|
|
va_start(ap, fmt);
|
|
vprint_error(fmt, ap);
|
|
va_end(ap);
|
|
return 0;
|
|
}
|
|
|
|
|
|
/*
|
|
* We cannot run cmocka tests against SSSD as that would require to set up SSSD
|
|
* and the rest of environment. Instead, we compile cmocka tests against
|
|
* back_extdom_nss_sss.c and re-define context initialization to use
|
|
* nsswrapper with our test data.
|
|
*
|
|
* This means we have to keep struct nss_ops_ctx definition in sync with tests!
|
|
*/
|
|
|
|
struct nss_ops_ctx {
|
|
void *dl_handle;
|
|
long int initgroups_start;
|
|
|
|
enum nss_status (*getpwnam_r)(const char *name, struct passwd *result,
|
|
char *buffer, size_t buflen, int *errnop);
|
|
enum nss_status (*getpwuid_r)(uid_t uid, struct passwd *result,
|
|
char *buffer, size_t buflen, int *errnop);
|
|
enum nss_status (*getgrnam_r)(const char *name, struct group *result,
|
|
char *buffer, size_t buflen, int *errnop);
|
|
enum nss_status (*getgrgid_r)(gid_t gid, struct group *result,
|
|
char *buffer, size_t buflen, int *errnop);
|
|
enum nss_status (*initgroups_dyn)(const char *user, gid_t group,
|
|
long int *start, long int *size,
|
|
gid_t **groups, long int limit,
|
|
int *errnop);
|
|
};
|
|
|
|
int cmocka_extdom_init_context(struct nss_ops_ctx **nss_context)
|
|
{
|
|
struct nss_ops_ctx *ctx = NULL;
|
|
|
|
if (nss_context == NULL) {
|
|
return -1;
|
|
}
|
|
|
|
ctx = calloc(1, sizeof(struct nss_ops_ctx));
|
|
|
|
if (ctx == NULL) {
|
|
return ENOMEM;
|
|
}
|
|
*nss_context = ctx;
|
|
|
|
ctx->dl_handle = dlopen("libnss_files.so.2", RTLD_NOW);
|
|
if (ctx->dl_handle == NULL) {
|
|
goto fail;
|
|
}
|
|
|
|
ctx->getpwnam_r = dlsym(ctx->dl_handle, "_nss_files_getpwnam_r");
|
|
if (ctx->getpwnam_r == NULL) {
|
|
goto fail;
|
|
}
|
|
|
|
ctx->getpwuid_r = dlsym(ctx->dl_handle, "_nss_files_getpwuid_r");
|
|
if (ctx->getpwuid_r == NULL) {
|
|
goto fail;
|
|
}
|
|
|
|
ctx->getgrnam_r = dlsym(ctx->dl_handle, "_nss_files_getgrnam_r");
|
|
if (ctx->getgrnam_r == NULL) {
|
|
goto fail;
|
|
}
|
|
|
|
ctx->getgrgid_r = dlsym(ctx->dl_handle, "_nss_files_getgrgid_r");
|
|
if (ctx->getgrgid_r == NULL) {
|
|
goto fail;
|
|
}
|
|
|
|
ctx->initgroups_dyn = dlsym(ctx->dl_handle, "_nss_files_initgroups_dyn");
|
|
if (ctx->initgroups_dyn == NULL) {
|
|
goto fail;
|
|
}
|
|
|
|
return 0;
|
|
|
|
fail:
|
|
back_extdom_free_context(nss_context);
|
|
|
|
return -1;
|
|
}
|
|
|
|
struct {
|
|
const char *o, *n;
|
|
} path_table[] = {
|
|
{ .o = "/etc/passwd", .n = "./test_data/passwd"},
|
|
{ .o = "/etc/group", .n = "./test_data/group"},
|
|
{ .o = NULL, .n = NULL}};
|
|
|
|
FILE *(*original_fopen)(const char*, const char*) = NULL;
|
|
|
|
FILE *fopen(const char *path, const char *mode) {
