mirror of
https://github.com/uutils/coreutils
synced 2024-12-13 14:52:41 +00:00
709 lines
20 KiB
Rust
709 lines
20 KiB
Rust
// spell-checker:ignore (words) agroupthatdoesntexist auserthatdoesntexist cuuser groupname notexisting passgrp
|
|
|
|
use crate::common::util::*;
|
|
#[cfg(any(target_os = "linux", target_os = "android"))]
|
|
use rust_users::get_effective_uid;
|
|
|
|
extern crate chown;
|
|
|
|
// Apparently some CI environments have configuration issues, e.g. with 'whoami' and 'id'.
|
|
// If we are running inside the CI and "needle" is in "stderr" skipping this test is
|
|
// considered okay. If we are not inside the CI this calls assert!(result.success).
|
|
//
|
|
// From the Logs: "Build (ubuntu-18.04, x86_64-unknown-linux-gnu, feat_os_unix, use-cross)"
|
|
//
|
|
// stderr: "whoami: cannot find name for user ID 1001"
|
|
// TODO: Maybe `adduser --uid 1001 username` can put things right?
|
|
//
|
|
// stderr: "id: cannot find name for group ID 116"
|
|
// stderr: "thread 'main' panicked at 'called `Result::unwrap()` on an `Err`
|
|
// value: Custom { kind: NotFound, error: "No such id: 1001" }',
|
|
// /project/src/uucore/src/lib/features/perms.rs:176:44"
|
|
//
|
|
fn skipping_test_is_okay(result: &CmdResult, needle: &str) -> bool {
|
|
if !result.succeeded() {
|
|
println!("result.stdout = {}", result.stdout_str());
|
|
println!("result.stderr = {}", result.stderr_str());
|
|
if is_ci() && result.stderr_str().contains(needle) {
|
|
println!("test skipped:");
|
|
return true;
|
|
} else {
|
|
result.success();
|
|
}
|
|
}
|
|
false
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod test_passgrp {
|
|
use super::chown::entries::{gid2grp, grp2gid, uid2usr, usr2uid};
|
|
|
|
#[test]
|
|
fn test_usr2uid() {
|
|
assert_eq!(0, usr2uid("root").unwrap());
|
|
assert!(usr2uid("88_888_888").is_err());
|
|
assert!(usr2uid("auserthatdoesntexist").is_err());
|
|
}
|
|
|
|
#[test]
|
|
fn test_grp2gid() {
|
|
if cfg!(target_os = "linux") || cfg!(target_os = "android") || cfg!(target_os = "windows") {
|
|
assert_eq!(0, grp2gid("root").unwrap());
|
|
} else {
|
|
assert_eq!(0, grp2gid("wheel").unwrap());
|
|
}
|
|
assert!(grp2gid("88_888_888").is_err());
|
|
assert!(grp2gid("agroupthatdoesntexist").is_err());
|
|
}
|
|
|
|
#[test]
|
|
fn test_uid2usr() {
|
|
assert_eq!("root", uid2usr(0).unwrap());
|
|
assert!(uid2usr(88_888_888).is_err());
|
|
}
|
|
|
|
#[test]
|
|
fn test_gid2grp() {
|
|
if cfg!(target_os = "linux") || cfg!(target_os = "android") || cfg!(target_os = "windows") {
|
|
assert_eq!("root", gid2grp(0).unwrap());
|
|
} else {
|
|
assert_eq!("wheel", gid2grp(0).unwrap());
|
|
}
|
|
assert!(gid2grp(88_888_888).is_err());
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn test_invalid_option() {
|
|
new_ucmd!().arg("-w").arg("-q").arg("/").fails();
|
|
}
|
|
|
|
#[test]
|
|
fn test_chown_only_owner() {
|
|
// test chown username file.txt
|
|
|
|
let scene = TestScenario::new(util_name!());
|
|
let at = &scene.fixtures;
|
|
|
|
let result = scene.cmd("whoami").run();
|
|
if skipping_test_is_okay(&result, "whoami: cannot find name for user ID") {
|
|
return;
|
|
}
|
|
let user_name = String::from(result.stdout_str().trim());
|
|
assert!(!user_name.is_empty());
|
|
|
|
let file1 = "test_chown_file1";
|
|
at.touch(file1);
|
|
|
|
// since only superuser can change owner, we have to change from ourself to ourself
|
|
let result = scene
|
|
.ucmd()
|
|
.arg(user_name)
|
|
.arg("--verbose")
|
|
.arg(file1)
|
|
