19762338dSopenharmony_ci/* 29762338dSopenharmony_ci * Copyright (C) 2024 HiHope Open Source Organization. 39762338dSopenharmony_ci * Licensed under the Apache License, Version 2.0 (the "License"); 49762338dSopenharmony_ci * you may not use this file except in compliance with the License. 59762338dSopenharmony_ci * You may obtain a copy of the License at 69762338dSopenharmony_ci * 79762338dSopenharmony_ci * http://www.apache.org/licenses/LICENSE-2.0 89762338dSopenharmony_ci * 99762338dSopenharmony_ci * Unless required by applicable law or agreed to in writing, software 109762338dSopenharmony_ci * distributed under the License is distributed on an "AS IS" BASIS, 119762338dSopenharmony_ci * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 129762338dSopenharmony_ci * See the License for the specific language governing permissions and 139762338dSopenharmony_ci * limitations under the License. 149762338dSopenharmony_ci */ 159762338dSopenharmony_ci 169762338dSopenharmony_ci#include <cerrno> 179762338dSopenharmony_ci#include <cstdio> 189762338dSopenharmony_ci#include <cstdlib> 199762338dSopenharmony_ci#include <string> 209762338dSopenharmony_ci#include <vector> 219762338dSopenharmony_ci#include <fcntl.h> 229762338dSopenharmony_ci#include <unistd.h> 239762338dSopenharmony_ci#include <gtest/gtest.h> 249762338dSopenharmony_ci#include <sys/stat.h> 259762338dSopenharmony_ci#include <sys/types.h> 269762338dSopenharmony_ci#include "securec.h" 279762338dSopenharmony_ci 289762338dSopenharmony_ciusing namespace testing::ext; 299762338dSopenharmony_ciusing namespace std; 309762338dSopenharmony_ci 319762338dSopenharmony_cistatic const int PATH_MAX_LEN = 128; 329762338dSopenharmony_cistatic const char *TEST_FILE_PATH = "/data/local/tmp"; 339762338dSopenharmony_cistatic const char *TEST_FILE = "/data/local/tmp/test.txt"; 349762338dSopenharmony_cistatic const char *TEST_FILE_NAME = "test.txt"; 359762338dSopenharmony_cistatic const char *TEST_NOT_EXIST_FILE = "/data/local/tmp/NotExist.txt"; 369762338dSopenharmony_cistatic const char *TEST_NOT_EXIST_FILE_NAME = "NotExist.txt"; 379762338dSopenharmony_ci 389762338dSopenharmony_ciclass FaccessatApiTest : public testing::Test { 399762338dSopenharmony_cipublic: 409762338dSopenharmony_ci static void SetUpTestCase(); 419762338dSopenharmony_ci static void TearDownTestCase(); 429762338dSopenharmony_ci void SetUp(); 439762338dSopenharmony_ci void TearDown(); 449762338dSopenharmony_ciprivate: 459762338dSopenharmony_ci}; 469762338dSopenharmony_civoid FaccessatApiTest::SetUp() 479762338dSopenharmony_ci{ 489762338dSopenharmony_ci} 499762338dSopenharmony_civoid FaccessatApiTest::TearDown() 509762338dSopenharmony_ci{ 519762338dSopenharmony_ci} 529762338dSopenharmony_civoid FaccessatApiTest::SetUpTestCase() 539762338dSopenharmony_ci{ 549762338dSopenharmony_ci} 559762338dSopenharmony_civoid FaccessatApiTest::TearDownTestCase() 569762338dSopenharmony_ci{ 579762338dSopenharmony_ci} 589762338dSopenharmony_ci 599762338dSopenharmony_ci/* 609762338dSopenharmony_ci * @tc.number : SUB_KERNEL_SYSCALL_FACCESSAT_0100 619762338dSopenharmony_ci * @tc.name : FaccessatCheckSuccess_0001 629762338dSopenharmony_ci * @tc.desc : faccessat checks the calling process can access the file in current directory successful. 639762338dSopenharmony_ci * @tc.size : MediumTest 649762338dSopenharmony_ci * @tc.type : Function 659762338dSopenharmony_ci * @tc.level : Level 1 669762338dSopenharmony_ci */ 679762338dSopenharmony_ciHWTEST_F(FaccessatApiTest, FaccessatCheckSuccess_0001, Function | MediumTest | Level1) 689762338dSopenharmony_ci{ 699762338dSopenharmony_ci int ret; 709762338dSopenharmony_ci char path[PATH_MAX_LEN]; 719762338dSopenharmony_ci char *dir = getcwd(path, sizeof(path)); 729762338dSopenharmony_ci EXPECT_NE(dir, nullptr); 739762338dSopenharmony_ci if (access(TEST_FILE_PATH, F_OK) != 0) { 749762338dSopenharmony_ci ret = mkdir(TEST_FILE_PATH, 0755); 759762338dSopenharmony_ci EXPECT_EQ(ret, 0); 769762338dSopenharmony_ci } 