|
|
const char *_path = NULL;
|
|
|
|
/* Do not handle before-main() cases */
|
|
if (original_fopen == NULL) {
|
|
return NULL;
|
|
}
|
|
for(int i=0; path_table[i].o != NULL; i++) {
|
|
if (strcmp(path, path_table[i].o) == 0) {
|
|
_path = path_table[i].n;
|
|
break;
|
|
}
|
|
}
|
|
return (*original_fopen)(_path ? _path : path, mode);
|
|
}
|
|
|
|
/* Attempt to initialize original_fopen before main()
|
|
* There is no explicit order when all initializers are called,
|
|
* so we might still be late here compared to a code in a shared
|
|
* library initializer, like libselinux */
|
|
void redefined_fopen_ctor (void) __attribute__ ((constructor));
|
|
void redefined_fopen_ctor(void) {
|
|
original_fopen = dlsym(RTLD_NEXT, "fopen");
|
|
}
|
|
|
|
void test_getpwnam_r_wrapper(void **state)
|
|
{
|
|
int ret;
|
|
struct passwd pwd;
|
|
char *buf;
|
|
size_t buf_len, max_big_buf_len;
|
|
struct test_data *test_data;
|
|
|
|
test_data = (struct test_data *) *state;
|
|
|
|
ret = get_buffer(&buf_len, &buf);
|
|
assert_int_equal(ret, 0);
|
|
|
|
ret = getpwnam_r_wrapper(test_data->ctx,
|
|
"non_exisiting_user", &pwd,
|
|
&buf, &buf_len);
|
|
assert_int_equal(ret, ENOENT);
|
|
|
|
ret = getpwnam_r_wrapper(test_data->ctx,
|
|
"user", &pwd, &buf, &buf_len);
|
|
assert_int_equal(ret, 0);
|
|
assert_string_equal(pwd.pw_name, "user");
|
|
assert_string_equal(pwd.pw_passwd, "x");
|
|
assert_int_equal(pwd.pw_uid, 12345);
|
|
assert_int_equal(pwd.pw_gid, 23456);
|
|
assert_string_equal(pwd.pw_gecos, "gecos");
|
|
assert_string_equal(pwd.pw_dir, "/home/user");
|
|
assert_string_equal(pwd.pw_shell, "/bin/shell");
|
|
free(buf);
|
|
|
|
ret = get_buffer(&buf_len, &buf);
|
|
assert_int_equal(ret, 0);
|
|
|
|
ret = getpwnam_r_wrapper(test_data->ctx,
|
|
"user_big", &pwd, &buf, &buf_len);
|
|
assert_int_equal(ret, 0);
|
|
assert_string_equal(pwd.pw_name, "user_big");
|
|
assert_string_equal(pwd.pw_passwd, "x");
|
|
assert_int_equal(pwd.pw_uid, 12346);
|
|
assert_int_equal(pwd.pw_gid, 23457);
|
|
assert_int_equal(strlen(pwd.pw_gecos), 4000 * strlen("gecos"));
|
|
assert_string_equal(pwd.pw_dir, "/home/user_big");
|
|
assert_string_equal(pwd.pw_shell, "/bin/shell");
|
|
free(buf);
|
|
|
|
ret = get_buffer(&buf_len, &buf);
|
|
assert_int_equal(ret, 0);
|
|
|
|
max_big_buf_len = test_data->ctx->max_nss_buf_size;
|
|
test_data->ctx->max_nss_buf_size = 1024;
|
|
ret = getpwnam_r_wrapper(test_data->ctx,
|
|
"user_big", &pwd, &buf, &buf_len);
|
|
test_data->ctx->max_nss_buf_size = max_big_buf_len;
|
|
assert_int_equal(ret, ERANGE);
|
|
free(buf);
|
|
}
|
|
|
|
void test_getpwuid_r_wrapper(void **state)
|
|
{
|
|
int ret;
|
|
struct passwd pwd;
