93ee3b7e9b
MFC after: 3 days Sponsored by: Dell EMC Isilon
225 lines
5.2 KiB
C
225 lines
5.2 KiB
C
/*-
|
|
* Copyright (c) 2006 Michael Bushkov <bushman@freebsd.org>
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*
|
|
*/
|
|
|
|
#include <sys/cdefs.h>
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
#include <assert.h>
|
|
#include <errno.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
|
|
#include <atf-c.h>
|
|
|
|
#include "testutil.h"
|
|
|
|
enum test_methods {
|
|
TEST_GETUSERSHELL,
|
|
TEST_BUILD_SNAPSHOT
|
|
};
|
|
|
|
struct usershell {
|
|
char *path;
|
|
};
|
|
|
|
DECLARE_TEST_DATA(usershell)
|
|
DECLARE_TEST_FILE_SNAPSHOT(usershell)
|
|
DECLARE_2PASS_TEST(usershell)
|
|
|
|
static void clone_usershell(struct usershell *, struct usershell const *);
|
|
static int compare_usershell(struct usershell *, struct usershell *, void *);
|
|
static void free_usershell(struct usershell *);
|
|
|
|
static void sdump_usershell(struct usershell *, char *, size_t);
|
|
static void dump_usershell(struct usershell *);
|
|
|
|
IMPLEMENT_TEST_DATA(usershell)
|
|
IMPLEMENT_TEST_FILE_SNAPSHOT(usershell)
|
|
IMPLEMENT_2PASS_TEST(usershell)
|
|
|
|
static void
|
|
clone_usershell(struct usershell *dest, struct usershell const *src)
|
|
{
|
|
assert(dest != NULL);
|
|
assert(src != NULL);
|
|
|
|
if (src->path != NULL) {
|
|
dest->path = strdup(src->path);
|
|
assert(dest->path != NULL);
|
|
}
|
|
}
|
|
|
|
static int
|
|
compare_usershell(struct usershell *us1, struct usershell *us2,
|
|
void *mdata __unused)
|
|
{
|
|
int rv;
|
|
|
|
assert(us1 != NULL);
|
|
assert(us2 != NULL);
|
|
|
|
dump_usershell(us1);
|
|
dump_usershell(us2);
|
|
|
|
if (us1 == us2)
|
|
return (0);
|
|
|
|
rv = strcmp(us1->path, us2->path);
|
|
if (rv != 0) {
|
|
printf("following structures are not equal:\n");
|
|
dump_usershell(us1);
|
|
dump_usershell(us2);
|
|
}
|
|
|
|
return (rv);
|
|
}
|
|
|
|
static void
|
|
free_usershell(struct usershell *us)
|
|
{
|
|
free(us->path);
|
|
}
|
|
|
|
static void
|
|
sdump_usershell(struct usershell *us, char *buffer, size_t buflen)
|
|
{
|
|
snprintf(buffer, buflen, "%s", us->path);
|
|
}
|
|
|
|
static void
|
|
dump_usershell(struct usershell *us)
|
|
{
|
|
if (us != NULL) {
|
|
char buffer[2048];
|
|
sdump_usershell(us, buffer, sizeof(buffer));
|
|
printf("%s\n", buffer);
|
|
} else
|
|
printf("(null)\n");
|
|
}
|
|
|
|
static int
|
|
usershell_read_snapshot_func(struct usershell *us, char *line)
|
|
{
|
|
|
|
us->path = strdup(line);
|
|
ATF_REQUIRE(us->path != NULL);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
run_tests(const char *snapshot_file, enum test_methods method)
|
|
{
|
|
struct usershell_test_data td, td_snap;
|
|
struct usershell ushell;
|
|
int rv;
|
|
|
|
rv = 0;
|
|
|
|
TEST_DATA_INIT(usershell, &td, clone_usershell, free_usershell);
|
|
TEST_DATA_INIT(usershell, &td_snap, clone_usershell, free_usershell);
|
|
|
|
setusershell();
|
|
while ((ushell.path = getusershell()) != NULL) {
|
|
printf("usershell found:\n");
|
|
dump_usershell(&ushell);
|
|
TEST_DATA_APPEND(usershell, &td, &ushell);
|
|
}
|
|
endusershell();
|
|
|
|
if (snapshot_file != NULL) {
|
|
if (access(snapshot_file, W_OK | R_OK) != 0) {
|
|
if (errno == ENOENT)
|
|
method = TEST_BUILD_SNAPSHOT;
|
|
else {
|
|
printf("can't access the snapshot file %s\n",
|
|
snapshot_file);
|
|
|
|
rv = -1;
|
|
goto fin;
|
|
}
|
|
} else {
|
|
rv = TEST_SNAPSHOT_FILE_READ(usershell, snapshot_file,
|
|
&td_snap, usershell_read_snapshot_func);
|
|
if (rv != 0) {
|
|
printf("error reading snapshot file\n");
|
|
goto fin;
|
|
}
|
|
}
|
|
}
|
|
|
|
switch (method) {
|
|
case TEST_GETUSERSHELL:
|
|
rv = DO_2PASS_TEST(usershell, &td, &td_snap,
|
|
compare_usershell, NULL);
|
|
break;
|
|
case TEST_BUILD_SNAPSHOT:
|
|
if (snapshot_file != NULL) {
|
|
rv = TEST_SNAPSHOT_FILE_WRITE(usershell, snapshot_file,
|
|
&td, sdump_usershell);
|
|
}
|
|
break;
|
|
default:
|
|
rv = 0;
|
|
break;
|
|
}
|
|
|
|
fin:
|
|
TEST_DATA_DESTROY(usershell, &td_snap);
|
|
TEST_DATA_DESTROY(usershell, &td);
|
|
|
|
return (rv);
|
|
}
|
|
|
|
#define SNAPSHOT_FILE "snapshot_usershell"
|
|
|
|
ATF_TC_WITHOUT_HEAD(getusershell_with_snapshot);
|
|
ATF_TC_BODY(getusershell_with_snapshot, tc)
|
|
{
|
|
|
|
ATF_REQUIRE(run_tests(SNAPSHOT_FILE, TEST_BUILD_SNAPSHOT) == 0);
|
|
}
|
|
|
|
ATF_TC_WITHOUT_HEAD(getusershell_with_two_pass);
|
|
ATF_TC_BODY(getusershell_with_two_pass, tc)
|
|
{
|
|
|
|
ATF_REQUIRE(run_tests(SNAPSHOT_FILE, TEST_BUILD_SNAPSHOT) == 0);
|
|
ATF_REQUIRE(run_tests(SNAPSHOT_FILE, TEST_GETUSERSHELL) == 0);
|
|
}
|
|
|
|
ATF_TP_ADD_TCS(tp)
|
|
{
|
|
|
|
ATF_TP_ADD_TC(tp, getusershell_with_snapshot);
|
|
ATF_TP_ADD_TC(tp, getusershell_with_two_pass);
|
|
|
|
return (atf_no_error());
|
|
}
|