.run();
|
|
result.stderr_contains(&"retained as");
|
|
|
|
// try to change to another existing user, e.g. 'root'
|
|
scene
|
|
.ucmd()
|
|
.arg("root")
|
|
.arg("--verbose")
|
|
.arg(file1)
|
|
.fails()
|
|
.stderr_contains(&"failed to change");
|
|
}
|
|
|
|
#[test]
|
|
fn test_chown_only_owner_colon() {
|
|
// test chown username: file.txt
|
|
|
|
let scene = TestScenario::new(util_name!());
|
|
let at = &scene.fixtures;
|
|
|
|
let result = scene.cmd("whoami").run();
|
|
if skipping_test_is_okay(&result, "whoami: cannot find name for user ID") {
|
|
return;
|
|
}
|
|
let user_name = String::from(result.stdout_str().trim());
|
|
assert!(!user_name.is_empty());
|
|
|
|
let file1 = "test_chown_file1";
|
|
at.touch(file1);
|
|
|
|
scene
|
|
.ucmd()
|
|
.arg(format!("{}:", user_name))
|
|
.arg("--verbose")
|
|
.arg(file1)
|
|
.succeeds()
|
|
.stderr_contains(&"retained as");
|
|
|
|
scene
|
|
.ucmd()
|
|
.arg(format!("{}.", user_name))
|
|
.arg("--verbose")
|
|
.arg(file1)
|
|
.succeeds()
|
|
.stderr_contains(&"retained as");
|
|
|
|
scene
|
|
.ucmd()
|
|
.arg("root:")
|
|
.arg("--verbose")
|
|
.arg(file1)
|
|
.fails()
|
|
.stderr_contains(&"failed to change");
|
|
}
|
|
|
|
#[test]
|
|
fn test_chown_only_colon() {
|
|
// test chown : file.txt
|
|
|
|
let scene = TestScenario::new(util_name!());
|
|
let at = &scene.fixtures;
|
|
|
|
let file1 = "test_chown_file1";
|
|
at.touch(file1);
|
|
|
|
// expected:
|
|
// $ chown -v : file.txt 2>out_err ; echo $? ; cat out_err
|
|
// ownership of 'file.txt' retained
|
|
// 0
|
|
let result = scene.ucmd().arg(":").arg("--verbose").arg(file1).run();
|
|
if skipping_test_is_okay(&result, "No such id") {
|
|
return;
|
|
}
|
|
result.stderr_contains(&"retained as"); // TODO: verbose is not printed to stderr in GNU chown
|
|
|
|
// test chown : file.txt
|
|
// expected:
|
|
// $ chown -v :: file.txt 2>out_err ; echo $? ; cat out_err
|
|
// 1
|
|
// chown: invalid group: '::'
|
|
scene
|
|
.ucmd()
|
|
.arg("::")
|
|
.arg("--verbose")
|
|
.arg(file1)
|
|
.fails()
|
|
.stderr_contains(&"invalid group: '::'");
|
|
|
|
scene
|
|
.ucmd()
|
|
.arg("..")
|
|
.arg("--verbose")
|
|
.arg(file1)
|
|
.fails()
|
|
.stderr_contains(&"invalid group: '..'");
|
|
}
|
|
|
|
#[test]
|
|
fn test_chown_failed_stdout() {
|
|
// test chown root file.txt
|
|
|
|
// TODO: implement once output "failed to change" to stdout is fixed
|
|
// expected:
|
|
// $ chown -v root file.txt 2>out_err ; echo $? ; cat out_err
|
|
// failed to change ownership of 'file.txt' from jhs to root
|
|
// 1
|
|
// chown: changing ownership of 'file.txt': Operation not permitted
|
|
}
|
|
|
|
#[test]
|
|
// FixME: Fails on freebsd because of chown: invalid group: 'root:root'
|
|
#[cfg(not(target_os = "freebsd"))]
|
|
fn test_chown_owner_group() {
|
|
// test chown username:group file.txt
|
|
|
|
let scene = TestScenario::new(util_name!());
|
|
let at = &scene.fixtures;
|
|
|
|
let result = scene.cmd("whoami").run();
|
|
if skipping_test_is_okay(&result, "whoami: cannot find name for user ID") {
|
|
return;
|
|
}
|
|
|
|
let user_name = String::from(result.stdout_str().trim());
|
|
assert!(!user_name.is_empty());
|
|
|
|
let file1 = "test_chown_file1";
|
|
at.touch(file1);
|
|
|
|
let result = scene.cmd("id").arg("-gn").run();
|
|
if skipping_test_is_okay(&result, "id: cannot find name for group ID") {
|
|
return;
|
|
}
|
|
let group_name = String::from(result.stdout_str().trim());
|
|
assert!(!group_name.is_empty());
|
|
|
|
let result = scene