|
|
char *buf;
|
|
size_t buf_len, max_big_buf_len;
|
|
struct test_data *test_data;
|
|
|
|
test_data = (struct test_data *) *state;
|
|
|
|
ret = get_buffer(&buf_len, &buf);
|
|
assert_int_equal(ret, 0);
|
|
|
|
ret = getpwuid_r_wrapper(test_data->ctx, 99999, &pwd, &buf, &buf_len);
|
|
assert_int_equal(ret, ENOENT);
|
|
|
|
ret = getpwuid_r_wrapper(test_data->ctx, 12345, &pwd, &buf, &buf_len);
|
|
assert_int_equal(ret, 0);
|
|
assert_string_equal(pwd.pw_name, "user");
|
|
assert_string_equal(pwd.pw_passwd, "x");
|
|
assert_int_equal(pwd.pw_uid, 12345);
|
|
assert_int_equal(pwd.pw_gid, 23456);
|
|
assert_string_equal(pwd.pw_gecos, "gecos");
|
|
assert_string_equal(pwd.pw_dir, "/home/user");
|
|
assert_string_equal(pwd.pw_shell, "/bin/shell");
|
|
free(buf);
|
|
|
|
ret = get_buffer(&buf_len, &buf);
|
|
assert_int_equal(ret, 0);
|
|
|
|
ret = getpwuid_r_wrapper(test_data->ctx, 12346, &pwd, &buf, &buf_len);
|
|
assert_int_equal(ret, 0);
|
|
assert_string_equal(pwd.pw_name, "user_big");
|
|
assert_string_equal(pwd.pw_passwd, "x");
|
|
assert_int_equal(pwd.pw_uid, 12346);
|
|
assert_int_equal(pwd.pw_gid, 23457);
|
|
assert_int_equal(strlen(pwd.pw_gecos), 4000 * strlen("gecos"));
|
|
assert_string_equal(pwd.pw_dir, "/home/user_big");
|
|
assert_string_equal(pwd.pw_shell, "/bin/shell");
|
|
free(buf);
|
|
|
|
ret = get_buffer(&buf_len, &buf);
|
|
assert_int_equal(ret, 0);
|
|
|
|
max_big_buf_len = test_data->ctx->max_nss_buf_size;
|
|
test_data->ctx->max_nss_buf_size = 1024;
|
|
ret = getpwuid_r_wrapper(test_data->ctx, 12346, &pwd, &buf, &buf_len);
|
|
test_data->ctx->max_nss_buf_size = max_big_buf_len;
|
|
assert_int_equal(ret, ERANGE);
|
|
free(buf);
|
|
}
|
|
|
|
void test_getgrnam_r_wrapper(void **state)
|
|
{
|
|
int ret;
|
|
struct group grp;
|
|
char *buf;
|
|
size_t buf_len, max_big_buf_len;
|
|
struct test_data *test_data;
|
|
|
|
test_data = (struct test_data *) *state;
|
|
|
|
ret = get_buffer(&buf_len, &buf);
|
|
assert_int_equal(ret, 0);
|
|
|
|
ret = getgrnam_r_wrapper(test_data->ctx,
|
|
"non_exisiting_group", &grp, &buf, &buf_len);
|
|
assert_int_equal(ret, ENOENT);
|
|
|
|
ret = getgrnam_r_wrapper(test_data->ctx, "group", &grp, &buf, &buf_len);
|
|
assert_int_equal(ret, 0);
|
|
assert_string_equal(grp.gr_name, "group");
|
|
assert_string_equal(grp.gr_passwd, "x");
|
|
assert_int_equal(grp.gr_gid, 11111);
|
|
assert_string_equal(grp.gr_mem[0], "member0001");
|
|
assert_string_equal(grp.gr_mem[1], "member0002");
|
|
assert_null(grp.gr_mem[2]);
|
|
free(buf);
|
|
|
|
ret = get_buffer(&buf_len, &buf);
|
|
assert_int_equal(ret, 0);
|
|
|
|
ret = getgrnam_r_wrapper(test_data->ctx, "group_big", &grp, &buf, &buf_len);
|
|
