2014-09-10 13:52:48 +00:00
|
|
|
/*
|
2016-01-14 19:34:28 +00:00
|
|
|
* Copyright (C) 2013, 2014, 2016 Red Hat, Inc.
|
2014-09-10 13:52:48 +00:00
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library. If not, see
|
|
|
|
* <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
|
|
|
|
#include "testutils.h"
|
|
|
|
|
2016-11-28 13:47:30 +00:00
|
|
|
#if defined(__ELF__)
|
2014-09-10 13:52:48 +00:00
|
|
|
|
|
|
|
# include "virpolkit.h"
|
2020-09-09 14:42:16 +00:00
|
|
|
# include "virgdbus.h"
|
2014-09-10 13:52:48 +00:00
|
|
|
# include "virlog.h"
|
|
|
|
# include "virmock.h"
|
|
|
|
# define VIR_FROM_THIS VIR_FROM_NONE
|
|
|
|
|
|
|
|
VIR_LOG_INIT("tests.systemdtest");
|
|
|
|
|
|
|
|
/* Some interesting numbers */
|
|
|
|
# define THE_PID 1458
|
|
|
|
# define THE_TIME 11011000001
|
|
|
|
# define THE_UID 1729
|
|
|
|
|
2020-09-09 14:42:16 +00:00
|
|
|
VIR_MOCK_WRAP_RET_ARGS(g_dbus_connection_call_sync,
|
|
|
|
GVariant *,
|
|
|
|
GDBusConnection *, connection,
|
|
|
|
const gchar *, bus_name,
|
|
|
|
const gchar *, object_path,
|
|
|
|
const gchar *, interface_name,
|
|
|
|
const gchar *, method_name,
|
|
|
|
GVariant *, parameters,
|
|
|
|
const GVariantType *, reply_type,
|
|
|
|
GDBusCallFlags, flags,
|
|
|
|
gint, timeout_msec,
|
|
|
|
GCancellable *, cancellable,
|
|
|
|
GError **, error)
|
2014-09-10 13:52:48 +00:00
|
|
|
{
|
2020-09-09 14:42:16 +00:00
|
|
|
GVariant *reply = NULL;
|
|
|
|
g_autoptr(GVariant) params = parameters;
|
2014-09-10 13:52:48 +00:00
|
|
|
|
2020-10-02 10:11:45 +00:00
|
|
|
if (params)
|
|
|
|
g_variant_ref_sink(params);
|
|
|
|
|
2020-09-09 14:42:16 +00:00
|
|
|
VIR_MOCK_REAL_INIT(g_dbus_connection_call_sync);
|
2014-09-10 13:52:48 +00:00
|
|
|
|
2020-09-09 14:42:16 +00:00
|
|
|
if (STREQ(bus_name, "org.freedesktop.PolicyKit1") &&
|
|
|
|
STREQ(method_name, "CheckAuthorization")) {
|
|
|
|
g_autoptr(GVariantIter) iter = NULL;
|
|
|
|
GVariantBuilder builder;
|
2014-09-10 13:52:48 +00:00
|
|
|
char *type;
|
|
|
|
char *actionid;
|
|
|
|
int is_authorized = 1;
|
|
|
|
int is_challenge = 0;
|
|
|
|
|
2020-09-09 14:42:16 +00:00
|
|
|
g_variant_get(params, "((&s@a{sv})&sa{ss}@u@s)",
|
|
|
|
&type,
|
|
|
|
NULL,
|
|
|
|
&actionid,
|
|
|
|
&iter,
|
|
|
|
NULL,
|
|
|
|
NULL);
|
|
|
|
|
|
|
|
g_variant_builder_init(&builder, G_VARIANT_TYPE("a{ss}"));
|
2014-09-10 13:52:48 +00:00
|
|
|
|
|
|
|
if (STREQ(actionid, "org.libvirt.test.success")) {
|
|
|
|
is_authorized = 1;
|
|
|
|
is_challenge = 0;
|
|
|
|
} else if (STREQ(actionid, "org.libvirt.test.challenge")) {
|
|
|
|
is_authorized = 0;
|
|
|
|
is_challenge = 1;
|
|
|
|
} else if (STREQ(actionid, "org.libvirt.test.cancelled")) {
|
|
|
|
