summaryrefslogtreecommitdiffhomepage
path: root/test/syscalls/linux/verity_symlink.cc
blob: c6fce8ead16ab893aa4360465cfcbf33019d0fd5 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
// Copyright 2021 The gVisor Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
//     http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.

#include <stdint.h>
#include <stdlib.h>
#include <sys/mount.h>
#include <sys/stat.h>

#include "gmock/gmock.h"
#include "gtest/gtest.h"
#include "test/util/capability_util.h"
#include "test/util/fs_util.h"
#include "test/util/mount_util.h"
#include "test/util/temp_path.h"
#include "test/util/test_util.h"
#include "test/util/verity_util.h"

namespace gvisor {
namespace testing {

namespace {

const char kSymlink[] = "verity_symlink";

class SymlinkTest : public ::testing::Test {
 protected:
  void SetUp() override {
    // Verity is implemented in VFS2.
    SKIP_IF(IsRunningWithVFS1());

    SKIP_IF(!ASSERT_NO_ERRNO_AND_VALUE(HaveCapability(CAP_SYS_ADMIN)));
    // Mount a tmpfs file system, to be wrapped by a verity fs.
    tmpfs_dir_ = ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir());
    ASSERT_THAT(mount("", tmpfs_dir_.path().c_str(), "tmpfs", 0, ""),
                SyscallSucceeds());

    // Create a new file in the tmpfs mount.
    file_ = ASSERT_NO_ERRNO_AND_VALUE(
        TempPath::CreateFileWith(tmpfs_dir_.path(), kContents, 0777));
    filename_ = Basename(file_.path());

    // Create a symlink to the file.
    ASSERT_THAT(symlink(file_.path().c_str(),
                        JoinPath(tmpfs_dir_.path(), kSymlink).c_str()),
                SyscallSucceeds());
  }

  TempPath tmpfs_dir_;
  TempPath file_;
  std::string filename_;
};

TEST_F(SymlinkTest, Success) {
  std::string verity_dir = ASSERT_NO_ERRNO_AND_VALUE(MountVerity(
      tmpfs_dir_.path(), {EnableTarget(filename_, O_RDONLY),
                          EnableTarget(kSymlink, O_RDONLY | O_NOFOLLOW)}));

  char buf[256];
  EXPECT_THAT(
      readlink(JoinPath(verity_dir, kSymlink).c_str(), buf, sizeof(buf)),
      SyscallSucceeds());
  auto const verity_fd = ASSERT_NO_ERRNO_AND_VALUE(
      Open(JoinPath(verity_dir, kSymlink).c_str(), O_RDONLY, 0777));
  EXPECT_THAT(ReadFd(verity_fd.get(), buf, sizeof(kContents)),
              SyscallSucceeds());
}

TEST_F(SymlinkTest, DeleteLink) {
  std::string verity_dir = ASSERT_NO_ERRNO_AND_VALUE(MountVerity(
      tmpfs_dir_.path(), {EnableTarget(filename_, O_RDONLY),
                          EnableTarget(kSymlink, O_RDONLY | O_NOFOLLOW)}));

  ASSERT_THAT(unlink(JoinPath(tmpfs_dir_.path(), kSymlink).c_str()),
              SyscallSucceeds());
  char buf[256];
  EXPECT_THAT(
      readlink(JoinPath(verity_dir, kSymlink).c_str(), buf, sizeof(buf)),
      SyscallFailsWithErrno(EIO));
  EXPECT_THAT(open(JoinPath(verity_dir, kSymlink).c_str(), O_RDONLY, 0777),
              SyscallFailsWithErrno(EIO));
}

TEST_F(SymlinkTest, ModifyLink) {
  std::string verity_dir = ASSERT_NO_ERRNO_AND_VALUE(MountVerity(
      tmpfs_dir_.path(), {EnableTarget(filename_, O_RDONLY),
                          EnableTarget(kSymlink, O_RDONLY | O_NOFOLLOW)}));

  ASSERT_THAT(unlink(JoinPath(tmpfs_dir_.path(), kSymlink).c_str()),
              SyscallSucceeds());

  std::string newlink = "newlink";
  ASSERT_THAT(symlink(JoinPath(tmpfs_dir_.path(), newlink).c_str(),
                      JoinPath(tmpfs_dir_.path(), kSymlink).c_str()),
              SyscallSucceeds());
  char buf[256];
  EXPECT_THAT(
      readlink(JoinPath(verity_dir, kSymlink).c_str(), buf, sizeof(buf)),
      SyscallFailsWithErrno(EIO));
  EXPECT_THAT(open(JoinPath(verity_dir, kSymlink).c_str(), O_RDONLY, 0777),
              SyscallFailsWithErrno(EIO));
}

}  // namespace

}  // namespace testing
}  // namespace gvisor