assert_int_equal(ret, 0);
|
|
assert_string_equal(grp.gr_name, "group_big");
|
|
assert_string_equal(grp.gr_passwd, "x");
|
|
assert_int_equal(grp.gr_gid, 22222);
|
|
assert_string_equal(grp.gr_mem[0], "member0001");
|
|
assert_string_equal(grp.gr_mem[1], "member0002");
|
|
free(buf);
|
|
|
|
ret = get_buffer(&buf_len, &buf);
|
|
assert_int_equal(ret, 0);
|
|
|
|
max_big_buf_len = test_data->ctx->max_nss_buf_size;
|
|
test_data->ctx->max_nss_buf_size = 1024;
|
|
ret = getgrnam_r_wrapper(test_data->ctx, "group_big", &grp, &buf, &buf_len);
|
|
test_data->ctx->max_nss_buf_size = max_big_buf_len;
|
|
assert_int_equal(ret, ERANGE);
|
|
free(buf);
|
|
}
|
|
|
|
void test_getgrgid_r_wrapper(void **state)
|
|
{
|
|
int ret;
|
|
struct group grp;
|
|
char *buf;
|
|
size_t buf_len, max_big_buf_len;
|
|
struct test_data *test_data;
|
|
|
|
test_data = (struct test_data *) *state;
|
|
|
|
ret = get_buffer(&buf_len, &buf);
|
|
assert_int_equal(ret, 0);
|
|
|
|
ret = getgrgid_r_wrapper(test_data->ctx, 99999, &grp, &buf, &buf_len);
|
|
assert_int_equal(ret, ENOENT);
|
|
|
|
ret = getgrgid_r_wrapper(test_data->ctx, 11111, &grp, &buf, &buf_len);
|
|
assert_int_equal(ret, 0);
|
|
assert_string_equal(grp.gr_name, "group");
|
|
assert_string_equal(grp.gr_passwd, "x");
|
|
assert_int_equal(grp.gr_gid, 11111);
|
|
assert_string_equal(grp.gr_mem[0], "member0001");
|
|
assert_string_equal(grp.gr_mem[1], "member0002");
|
|
assert_null(grp.gr_mem[2]);
|
|
free(buf);
|
|
|
|
ret = get_buffer(&buf_len, &buf);
|
|
assert_int_equal(ret, 0);
|
|
|
|
ret = getgrgid_r_wrapper(test_data->ctx, 22222, &grp, &buf, &buf_len);
|
|
assert_int_equal(ret, 0);
|
|
assert_string_equal(grp.gr_name, "group_big");
|
|
assert_string_equal(grp.gr_passwd, "x");
|
|
assert_int_equal(grp.gr_gid, 22222);
|
|
assert_string_equal(grp.gr_mem[0], "member0001");
|
|
assert_string_equal(grp.gr_mem[1], "member0002");
|
|
free(buf);
|
|
|
|
ret = get_buffer(&buf_len, &buf);
|
|
assert_int_equal(ret, 0);
|
|
|
|
max_big_buf_len = test_data->ctx->max_nss_buf_size;
|
|
test_data->ctx->max_nss_buf_size = 1024;
|
|
ret = getgrgid_r_wrapper(test_data->ctx, 22222, &grp, &buf, &buf_len);
|
|
test_data->ctx->max_nss_buf_size = max_big_buf_len;
|
|
assert_int_equal(ret, ERANGE);
|
|
free(buf);
|
|
}
|
|
|
|
void test_get_user_grouplist(void **state)
|
|
{
|
|
int ret;
|
|
size_t ngroups;
|
|
gid_t *groups;
|
|
size_t c;
|
|
struct test_data *test_data;
|
|
|
|
test_data = (struct test_data *) *state;
|
|
|
|
/* This is a bit odd behaviour of getgrouplist() it does not check if the
|
|
* user exists, only if memberships of the user can be found. */
|
|
ret = get_user_grouplist(test_data->ctx,
|
|