is_authorized = 0;
|
|
|
|
is_challenge = 0;
|
2020-09-09 14:42:16 +00:00
|
|
|
g_variant_builder_add(&builder, "{ss}", "polkit.dismissed", "true");
|
2014-09-10 13:52:48 +00:00
|
|
|
} else if (STREQ(actionid, "org.libvirt.test.details")) {
|
2020-09-09 14:42:16 +00:00
|
|
|
char *key;
|
|
|
|
char *val;
|
2014-09-10 13:52:48 +00:00
|
|
|
is_authorized = 0;
|
|
|
|
is_challenge = 0;
|
2020-09-09 14:42:16 +00:00
|
|
|
|
|
|
|
while (g_variant_iter_loop(iter, "{ss}", &key, &val)) {
|
|
|
|
if (STREQ(key, "org.libvirt.test.person") && STREQ(val, "Fred")) {
|
2014-09-10 13:52:48 +00:00
|
|
|
is_authorized = 1;
|
|
|
|
is_challenge = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
is_authorized = 0;
|
|
|
|
is_challenge = 0;
|
|
|
|
}
|
|
|
|
|
2020-09-09 14:42:16 +00:00
|
|
|
reply = g_variant_new("((bb@a{ss}))", is_authorized, is_challenge,
|
|
|
|
g_variant_builder_end(&builder));
|
2014-09-10 13:52:48 +00:00
|
|
|
} else {
|
2020-09-09 14:42:16 +00:00
|
|
|
reply = g_variant_new("()");
|
2014-09-10 13:52:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return reply;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
2019-10-14 12:45:03 +00:00
|
|
|
static int testPolkitAuthSuccess(const void *opaque G_GNUC_UNUSED)
|
2014-09-10 13:52:48 +00:00
|
|
|
{
|
|
|
|
if (virPolkitCheckAuth("org.libvirt.test.success",
|
|
|
|
THE_PID,
|
|
|
|
THE_TIME,
|
|
|
|
THE_UID,
|
|
|
|
NULL,
|
|
|
|
true) < 0)
|
2019-11-12 20:46:29 +00:00
|
|
|
return -1;
|
2014-09-10 13:52:48 +00:00
|
|
|
|
2019-11-12 20:46:29 +00:00
|
|
|
return 0;
|
2014-09-10 13:52:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2019-10-14 12:45:03 +00:00
|
|
|
static int testPolkitAuthDenied(const void *opaque G_GNUC_UNUSED)
|
2014-09-10 13:52:48 +00:00
|
|
|
{
|
|
|
|
int rv;
|
|
|
|
virErrorPtr err;
|
|
|
|
|
|
|
|
rv = virPolkitCheckAuth("org.libvirt.test.deny",
|
|
|
|
THE_PID,
|
|
|
|
THE_TIME,
|
|
|
|
THE_UID,
|
|
|
|
NULL,
|
|
|
|
true);
|
|
|
|
|
|
|
|
if (rv == 0) {
|
|
|
|
fprintf(stderr, "Unexpected auth success\n");
|
2019-11-12 20:46:29 +00:00
|
|
|
return -1;
|
2014-09-10 13:52:48 +00:00
|
|
|
} else if (rv != -2) {
|
2019-11-12 20:46:29 +00:00
|
|
|
return -1;
|
2014-09-10 13:52:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
err = virGetLastError();
|
|
|
|
if (!err || !strstr(err->message,
|
|
|
|
_("access denied by policy"))) {
|
|
|
|
fprintf(stderr, "Incorrect error response\n");
|
2019-11-12 20:46:29 +00:00
|
|
|
return -1;
|
2014-09-10 13:52:48 +00:00
|
|
|
}
|
|
|
|
|
2019-11-12 20:46:29 +00:00
|
|
|
return 0;
|
2014-09-10 13:52:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2019-10-14 12:45:03 +00:00
|
|
|
