/* This file is part of the KDE project Copyright (C) 2005 Till Adam This library is free software; you can redistribute it and/or modify it under the terms of the GNU Library General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Library General Public License for more details. You should have received a copy of the GNU Library General Public License along with this library; see the file COPYING.LIB. If not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. */ #include "kacltest.h" #include #include #include #include #include #include #include #include #include #include #include // The code comes partly from tdebase/tdeioslave/trash/testtrash.cpp static bool check(const TQString& txt, TQString a, TQString b) { if (a.isEmpty()) a = TQString::null; if (b.isEmpty()) b = TQString::null; if (a == b) { kdDebug() << txt << " : checking '" << a << "' against expected value '" << b << "'... " << "ok" << endl; } else { kdDebug() << txt << " : checking '" << a << "' against expected value '" << b << "'... " << "KO !" << endl; exit(1); } return true; } template static bool check(const TQString& txt, T a, T b) { if (a == b) { kdDebug() << txt << " : checking '" << a << "' against expected value '" << b << "'... " << "ok" << endl; } else { kdDebug() << txt << " : checking '" << a << "' against expected value '" << b << "'... " << "KO !" << endl; exit(1); } return true; } int main(int argc, char *argv[]) { TDEApplication::disableAutoDcopRegistration(); TDECmdLineArgs::init(argc,argv,"kacltest", 0, 0, 0, 0); TDEApplication app; KACLTest test; test.setup(); test.runAll(); test.cleanup(); kdDebug() << "All tests OK." << endl; return 0; // success. The exit(1) in check() is what happens in case of failure. } #ifdef Q_OS_FREEBSD static const TQString s_group1 = TQString::fromLatin1("staff"); static const TQString s_group2 = TQString::fromLatin1("guest"); #else static const TQString s_group1 = TQString::fromLatin1("audio"); static const TQString s_group2 = TQString::fromLatin1("users"); #endif static const TQString s_testACL = TQString::fromLatin1( "user::rw-\nuser:bin:rwx\ngroup::rw-\nmask::rwx\nother::r--\n" ); static const TQString s_testACL2 = TQString::fromLatin1( "user::rwx\nuser:bin:rwx\ngroup::rw-\n") + TQString::fromLatin1( "group:" ) + s_group1 + TQString::fromLatin1( ":--x\n" ) + TQString::fromLatin1( "group:" ) + s_group2 + TQString::fromLatin1( ":r--\n" ) + TQString::fromLatin1( "mask::r-x\nother::r--\n" ); static const TQString s_testACLEffective = TQString::fromLatin1( "user::rwx\nuser:bin:rwx #effective:r-x\ngroup::rw- #effective:r--\n" ) + TQString::fromLatin1( "group:" ) + s_group1 + TQString::fromLatin1( ":--x\n" ) + TQString::fromLatin1( "group:" ) + s_group2 + TQString::fromLatin1( ":r--\n" ) + TQString::fromLatin1( "mask::r-x\nother::r--\n" ); KACLTest::KACLTest() :m_acl( s_testACL ) { } void KACLTest::setup() { } void KACLTest::runAll() { testAsString(); testGetOwnerPermissions(); testGetOwningGroupPermissions(); testGetOthersPermissions(); testGetMaskPermissions(); testGetAllUserPermissions(); testIsExtended(); // from here on we operate with the second test string testSetACL(); testGetAllGroupsPermissions(); testOperators(); testSettingBasic(); testSettingExtended(); testSettingErrorHandling(); testNewMask(); } void KACLTest::cleanup() { } void KACLTest::testAsString() { check( "asString: ", m_acl.asString(), s_testACL ); } void KACLTest::testSetACL() { m_acl.setACL( s_testACL2 ); check( "setACL: ", m_acl.asString().simplifyWhiteSpace().remove(" "), s_testACLEffective.simplifyWhiteSpace().remove(" ") ); } void KACLTest::testGetOwnerPermissions() { check( "Owner permissions: ", TQString::number( m_acl.ownerPermissions() ), "6" ); } void KACLTest::testGetOwningGroupPermissions() { check( "Owning group permissions: ", TQString::number( m_acl.owningGroupPermissions() ), "6" ); } void KACLTest::testGetOthersPermissions() { check( "Others permissions: ", TQString::number( m_acl.othersPermissions() ), "4" ); } void KACLTest::testGetMaskPermissions() { bool exists = false; unsigned short mask = m_acl.maskPermissions( exists ); check( "Mask permissions: ", TQString::number( mask ), "7" ); check( "Mask permissions: ", exists, true ); } void KACLTest::testGetAllUserPermissions() { ACLUserPermissionsList list = m_acl.allUserPermissions(); ACLUserPermissionsConstIterator it = list.begin(); TQString name; unsigned short permissions; int count = 0; while ( it != list.end() ) { name = ( *it ).first; permissions = ( *it ).second; ++it; ++count; } check( "All users count: ", TQString::number( count ), "1" ); check( "All users name: ", name, "bin" ); check( "All users permissions: ", TQString::number( permissions ), "7" ); } void KACLTest::testGetAllGroupsPermissions() { ACLGroupPermissionsList list = m_acl.allGroupPermissions(); ACLGroupPermissionsConstIterator it = list.begin(); TQString name; unsigned short permissions; int count = 0; while ( it != list.end() ) { name = ( *it ).first; permissions = ( *it ).second; // setACL sorts them alphabetically ... if ( count == 0 ) { check( "All groups name: ", name, s_group1 ); check( "All groups permissions: ", TQString::number( permissions ), "1" ); } else if ( count == 1 ) { check( "All groups name: ", name, s_group2 ); check( "All groups permissions: ", TQString::number( permissions ), "4" ); } ++it; ++count; } check( "All users count: ", TQString::number( count ), "2" ); } void KACLTest::testIsExtended() { KACL dukeOfMonmoth( s_testACL ); check( "isExtended on an extended one: ", dukeOfMonmoth.isExtended(), true ); KACL earlOfUpnor( "user::r--\ngroup::r--\nother::r--\n" ); check( "isExtended on a not extended one: ", earlOfUpnor.isExtended(), false ); } void KACLTest::testOperators() { KACL dukeOfMonmoth( s_testACL ); KACL JamesScott( s_testACL ); KACL earlOfUpnor( s_testACL2 ); check( "operator== on different ones: ", dukeOfMonmoth == earlOfUpnor, false ); check( "operator== on identical ones: ", dukeOfMonmoth == JamesScott, true ); check( "operator!= on diffenrent ones: ", dukeOfMonmoth != earlOfUpnor, true ); check( "operator!=: on identical ones: ", dukeOfMonmoth != JamesScott, false ); } void KACLTest::testSettingBasic() { KACL CharlesII( s_testACL ); CharlesII.setOwnerPermissions( 7 ); // clearly CharlesII.setOwningGroupPermissions( 0 ); CharlesII.setOthersPermissions( 0 ); check( "setOwnerPermissions: ", TQString::number( CharlesII.ownerPermissions() ),"7" ); check( "setOwningGroupPermissions: ", TQString::number( CharlesII.owningGroupPermissions() ),"0" ); check( "setOthersPermissions: ", TQString::number( CharlesII.othersPermissions() ),"0" ); } void KACLTest::testSettingExtended() { KACL CharlesII( s_testACL ); CharlesII.setMaskPermissions( 7 ); // clearly bool dummy = false; check( "setMaskPermissions: ", TQString::number( CharlesII.maskPermissions( dummy ) ),"7" ); const TQString expected( "user::rw-\nuser:root:rwx\nuser:bin:r--\ngroup::rw-\nmask::rwx\nother::r--\n" ); ACLUserPermissionsList users; ACLUserPermissions user = qMakePair( TQString( "root" ), ( unsigned short )7 ); users.append( user ); user = qMakePair( TQString( "bin" ), ( unsigned short )4 ); users.append( user ); CharlesII.setAllUserPermissions( users ); check( "setAllUserPermissions: ", CharlesII.asString(), expected ); CharlesII.setACL( s_testACL ); // reset // it already has an entry for bin, let's change it CharlesII.setNamedUserPermissions( TQString("bin"), 4 ); CharlesII.setNamedUserPermissions( TQString( "root" ), 7 ); check( "setNamedUserPermissions: ", CharlesII.asString(), expected ); // groups, all and named const TQString expected2 = TQString::fromLatin1( "user::rw-\nuser:bin:rwx\ngroup::rw-\ngroup:" ) + s_group1 + TQString::fromLatin1( ":-wx\ngroup:" ) + s_group2 + TQString::fromLatin1(":r--\nmask::rwx\nother::r--\n" ); CharlesII.setACL( s_testACL ); // reset ACLGroupPermissionsList groups; ACLGroupPermissions group = qMakePair( s_group1, ( unsigned short )3 ); groups.append( group ); group = qMakePair( s_group2, ( unsigned short )4 ); groups.append( group ); CharlesII.setAllGroupPermissions( groups ); check( "setAllGroupPermissions: ", CharlesII.asString(), expected2 ); CharlesII.setACL( s_testACL ); // reset CharlesII.setNamedGroupPermissions( s_group1, 3 ); CharlesII.setNamedGroupPermissions( s_group2, 4 ); check( "setNamedGroupPermissions: ", CharlesII.asString(), expected2 ); } void KACLTest::testSettingErrorHandling() { KACL foo( s_testACL ); bool v = foo.setNamedGroupPermissions( s_group1, 7 ); // existing group check( "Existing group: ", v, true ); v = foo.setNamedGroupPermissions( "jongel", 7 ); // non-existing group check( "Non-existing group: ", v, false ); v = foo.setNamedUserPermissions( "bin", 7 ); // existing user check( "Existing user: ", v, true ); v = foo.setNamedUserPermissions( "jongel", 7 ); // non-existing user check( "Non-existing user: ", v, false ); } void KACLTest::testNewMask() { KACL CharlesII( "user::rw-\ngroup::rw-\nother::rw\n" ); bool dummy = false; CharlesII.maskPermissions( dummy ); check( "mask exists: ", dummy, false ); CharlesII.setMaskPermissions( 6 ); check( "new mask set: ", TQString::number( CharlesII.maskPermissions( dummy ) ), "6" ); check( "mask exists now: ", dummy, true ); }