"non_exisiting_user", 23456, &ngroups, &groups);
|
|
assert_int_equal(ret, LDAP_SUCCESS);
|
|
assert_int_equal(ngroups, 1);
|
|
assert_int_equal(groups[0], 23456);
|
|
free(groups);
|
|
|
|
ret = get_user_grouplist(test_data->ctx,
|
|
"member0001", 23456, &ngroups, &groups);
|
|
assert_int_equal(ret, LDAP_SUCCESS);
|
|
assert_int_equal(ngroups, 3);
|
|
assert_int_equal(groups[0], 23456);
|
|
assert_int_equal(groups[1], 11111);
|
|
assert_int_equal(groups[2], 22222);
|
|
free(groups);
|
|
|
|
ret = get_user_grouplist(test_data->ctx,
|
|
"member0003", 23456, &ngroups, &groups);
|
|
assert_int_equal(ret, LDAP_SUCCESS);
|
|
assert_int_equal(ngroups, 2);
|
|
assert_int_equal(groups[0], 23456);
|
|
assert_int_equal(groups[1], 22222);
|
|
free(groups);
|
|
|
|
ret = get_user_grouplist(test_data->ctx,
|
|
"user_big", 23456, &ngroups, &groups);
|
|
assert_int_equal(ret, LDAP_SUCCESS);
|
|
assert_int_equal(ngroups, 1001);
|
|
assert_int_equal(groups[0], 23456);
|
|
for (c = 1; c < ngroups; c++) {
|
|
assert_int_equal(groups[c], 29999 + c);
|
|
}
|
|
free(groups);
|
|
}
|
|
|
|
static int extdom_req_setup(void **state)
|
|
{
|
|
struct test_data *test_data;
|
|
|
|
test_data = calloc(sizeof(struct test_data), 1);
|
|
assert_non_null(test_data);
|
|
|
|
test_data->req = calloc(sizeof(struct extdom_req), 1);
|
|
assert_non_null(test_data->req);
|
|
|
|
test_data->ctx = calloc(sizeof(struct ipa_extdom_ctx), 1);
|
|
assert_non_null(test_data->ctx);
|
|
|
|
test_data->ctx->max_nss_buf_size = MAX_BUF;
|
|
|
|
assert_int_equal(cmocka_extdom_init_context(&test_data->ctx->nss_ctx), 0);
|
|
assert_non_null(test_data->ctx->nss_ctx);
|
|
|
|
back_extdom_set_timeout(test_data->ctx->nss_ctx, 10000);
|
|
*state = test_data;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int extdom_req_teardown(void **state)
|
|
{
|
|
struct test_data *test_data;
|
|
|
|
test_data = (struct test_data *) *state;
|
|
|
|
free_req_data(test_data->req);
|
|
back_extdom_free_context(&test_data->ctx->nss_ctx);
|
|
free(test_data->ctx);
|
|
free(test_data);
|
|
|
|
return 0;
|
|
}
|
|
|
|
void test_set_err_msg(void **state)
|
|
{
|
|
struct extdom_req *req;
|
|
struct test_data *test_data;
|
|
|
|
test_data = (struct test_data *) *state;
|
|
req = test_data->req;
|
|
|
|
assert_null(req->err_msg);
|
|
|
|
set_err_msg(NULL, NULL);
|
|
assert_null(req->err_msg);
|
|
|
|
set_err_msg(req, NULL);
|
|
assert_null(req->err_msg);
|
|
|
|
set_err_msg(req, "Test [%s][%d].", "ABCD", 1234);
|
|
assert_non_null(req->err_msg);
|
|
assert_string_equal(req->err_msg, "Test [ABCD][1234].");
|
|
|
|
set_err_msg(req, "2nd Test [%s][%d].", "ABCD", 1234);
|
|
assert_non_null(req->err_msg);
|
|