779762338dSopenharmony_ci ret = chdir(TEST_FILE_PATH); 789762338dSopenharmony_ci EXPECT_EQ(ret, 0); 799762338dSopenharmony_ci if (access(TEST_FILE_NAME, F_OK) == -1) { 809762338dSopenharmony_ci FILE *fp = fopen(TEST_FILE_NAME, "w"); 819762338dSopenharmony_ci EXPECT_NE(fp, nullptr); 829762338dSopenharmony_ci fclose(fp); 839762338dSopenharmony_ci } 849762338dSopenharmony_ci ret = faccessat(AT_FDCWD, TEST_FILE_NAME, F_OK, AT_EACCESS); 859762338dSopenharmony_ci EXPECT_EQ(ret, 0); 869762338dSopenharmony_ci 879762338dSopenharmony_ci remove(TEST_FILE); 889762338dSopenharmony_ci chdir(path); 899762338dSopenharmony_ci} 909762338dSopenharmony_ci 919762338dSopenharmony_ci/* 929762338dSopenharmony_ci * @tc.number : SUB_KERNEL_SYSCALL_FACCESSAT_0200 939762338dSopenharmony_ci * @tc.name : FaccessatPermissionCheckTest_0002 949762338dSopenharmony_ci * @tc.desc : faccessat check user's permissions of valid fd success. 959762338dSopenharmony_ci * @tc.size : MediumTest 969762338dSopenharmony_ci * @tc.type : Function 979762338dSopenharmony_ci * @tc.level : Level 1 989762338dSopenharmony_ci */ 999762338dSopenharmony_ciHWTEST_F(FaccessatApiTest, FaccessatPermissionCheckTest_0002, Function | MediumTest | Level1) 1009762338dSopenharmony_ci{ 1019762338dSopenharmony_ci int ret; 1029762338dSopenharmony_ci int fd = open(TEST_FILE, O_RDWR | O_CREAT, 0755); 1039762338dSopenharmony_ci EXPECT_TRUE(fd > 0); 1049762338dSopenharmony_ci 1059762338dSopenharmony_ci ret = faccessat(fd, TEST_FILE, F_OK, AT_EACCESS); 1069762338dSopenharmony_ci EXPECT_TRUE(ret == 0); 1079762338dSopenharmony_ci 1089762338dSopenharmony_ci ret = faccessat(fd, TEST_FILE, R_OK, AT_EACCESS); 1099762338dSopenharmony_ci EXPECT_TRUE(ret == 0); 1109762338dSopenharmony_ci 1119762338dSopenharmony_ci ret = faccessat(fd, TEST_FILE, W_OK, AT_EACCESS); 1129762338dSopenharmony_ci EXPECT_TRUE(ret == 0); 1139762338dSopenharmony_ci 1149762338dSopenharmony_ci ret = faccessat(fd, TEST_FILE, X_OK, AT_EACCESS); 1159762338dSopenharmony_ci EXPECT_TRUE(ret == 0); 1169762338dSopenharmony_ci 1179762338dSopenharmony_ci close(fd); 1189762338dSopenharmony_ci remove(TEST_FILE); 1199762338dSopenharmony_ci} 1209762338dSopenharmony_ci 1219762338dSopenharmony_ci/* 1229762338dSopenharmony_ci * @tc.number : SUB_KERNEL_SYSCALL_FACCESSAT_0300 1239762338dSopenharmony_ci * @tc.name : FaccessatCheckInvalidFdFail_0003 1249762338dSopenharmony_ci * @tc.desc : faccessat check invalid fd permission fail, errno ENOENT. 1259762338dSopenharmony_ci * @tc.size : MediumTest 1269762338dSopenharmony_ci * @tc.type : Function 1279762338dSopenharmony_ci * @tc.level : Level 2 1289762338dSopenharmony_ci */ 1299762338dSopenharmony_ciHWTEST_F(FaccessatApiTest, FaccessatCheckInvalidFdFail_0003, Function | MediumTest | Level2) 1309762338dSopenharmony_ci{ 1319762338dSopenharmony_ci int ret; 1329762338dSopenharmony_ci int invalidFd = -1; 1339762338dSopenharmony_ci errno = 0; 1349762338dSopenharmony_ci ret = faccessat(invalidFd, TEST_NOT_EXIST_FILE, F_OK, AT_EACCESS); 1359762338dSopenharmony_ci EXPECT_EQ(ret, -1); 1369762338dSopenharmony_ci EXPECT_EQ(errno, ENOENT); 1379762338dSopenharmony_ci} 1389762338dSopenharmony_ci 1399762338dSopenharmony_ci/* 1409762338dSopenharmony_ci * @tc.number : SUB_KERNEL_SYSCALL_FACCESSAT_0400 1419762338dSopenharmony_ci * @tc.name : FaccessatCheckFail_0004 1429762338dSopenharmony_ci * @tc.desc : faccessat check non-exist file permission fail, errno ENOENT. 1439762338dSopenharmony_ci * @tc.size : MediumTest 1449762338dSopenharmony_ci * @tc.type : Function 1459762338dSopenharmony_ci * @tc.level : Level 2 1469762338dSopenharmony_ci */ 1479762338dSopenharmony_ciHWTEST_F(FaccessatApiTest, FaccessatCheckFail_0004, Function | MediumTest | Level2) 1489762338dSopenharmony_ci{ 1499762338dSopenharmony_ci errno = 0; 1509762338dSopenharmony_ci int ret = faccessat(AT_FDCWD, TEST_NOT_EXIST_FILE_NAME, W_OK, AT_EACCESS); 1519762338dSopenharmony_ci EXPECT_EQ(ret, -1); 1529762338dSopenharmony_ci EXPECT_EQ(errno, ENOENT); 1539762338dSopenharmony_ci} 154