static int testPolkitAuthChallenge(const void *opaque G_GNUC_UNUSED)
|
2014-09-10 13:52:48 +00:00
|
|
|
{
|
|
|
|
int rv;
|
|
|
|
virErrorPtr err;
|
|
|
|
|
|
|
|
rv = virPolkitCheckAuth("org.libvirt.test.challenge",
|
|
|
|
THE_PID,
|
|
|
|
THE_TIME,
|
|
|
|
THE_UID,
|
|
|
|
NULL,
|
|
|
|
true);
|
|
|
|
|
|
|
|
if (rv == 0) {
|
|
|
|
fprintf(stderr, "Unexpected auth success\n");
|
2019-11-12 20:46:29 +00:00
|
|
|
return -1;
|
2014-09-10 13:52:48 +00:00
|
|
|
} else if (rv != -2) {
|
2019-11-12 20:46:29 +00:00
|
|
|
return -1;
|
2014-09-10 13:52:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
err = virGetLastError();
|
2016-01-14 19:34:28 +00:00
|
|
|
if (!err || err->domain != VIR_FROM_POLKIT ||
|
|
|
|
err->code != VIR_ERR_AUTH_UNAVAILABLE ||
|
|
|
|
!strstr(err->message, _("no polkit agent available to authenticate"))) {
|
2014-09-10 13:52:48 +00:00
|
|
|
fprintf(stderr, "Incorrect error response\n");
|
2019-11-12 20:46:29 +00:00
|
|
|
return -1;
|
2014-09-10 13:52:48 +00:00
|
|
|
}
|
|
|
|
|
2019-11-12 20:46:29 +00:00
|
|
|
return 0;
|
2014-09-10 13:52:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2019-10-14 12:45:03 +00:00
|
|
|
static int testPolkitAuthCancelled(const void *opaque G_GNUC_UNUSED)
|
2014-09-10 13:52:48 +00:00
|
|
|
{
|
|
|
|
int rv;
|
|
|
|
virErrorPtr err;
|
|
|
|
|
|
|
|
rv = virPolkitCheckAuth("org.libvirt.test.cancelled",
|
|
|
|
THE_PID,
|
|
|
|
THE_TIME,
|
|
|
|
THE_UID,
|
|
|
|
NULL,
|
|
|
|
true);
|
|
|
|
|
|
|
|
if (rv == 0) {
|
|
|
|
fprintf(stderr, "Unexpected auth success\n");
|
2019-11-12 20:46:29 +00:00
|
|
|
return -1;
|
2014-09-10 13:52:48 +00:00
|
|
|
} else if (rv != -2) {
|
2019-11-12 20:46:29 +00:00
|
|
|
return -1;
|
2014-09-10 13:52:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
err = virGetLastError();
|
|
|
|
if (!err || !strstr(err->message,
|
|
|
|
_("user cancelled authentication process"))) {
|
|
|
|
fprintf(stderr, "Incorrect error response\n");
|
2019-11-12 20:46:29 +00:00
|
|
|
return -1;
|
2014-09-10 13:52:48 +00:00
|
|
|
}
|
|
|
|
|
2019-11-12 20:46:29 +00:00
|
|
|
return 0;
|
2014-09-10 13:52:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2019-10-14 12:45:03 +00:00
|
|
|
static int testPolkitAuthDetailsSuccess(const void *opaque G_GNUC_UNUSED)
|
2014-09-10 13:52:48 +00:00
|
|
|
{
|
|
|
|
const char *details[] = {
|
|
|
|
"org.libvirt.test.person", "Fred",
|
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
if (virPolkitCheckAuth("org.libvirt.test.details",
|
|
|
|
THE_PID,
|
|
|
|
THE_TIME,
|
|
|
|
THE_UID,
|
|
|
|
details,
|
|
|
|
true) < 0)
|
2019-11-12 20:46:29 +00:00
|
|
|
return -1;
|
2014-09-10 13:52:48 +00:00
|
|
|
|
2019-11-12 20:46:29 +00:00