assert_string_equal(req->err_msg, "Test [ABCD][1234].");
|
|
}
|
|
|
|
#define TEST_SID "S-1-2-3-4"
|
|
#define TEST_DOMAIN_NAME "DOMAIN"
|
|
|
|
char res_sid[] = {0x30, 0x0e, 0x0a, 0x01, 0x01, 0x04, 0x09, 0x53, 0x2d, 0x31, \
|
|
0x2d, 0x32, 0x2d, 0x33, 0x2d, 0x34};
|
|
char res_nam[] = {0x30, 0x13, 0x0a, 0x01, 0x02, 0x30, 0x0e, 0x04, 0x06, 0x44, \
|
|
0x4f, 0x4d, 0x41, 0x49, 0x4e, 0x04, 0x04, 0x74, 0x65, 0x73, \
|
|
0x74};
|
|
char res_uid[] = {0x30, 0x1c, 0x0a, 0x01, 0x03, 0x30, 0x17, 0x04, 0x06, 0x44, \
|
|
0x4f, 0x4d, 0x41, 0x49, 0x4e, 0x04, 0x04, 0x74, 0x65, 0x73, \
|
|
0x74, 0x02, 0x02, 0x30, 0x39, 0x02, 0x03, 0x00, 0xd4, 0x31};
|
|
char res_gid[] = {0x30, 0x1e, 0x0a, 0x01, 0x04, 0x30, 0x19, 0x04, 0x06, 0x44, \
|
|
0x4f, 0x4d, 0x41, 0x49, 0x4e, 0x04, 0x0a, 0x74, 0x65, 0x73, \
|
|
0x74, 0x5f, 0x67, 0x72, 0x6f, 0x75, 0x70, 0x02, 0x03, 0x00, \
|
|
0xd4, 0x31};
|
|
|
|
void test_encode(void **state)
|
|
{
|
|
int ret;
|
|
struct berval *resp_val;
|
|
struct ipa_extdom_ctx *ctx;
|
|
struct test_data *test_data;
|
|
|
|
test_data = (struct test_data *) *state;
|
|
ctx = test_data->ctx;
|
|
|
|
ctx->max_nss_buf_size = (128*1024*1024);
|
|
|
|
ret = pack_ber_sid(TEST_SID, &resp_val);
|
|
assert_int_equal(ret, LDAP_SUCCESS);
|
|
assert_int_equal(sizeof(res_sid), resp_val->bv_len);
|
|
assert_memory_equal(res_sid, resp_val->bv_val, resp_val->bv_len);
|
|
ber_bvfree(resp_val);
|
|
|
|
ret = pack_ber_name(TEST_DOMAIN_NAME, "test", &resp_val);
|
|
assert_int_equal(ret, LDAP_SUCCESS);
|
|
assert_int_equal(sizeof(res_nam), resp_val->bv_len);
|
|
assert_memory_equal(res_nam, resp_val->bv_val, resp_val->bv_len);
|
|
ber_bvfree(resp_val);
|
|
|
|
ret = pack_ber_user(ctx, RESP_USER, TEST_DOMAIN_NAME, "test", 12345, 54321,
|
|
NULL, NULL, NULL, NULL, &resp_val);
|
|
assert_int_equal(ret, LDAP_SUCCESS);
|
|
assert_int_equal(sizeof(res_uid), resp_val->bv_len);
|
|
assert_memory_equal(res_uid, resp_val->bv_val, resp_val->bv_len);
|
|
ber_bvfree(resp_val);
|
|
|
|
ret = pack_ber_group(RESP_GROUP, TEST_DOMAIN_NAME, "test_group", 54321,
|
|
NULL, NULL, &resp_val);
|
|
assert_int_equal(ret, LDAP_SUCCESS);
|
|
assert_int_equal(sizeof(res_gid), resp_val->bv_len);
|
|
assert_memory_equal(res_gid, resp_val->bv_val, resp_val->bv_len);
|
|
ber_bvfree(resp_val);
|
|
}
|
|
|
|
char req_sid[] = {0x30, 0x11, 0x0a, 0x01, 0x01, 0x0a, 0x01, 0x01, 0x04, 0x09, \
|
|
0x53, 0x2d, 0x31, 0x2d, 0x32, 0x2d, 0x33, 0x2d, 0x34};
|
|
char req_nam[] = {0x30, 0x16, 0x0a, 0x01, 0x02, 0x0a, 0x01, 0x01, 0x30, 0x0e, \
|
|
0x04, 0x06, 0x44, 0x4f, 0x4d, 0x41, 0x49, 0x4e, 0x04, 0x04, \
|
|
0x74, 0x65, 0x73, 0x74};
|
|
char req_uid[] = {0x30, 0x14, 0x0a, 0x01, 0x03, 0x0a, 0x01, 0x01, 0x30, 0x0c, \