|
|
.ucmd()
|
|
.arg(format!("{}:{}", user_name, group_name))
|
|
.arg("--verbose")
|
|
.arg(file1)
|
|
.run();
|
|
if skipping_test_is_okay(&result, "chown: invalid group:") {
|
|
return;
|
|
}
|
|
result.stderr_contains(&"retained as");
|
|
|
|
scene
|
|
.ucmd()
|
|
.arg("root:root:root")
|
|
.arg("--verbose")
|
|
.arg(file1)
|
|
.fails()
|
|
.stderr_contains(&"invalid group");
|
|
|
|
scene
|
|
.ucmd()
|
|
.arg("root.root.root")
|
|
.arg("--verbose")
|
|
.arg(file1)
|
|
.fails()
|
|
.stderr_contains(&"invalid group");
|
|
|
|
// TODO: on macos group name is not recognized correctly: "chown: invalid group: 'root:root'
|
|
#[cfg(any(windows, all(unix, not(target_os = "macos"))))]
|
|
scene
|
|
.ucmd()
|
|
.arg("root:root")
|
|
.arg("--verbose")
|
|
.arg(file1)
|
|
.fails()
|
|
.stderr_contains(&"failed to change");
|
|
}
|
|
|
|
#[test]
|
|
// FixME: Fails on freebsd because of chown: invalid group: 'root:root'
|
|
#[cfg(not(target_os = "freebsd"))]
|
|
fn test_chown_various_input() {
|
|
// test chown username:group file.txt
|
|
|
|
let scene = TestScenario::new(util_name!());
|
|
let at = &scene.fixtures;
|
|
|
|
let result = scene.cmd("whoami").run();
|
|
if skipping_test_is_okay(&result, "whoami: cannot find name for user ID") {
|
|
return;
|
|
}
|
|
|
|
let user_name = String::from(result.stdout_str().trim());
|
|
assert!(!user_name.is_empty());
|
|
|
|
let file1 = "test_chown_file1";
|
|
at.touch(file1);
|
|
|
|
let result = scene.cmd("id").arg("-gn").run();
|
|
if skipping_test_is_okay(&result, "id: cannot find name for group ID") {
|
|
return;
|
|
}
|
|
let group_name = String::from(result.stdout_str().trim());
|
|
assert!(!group_name.is_empty());
|
|
|
|
let result = scene
|
|
.ucmd()
|
|
.arg(format!("{}:{}", user_name, group_name))
|
|
.arg("--verbose")
|
|
.arg(file1)
|
|
.run();
|
|
if skipping_test_is_okay(&result, "chown: invalid group:") {
|
|
return;
|
|
}
|
|
result.stderr_contains(&"retained as");
|
|
|
|
// check that username.groupname is understood
|
|
let result = scene
|
|
.ucmd()
|
|
.arg(format!("{}.{}", user_name, group_name))
|
|
.arg("--verbose")
|
|
.arg(file1)
|
|
.run();
|
|
if skipping_test_is_okay(&result, "chown: invalid group:") {
|
|
return;
|
|
}
|
|
result.stderr_contains(&"retained as");
|
|
|
|
// Fails as user.name doesn't exist in the CI
|
|
// but it is valid
|
|
scene
|
|
.ucmd()
|
|
.arg(format!("{}:{}", "user.name", "groupname"))
|
|
.arg("--verbose")
|
|
.arg(file1)
|
|
.fails()
|
|
.stderr_contains(&"chown: invalid user: 'user.name:groupname'");
|
|
}
|
|
|
|
#[test]
|
|
// FixME: on macos & freebsd group name is not recognized correctly: "chown: invalid group: ':groupname'
|
|
#[cfg(any(
|
|
windows,
|
|
all(unix, not(any(target_os = "macos", target_os = "freebsd")))
|
|
))]
|
|
fn test_chown_only_group() {
|
|
// test chown :group file.txt
|
|
|
|
let scene = TestScenario::new(util_name!());
|
|
let at = &scene.fixtures;
|
|
|
|
let result = scene.cmd("whoami").run();
|
|
if skipping_test_is_okay(&result, "whoami: cannot find name for user ID") {
|
|
return;
|
|
}
|
|
let user_name = String::from(result.stdout_str().trim());
|
|
assert!(!user_name.is_empty());
|
|
|
|
let file1 = "test_chown_file1";
|
|
at.touch(file1);
|
|
|
|
let result = scene
|
|
.ucmd()
|
|
.arg(format!(":{}", user_name))
|
|
.arg("--verbose")
|
|
.arg(file1)
|
|
.run();
|
|
if is_ci() && result.stderr_str().contains("Operation not permitted") {
|
|
// With ubuntu with old Rust in the CI, we can get an error