|
|
|
return 0;
|
2014-09-10 13:52:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2019-10-14 12:45:03 +00:00
|
|
|
static int testPolkitAuthDetailsDenied(const void *opaque G_GNUC_UNUSED)
|
2014-09-10 13:52:48 +00:00
|
|
|
{
|
|
|
|
int rv;
|
|
|
|
virErrorPtr err;
|
|
|
|
const char *details[] = {
|
|
|
|
"org.libvirt.test.person", "Joe",
|
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
rv = virPolkitCheckAuth("org.libvirt.test.details",
|
|
|
|
THE_PID,
|
|
|
|
THE_TIME,
|
|
|
|
THE_UID,
|
|
|
|
details,
|
|
|
|
true);
|
|
|
|
|
|
|
|
if (rv == 0) {
|
|
|
|
fprintf(stderr, "Unexpected auth success\n");
|
2019-11-12 20:46:29 +00:00
|
|
|
return -1;
|
2014-09-10 13:52:48 +00:00
|
|
|
} else if (rv != -2) {
|
2019-11-12 20:46:29 +00:00
|
|
|
return -1;
|
2014-09-10 13:52:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
err = virGetLastError();
|
|
|
|
if (!err || !strstr(err->message,
|
|
|
|
_("access denied by policy"))) {
|
|
|
|
fprintf(stderr, "Incorrect error response\n");
|
2019-11-12 20:46:29 +00:00
|
|
|
return -1;
|
2014-09-10 13:52:48 +00:00
|
|
|
}
|
|
|
|
|
2019-11-12 20:46:29 +00:00
|
|
|
return 0;
|
2014-09-10 13:52:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
|
|
|
mymain(void)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
|
2016-05-26 15:01:50 +00:00
|
|
|
if (virTestRun("Polkit auth success ", testPolkitAuthSuccess, NULL) < 0)
|
2014-09-10 13:52:48 +00:00
|
|
|
ret = -1;
|
2016-05-26 15:01:50 +00:00
|
|
|
if (virTestRun("Polkit auth deny ", testPolkitAuthDenied, NULL) < 0)
|
2014-09-10 13:52:48 +00:00
|
|
|
ret = -1;
|
2016-05-26 15:01:50 +00:00
|
|
|
if (virTestRun("Polkit auth challenge ", testPolkitAuthChallenge, NULL) < 0)
|
2014-09-10 13:52:48 +00:00
|
|
|
ret = -1;
|
2016-05-26 15:01:50 +00:00
|
|
|
if (virTestRun("Polkit auth cancel ", testPolkitAuthCancelled, NULL) < 0)
|
2014-09-10 13:52:48 +00:00
|
|
|
ret = -1;
|
2016-05-26 15:01:50 +00:00
|
|
|
if (virTestRun("Polkit auth details success ", testPolkitAuthDetailsSuccess, NULL) < 0)
|
2014-09-10 13:52:48 +00:00
|
|
|
ret = -1;
|
2016-05-26 15:01:50 +00:00
|
|
|
if (virTestRun("Polkit auth details deny ", testPolkitAuthDetailsDenied, NULL) < 0)
|
2014-09-10 13:52:48 +00:00
|
|
|
ret = -1;
|
|
|
|
|
|
|
|
return ret == 0 ? EXIT_SUCCESS : EXIT_FAILURE;
|
|
|
|
}
|
|
|
|
|
2020-09-09 14:42:16 +00:00
|
|
|
VIR_TEST_MAIN_PRELOAD(mymain, VIR_TEST_MOCK("virgdbus"))
|
2014-09-10 13:52:48 +00:00
|
|
|
|
2016-11-28 13:47:30 +00:00
|
|
|
#else /* ! __ELF__ */
|
2014-09-10 13:52:48 +00:00
|
|
|
int
|
|
|
|
main(void)
|
|
|
|
{
|
|
|
|
return EXIT_AM_SKIP;
|
|
|
|
}
|
2016-11-28 13:47:30 +00:00
|
|
|
#endif /* ! __ELF__ */
|