|
|
0x04, 0x06, 0x44, 0x4f, 0x4d, 0x41, 0x49, 0x4e, 0x02, 0x02, \
|
|
0x30, 0x39};
|
|
char req_gid[] = {0x30, 0x15, 0x0a, 0x01, 0x04, 0x0a, 0x01, 0x01, 0x30, 0x0d, \
|
|
0x04, 0x06, 0x44, 0x4f, 0x4d, 0x41, 0x49, 0x4e, 0x02, 0x03, \
|
|
0x00, 0xd4, 0x31};
|
|
|
|
void test_decode(void **state)
|
|
{
|
|
struct berval req_val;
|
|
struct extdom_req *req;
|
|
int ret;
|
|
|
|
req_val.bv_val = req_sid;
|
|
req_val.bv_len = sizeof(req_sid);
|
|
|
|
ret = parse_request_data(&req_val, &req);
|
|
|
|
assert_int_equal(ret, LDAP_SUCCESS);
|
|
assert_int_equal(req->input_type, INP_SID);
|
|
assert_int_equal(req->request_type, REQ_SIMPLE);
|
|
assert_string_equal(req->data.sid, "S-1-2-3-4");
|
|
free_req_data(req);
|
|
|
|
req_val.bv_val = req_nam;
|
|
req_val.bv_len = sizeof(req_nam);
|
|
|
|
ret = parse_request_data(&req_val, &req);
|
|
|
|
assert_int_equal(ret, LDAP_SUCCESS);
|
|
assert_int_equal(req->input_type, INP_NAME);
|
|
assert_int_equal(req->request_type, REQ_SIMPLE);
|
|
assert_string_equal(req->data.name.domain_name, "DOMAIN");
|
|
assert_string_equal(req->data.name.object_name, "test");
|
|
free_req_data(req);
|
|
|
|
req_val.bv_val = req_uid;
|
|
req_val.bv_len = sizeof(req_uid);
|
|
|
|
ret = parse_request_data(&req_val, &req);
|
|
|
|
assert_int_equal(ret, LDAP_SUCCESS);
|
|
assert_int_equal(req->input_type, INP_POSIX_UID);
|
|
assert_int_equal(req->request_type, REQ_SIMPLE);
|
|
assert_string_equal(req->data.posix_uid.domain_name, "DOMAIN");
|
|
assert_int_equal(req->data.posix_uid.uid, 12345);
|
|
free_req_data(req);
|
|
|
|
req_val.bv_val = req_gid;
|
|
req_val.bv_len = sizeof(req_gid);
|
|
|
|
ret = parse_request_data(&req_val, &req);
|
|
|
|
assert_int_equal(ret, LDAP_SUCCESS);
|
|
assert_int_equal(req->input_type, INP_POSIX_GID);
|
|
assert_int_equal(req->request_type, REQ_SIMPLE);
|
|
assert_string_equal(req->data.posix_gid.domain_name, "DOMAIN");
|
|
assert_int_equal(req->data.posix_gid.gid, 54321);
|
|
free_req_data(req);
|
|
}
|
|
|
|
int main(int argc, const char *argv[])
|
|
{
|
|
const struct CMUnitTest tests[] = {
|
|
cmocka_unit_test(test_getpwnam_r_wrapper),
|
|
cmocka_unit_test(test_getpwuid_r_wrapper),
|
|
cmocka_unit_test(test_getgrnam_r_wrapper),
|
|
cmocka_unit_test(test_getgrgid_r_wrapper),
|
|
cmocka_unit_test(test_get_user_grouplist),
|
|
cmocka_unit_test_setup_teardown(test_set_err_msg,
|
|
extdom_req_setup, extdom_req_teardown),
|
|
cmocka_unit_test_setup_teardown(test_encode,
|
|
extdom_req_setup, extdom_req_teardown),
|
|
cmocka_unit_test(test_decode),
|
|
};
|
|
|
|
assert_non_null(original_fopen);
|
|
return cmocka_run_group_tests(tests, extdom_req_setup, extdom_req_teardown);
|
|
}
|