linux-user/mmap: Avoid asserts for out of range mremap calls
[qemu/ar7.git] / tests / test-authz-listfile.c
blob64d0e1500f76b2741c6781c2b15bc24a442caf85
1 /*
2 * QEMU list authorization object tests
4 * Copyright (c) 2018 Red Hat, Inc.
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, see <http://www.gnu.org/licenses/>.
21 #include "qemu/osdep.h"
22 #include "qemu/main-loop.h"
23 #include "qemu/module.h"
24 #include "authz/listfile.h"
26 static char *workdir;
28 static gchar *qemu_authz_listfile_test_save(const gchar *name,
29 const gchar *cfg)
31 gchar *path = g_strdup_printf("%s/default-deny.cfg", workdir);
32 GError *gerr = NULL;
34 if (!g_file_set_contents(path, cfg, -1, &gerr)) {
35 g_printerr("Unable to save config %s: %s\n",
36 path, gerr->message);
37 g_error_free(gerr);
38 g_free(path);
39 rmdir(workdir);
40 abort();
43 return path;
46 static void test_authz_default_deny(void)
48 gchar *file = qemu_authz_listfile_test_save(
49 "default-deny.cfg",
50 "{ \"policy\": \"deny\" }");
51 Error *local_err = NULL;
53 QAuthZListFile *auth = qauthz_list_file_new("auth0",
54 file, false,
55 &local_err);
56 unlink(file);
57 g_free(file);
58 g_assert(local_err == NULL);
59 g_assert(!qauthz_is_allowed(QAUTHZ(auth), "fred", &error_abort));
61 object_unparent(OBJECT(auth));
64 static void test_authz_default_allow(void)
66 gchar *file = qemu_authz_listfile_test_save(
67 "default-allow.cfg",
68 "{ \"policy\": \"allow\" }");
69 Error *local_err = NULL;
71 QAuthZListFile *auth = qauthz_list_file_new("auth0",
72 file, false,
73 &local_err);
74 unlink(file);
75 g_free(file);
76 g_assert(local_err == NULL);
77 g_assert(qauthz_is_allowed(QAUTHZ(auth), "fred", &error_abort));
79 object_unparent(OBJECT(auth));
82 static void test_authz_explicit_deny(void)
84 gchar *file = qemu_authz_listfile_test_save(
85 "explicit-deny.cfg",
86 "{ \"rules\": [ "
87 " { \"match\": \"fred\","
88 " \"policy\": \"deny\","
89 " \"format\": \"exact\" } ],"
90 " \"policy\": \"allow\" }");
91 Error *local_err = NULL;
93 QAuthZListFile *auth = qauthz_list_file_new("auth0",
94 file, false,
95 &local_err);
96 unlink(file);
97 g_free(file);
98 g_assert(local_err == NULL);
100 g_assert(!qauthz_is_allowed(QAUTHZ(auth), "fred", &error_abort));
102 object_unparent(OBJECT(auth));
105 static void test_authz_explicit_allow(void)
107 gchar *file = qemu_authz_listfile_test_save(
108 "explicit-allow.cfg",
109 "{ \"rules\": [ "
110 " { \"match\": \"fred\","
111 " \"policy\": \"allow\","
112 " \"format\": \"exact\" } ],"
113 " \"policy\": \"deny\" }");
114 Error *local_err = NULL;
116 QAuthZListFile *auth = qauthz_list_file_new("auth0",
117 file, false,
118 &local_err);
119 unlink(file);
120 g_free(file);
121 g_assert(local_err == NULL);
123 g_assert(qauthz_is_allowed(QAUTHZ(auth), "fred", &error_abort));
125 object_unparent(OBJECT(auth));
129 static void test_authz_complex(void)
131 gchar *file = qemu_authz_listfile_test_save(
132 "complex.cfg",
133 "{ \"rules\": [ "
134 " { \"match\": \"fred\","
135 " \"policy\": \"allow\","
136 " \"format\": \"exact\" },"
137 " { \"match\": \"bob\","
138 " \"policy\": \"allow\","
139 " \"format\": \"exact\" },"
140 " { \"match\": \"dan\","
141 " \"policy\": \"deny\","
142 " \"format\": \"exact\" },"
143 " { \"match\": \"dan*\","
144 " \"policy\": \"allow\","
145 " \"format\": \"glob\" } ],"
146 " \"policy\": \"deny\" }");
148 Error *local_err = NULL;
150 QAuthZListFile *auth = qauthz_list_file_new("auth0",
151 file, false,
152 &local_err);
153 unlink(file);
154 g_free(file);
155 g_assert(local_err == NULL);
157 g_assert(qauthz_is_allowed(QAUTHZ(auth), "fred", &error_abort));
158 g_assert(qauthz_is_allowed(QAUTHZ(auth), "bob", &error_abort));
159 g_assert(!qauthz_is_allowed(QAUTHZ(auth), "dan", &error_abort));
160 g_assert(qauthz_is_allowed(QAUTHZ(auth), "danb", &error_abort));
162 object_unparent(OBJECT(auth));
166 int main(int argc, char **argv)
168 int ret;
169 GError *gerr = NULL;
171 g_test_init(&argc, &argv, NULL);
173 module_call_init(MODULE_INIT_QOM);
175 workdir = g_dir_make_tmp("qemu-test-authz-listfile-XXXXXX",
176 &gerr);
177 if (!workdir) {
178 g_printerr("Unable to create temporary dir: %s\n",
179 gerr->message);
180 g_error_free(gerr);
181 abort();
184 g_test_add_func("/auth/list/default/deny", test_authz_default_deny);
185 g_test_add_func("/auth/list/default/allow", test_authz_default_allow);
186 g_test_add_func("/auth/list/explicit/deny", test_authz_explicit_deny);
187 g_test_add_func("/auth/list/explicit/allow", test_authz_explicit_allow);
188 g_test_add_func("/auth/list/complex", test_authz_complex);
190 ret = g_test_run();
192 rmdir(workdir);
193 g_free(workdir);
195 return ret;