|
|
return;
|
|
}
|
|
if is_ci() && result.stderr_str().contains("chown: invalid group:") {
|
|
// With mac into the CI, we can get this answer
|
|
return;
|
|
}
|
|
result.stderr_contains(&"retained as");
|
|
result.success();
|
|
|
|
scene
|
|
.ucmd()
|
|
.arg(":root")
|
|
.arg("--verbose")
|
|
.arg(file1)
|
|
.fails()
|
|
.stderr_contains(&"failed to change");
|
|
}
|
|
|
|
#[test]
|
|
fn test_chown_only_user_id() {
|
|
// test chown 1111 file.txt
|
|
|
|
let scene = TestScenario::new(util_name!());
|
|
let at = &scene.fixtures;
|
|
|
|
let result = scene.cmd_keepenv("id").arg("-u").run();
|
|
if skipping_test_is_okay(&result, "id: cannot find name for group ID") {
|
|
return;
|
|
}
|
|
let user_id = String::from(result.stdout_str().trim());
|
|
assert!(!user_id.is_empty());
|
|
|
|
let file1 = "test_chown_file1";
|
|
at.touch(file1);
|
|
|
|
let result = scene.ucmd().arg(user_id).arg("--verbose").arg(file1).run();
|
|
if skipping_test_is_okay(&result, "invalid user") {
|
|
// From the Logs: "Build (ubuntu-18.04, x86_64-unknown-linux-gnu, feat_os_unix, use-cross)"
|
|
// stderr: "chown: invalid user: '1001'
|
|
return;
|
|
}
|
|
result.stderr_contains(&"retained as");
|
|
|
|
scene
|
|
.ucmd()
|
|
.arg("0")
|
|
.arg("--verbose")
|
|
.arg(file1)
|
|
.fails()
|
|
.stderr_contains(&"failed to change");
|
|
}
|
|
|
|
/// Test for setting the owner to a user ID for a user that does not exist.
|
|
///
|
|
/// For example:
|
|
///
|
|
/// $ touch f && chown 12345 f
|
|
///
|
|
/// succeeds with exit status 0 and outputs nothing. The owner of the
|
|
/// file is set to 12345, even though no user with that ID exists.
|
|
///
|
|
/// This test must be run as root, because only the root user can
|
|
/// transfer ownership of a file.
|
|
#[test]
|
|
fn test_chown_only_user_id_nonexistent_user() {
|
|
let ts = TestScenario::new(util_name!());
|
|
let at = ts.fixtures.clone();
|
|
at.touch("f");
|
|
if let Ok(result) = run_ucmd_as_root(&ts, &["12345", "f"]) {
|
|
result.success().no_stdout().no_stderr();
|
|
} else {
|
|
print!("Test skipped; requires root user");
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
// FixME: stderr = chown: ownership of 'test_chown_file1' retained as cuuser:wheel
|
|
#[cfg(not(target_os = "freebsd"))]
|
|
fn test_chown_only_group_id() {
|
|
// test chown :1111 file.txt
|
|
|
|
let scene = TestScenario::new(util_name!());
|
|
let at = &scene.fixtures;
|
|
|
|
let result = scene.cmd_keepenv("id").arg("-g").run();
|
|
if skipping_test_is_okay(&result, "id: cannot find name for group ID") {
|
|
return;
|
|
}
|
|
let group_id = String::from(result.stdout_str().trim());
|
|
assert!(!group_id.is_empty());
|
|
|
|
let file1 = "test_chown_file1";
|
|
at.touch(file1);
|
|
|
|
let result = scene
|
|
.ucmd()
|
|
.arg(format!(":{}", group_id))
|
|
.arg("--verbose")
|
|
.arg(file1)
|
|
.run();
|
|
if skipping_test_is_okay(&result, "chown: invalid group:") {
|
|
// With mac into the CI, we can get this answer
|
|
return;
|
|
}
|
|
result.stderr_contains(&"retained as");
|
|
|
|
// Apparently on CI "macos-latest, x86_64-apple-darwin, feat_os_macos"
|
|
// the process has the rights to change from runner:staff to runner:wheel
|
|
#[cfg(any(windows, all(unix, not(target_os = "macos"))))]
|
|
scene
|
|
.ucmd()
|
|
.arg(":0")
|
|
.arg("--verbose")
|
|
.arg(file1)
|
|
.fails()
|
|
.stderr_contains(&"failed to change");
|
|
}
|
|
|
|
/// Test for setting the group to a group ID for a group that does not exist.
