summaryrefslogtreecommitdiffstats
path: root/tests/auto/sudo/tst_sudo.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'tests/auto/sudo/tst_sudo.cpp')
-rw-r--r--tests/auto/sudo/tst_sudo.cpp148
1 files changed, 148 insertions, 0 deletions
diff --git a/tests/auto/sudo/tst_sudo.cpp b/tests/auto/sudo/tst_sudo.cpp
new file mode 100644
index 00000000..c6472152
--- /dev/null
+++ b/tests/auto/sudo/tst_sudo.cpp
@@ -0,0 +1,148 @@
+/****************************************************************************
+**
+** Copyright (C) 2021 The Qt Company Ltd.
+** Copyright (C) 2019 Luxoft Sweden AB
+** Copyright (C) 2018 Pelagicore AG
+** Contact: https://www.qt.io/licensing/
+**
+** This file is part of the QtApplicationManager module of the Qt Toolkit.
+**
+** $QT_BEGIN_LICENSE:GPL-EXCEPT$
+** Commercial License Usage
+** Licensees holding valid commercial Qt licenses may use this file in
+** accordance with the commercial license agreement provided with the
+** Software or, alternatively, in accordance with the terms contained in
+** a written agreement between you and The Qt Company. For licensing terms
+** and conditions see https://www.qt.io/terms-conditions. For further
+** information use the contact form at https://www.qt.io/contact-us.
+**
+** GNU General Public License Usage
+** Alternatively, this file may be used under the terms of the GNU
+** General Public License version 3 as published by the Free Software
+** Foundation with exceptions as appearing in the file LICENSE.GPL3-EXCEPT
+** included in the packaging of this file. Please review the following
+** information to ensure the GNU General Public License requirements will
+** be met: https://www.gnu.org/licenses/gpl-3.0.html.
+**
+** $QT_END_LICENSE$
+**
+****************************************************************************/
+
+#include <QtTest>
+
+#if !defined(Q_OS_LINUX)
+# error "This test is Linux specific!"
+#endif
+
+#include "utilities.h"
+#include "sudo.h"
+
+QT_USE_NAMESPACE_AM
+
+static int processTimeout = 3000;
+
+static bool startedSudoServer = false;
+static QString sudoServerError;
+
+// sudo RAII style
+class ScopedRootPrivileges
+{
+public:
+ ScopedRootPrivileges()
+ {
+ m_uid = getuid();
+ m_gid = getgid();
+ if (setresuid(0, 0, 0) || setresgid(0, 0, 0))
+ QFAIL("cannot re-gain root privileges");
+ }
+ ~ScopedRootPrivileges()
+ {
+ if (setresgid(m_gid, m_gid, 0) || setresuid(m_uid, m_uid, 0))
+ QFAIL("cannot drop root privileges");
+ }
+private:
+ uid_t m_uid;
+ gid_t m_gid;
+};
+
+
+class tst_Sudo : public QObject
+{
+ Q_OBJECT
+
+public:
+ tst_Sudo(QObject *parent = nullptr);
+ ~tst_Sudo();
+
+private slots:
+ void initTestCase();
+ void cleanupTestCase();
+
+ void privileges();
+
+private:
+ SudoClient *m_sudo = nullptr;
+};
+
+tst_Sudo::tst_Sudo(QObject *parent)
+ : QObject(parent)
+{ }
+
+tst_Sudo::~tst_Sudo()
+{ }
+
+void tst_Sudo::initTestCase()
+{
+ processTimeout *= timeoutFactor();
+
+ QVERIFY2(startedSudoServer, qPrintable(sudoServerError));
+ m_sudo = SudoClient::instance();
+ QVERIFY(m_sudo);
+ if (m_sudo->isFallbackImplementation())
+ QSKIP("Not running with root privileges - neither directly, or SUID-root, or sudo");
+}
+
+void tst_Sudo::privileges()
+{
+ ScopedRootPrivileges sudo;
+}
+
+void tst_Sudo::cleanupTestCase()
+{
+ // the real cleanup happens in ~tst_Installer, since we also need
+ // to call this cleanup from the crash handler
+}
+
+static tst_Sudo *tstSudo = nullptr;
+
+int main(int argc, char **argv)
+{
+ try {
+ Sudo::forkServer(Sudo::DropPrivilegesRegainable);
+ startedSudoServer = true;
+ } catch (...) { }
+
+ QCoreApplication a(argc, argv);
+ tstSudo = new tst_Sudo(&a);
+
+#ifdef Q_OS_LINUX
+ auto crashHandler = [](int sigNum) -> void {
+ // we are doing very unsafe things from a within a signal handler, but
+ // we've crashed anyway at this point and the alternative is that we are
+ // leaking mounts and attached loopback devices.
+
+ tstSudo->~tst_Sudo();
+
+ if (sigNum != -1)
+ exit(1);
+ };
+
+ signal(SIGABRT, crashHandler);
+ signal(SIGSEGV, crashHandler);
+ signal(SIGINT, crashHandler);
+#endif // Q_OS_LINUX
+
+ return QTest::qExec(tstSudo, argc, argv);
+}
+
+#include "tst_sudo.moc"