|
|
///
|
|
/// For example:
|
|
///
|
|
/// $ touch f && chown :12345 f
|
|
///
|
|
/// succeeds with exit status 0 and outputs nothing. The group of the
|
|
/// file is set to 12345, even though no group with that ID exists.
|
|
///
|
|
/// This test must be run as root, because only the root user can
|
|
/// transfer ownership of a file.
|
|
#[test]
|
|
fn test_chown_only_group_id_nonexistent_group() {
|
|
let ts = TestScenario::new(util_name!());
|
|
let at = ts.fixtures.clone();
|
|
at.touch("f");
|
|
if let Ok(result) = run_ucmd_as_root(&ts, &[":12345", "f"]) {
|
|
result.success().no_stdout().no_stderr();
|
|
} else {
|
|
print!("Test skipped; requires root user");
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn test_chown_owner_group_id() {
|
|
// test chown 1111:1111 file.txt
|
|
|
|
let scene = TestScenario::new(util_name!());
|
|
let at = &scene.fixtures;
|
|
|
|
let result = scene.cmd_keepenv("id").arg("-u").run();
|
|
if skipping_test_is_okay(&result, "id: cannot find name for group ID") {
|
|
return;
|
|
}
|
|
let user_id = String::from(result.stdout_str().trim());
|
|
assert!(!user_id.is_empty());
|
|
|
|
let result = scene.cmd_keepenv("id").arg("-g").run();
|
|
if skipping_test_is_okay(&result, "id: cannot find name for group ID") {
|
|
return;
|
|
}
|
|
let group_id = String::from(result.stdout_str().trim());
|
|
assert!(!group_id.is_empty());
|
|
|
|
let file1 = "test_chown_file1";
|
|
at.touch(file1);
|
|
|
|
let result = scene
|
|
.ucmd()
|
|
.arg(format!("{}:{}", user_id, group_id))
|
|
.arg("--verbose")
|
|
.arg(file1)
|
|
.run();
|
|
if skipping_test_is_okay(&result, "invalid user") {
|
|
// From the Logs: "Build (ubuntu-18.04, x86_64-unknown-linux-gnu, feat_os_unix, use-cross)"
|
|
// stderr: "chown: invalid user: '1001:116'
|
|
return;
|
|
}
|
|
result.stderr_contains(&"retained as");
|
|
|
|
let result = scene
|
|
.ucmd()
|
|
.arg(format!("{}.{}", user_id, group_id))
|
|
.arg("--verbose")
|
|
.arg(file1)
|
|
.run();
|
|
if skipping_test_is_okay(&result, "invalid user") {
|
|
// From the Logs: "Build (ubuntu-18.04, x86_64-unknown-linux-gnu, feat_os_unix, use-cross)"
|
|
// stderr: "chown: invalid user: '1001.116'
|
|
return;
|
|
}
|
|
result.stderr_contains(&"retained as");
|
|
|
|
scene
|
|
.ucmd()
|
|
.arg("0:0")
|
|
.arg("--verbose")
|
|
.arg(file1)
|
|
.fails()
|
|
.stderr_contains(&"failed to change");
|
|
}
|
|
|
|
#[test]
|
|
// FixME: Fails on freebsd because of chown: invalid group: '0:root'
|
|
#[cfg(not(target_os = "freebsd"))]
|
|
fn test_chown_owner_group_mix() {
|
|
// test chown 1111:group file.txt
|
|
|
|
let scene = TestScenario::new(util_name!());
|
|
let at = &scene.fixtures;
|
|
|
|
let result = scene.cmd_keepenv("id").arg("-u").run();
|
|
if skipping_test_is_okay(&result, "id: cannot find name for group ID") {
|
|
return;
|
|
}
|
|
let user_id = String::from(result.stdout_str().trim());
|
|
assert!(!user_id.is_empty());
|
|
|
|
let result = scene.cmd_keepenv("id").arg("-gn").run();
|
|
if skipping_test_is_okay(&result, "id: cannot find name for group ID") {
|
|
return;
|
|
}
|
|
let group_name = String::from(result.stdout_str().trim());
|
|
assert!(!group_name.is_empty());
|
|
|
|
let file1 = "test_chown_file1";
|
|
at.touch(file1);
|
|
|
|
let result = scene
|
|
.ucmd()
|
|
.arg(format!("{}:{}", user_id, group_name))
|
|
.arg("--verbose")
|
|
.arg(file1)
|
|
.run();
|
|
result.stderr_contains(&"retained as");
|
|
|
|
// TODO: on macos group name is not recognized correctly: "chown: invalid group: '0:root'
|
|
#[cfg(any(windows, all(unix, not(target_os = "macos"))))]
|
|
scene
|
|
.ucmd()
|
|
.arg("0:root")
|
|
.arg("--verbose")
|
|
.arg(file1)
|
|
.fails()
|
|
.stderr_contains(&"failed to change");
|
|
}
|
|
|
|
#[test]
|
|
fn test_chown_recursive() {
|
|
let scene = TestScenario::new(util_name!());
|
|
let at = &scene.fixtures;
|
|
|
|
let result = scene.cmd("whoami").run();
|
|
if skipping_test_is_okay(&result, "whoami: cannot find name for user ID") {
|
|
return;
|
|
}
|
|
let user_name = String::from(result.stdout_str().trim());
|
|
assert!(!user_name.is_empty());
|
|
|
|
at.mkdir_all("a/b/c");
|
|
at.mkdir("z");
|
|
at.touch(&at.plus_as_string("a/a"));
|
|
at.touch(&at.plus_as_string("a/b/b"));
|
|
at.touch(&at.plus_as_string("a/b/c/c"));
|
|
at.touch(&at.plus_as_string("z/y"));
|
|
|
|
let result = scene
|
|
.ucmd()
|
|
.arg("-R")
|
|
.arg("--verbose")
|
|
.arg(user_name)
|
|
.arg("a")
|
|
.arg("z")
|
|
.run();
|
|
result.stderr_contains(&"ownership of 'a/a' retained as");
|
|
result.stderr_contains(&"ownership of 'z/y' retained as");
|
|
}
|
|
|
|
#[test]
|
|
fn test_root_preserve() {
|
|
let scene = TestScenario::new(util_name!());
|
|
|
|
let result = scene.cmd("whoami").run();
|
|
if skipping_test_is_okay(&result, "whoami: cannot find name for user ID") {
|
|
return;
|
|
}
|
|
let user_name = String::from(result.stdout_str().trim());
|
|
assert!(!user_name.is_empty());
|
|
|
|
let result = scene
|
|
.ucmd()
|
|
.arg("--preserve-root")
|
|
.arg("-R")
|
|
.arg(user_name)
|
|
.arg("/")
|
|
.fails();
|
|
result.stderr_contains(&"chown: it is dangerous to operate recursively");
|
|
}
|
|
|
|
#[cfg(any(target_os = "linux", target_os = "android"))]
|
|
#[test]
|
|
fn test_big_p() {
|
|
if get_effective_uid() != 0 {
|
|
new_ucmd!()
|
|
.arg("-RP")
|
|
.arg("bin")
|
|
.arg("/proc/self/cwd")
|
|
.fails()
|
|
.stderr_contains(
|
|
// linux fails with "Operation not permitted (os error 1)"
|
|
// because of insufficient permissions,
|
|
// android fails with "Permission denied (os error 13)"
|
|
// because it can't resolve /proc (even though it can resolve /proc/self/)
|
|
"chown: changing ownership of '/proc/self/cwd': ",
|
|
);
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn test_chown_file_notexisting() {
|
|
// test chown username not_existing
|
|
|
|
let scene = TestScenario::new(util_name!());
|
|
|
|
let result = scene.cmd("whoami").run();
|
|
if skipping_test_is_okay(&result, "whoami: cannot find name for user ID") {
|
|
return;
|
|
}
|
|
let user_name = String::from(result.stdout_str().trim());
|
|
assert!(!user_name.is_empty());
|
|
|
|
let _result = scene
|
|
.ucmd()
|
|
.arg(user_name)
|
|
.arg("--verbose")
|
|
.arg("not_existing")
|
|
.fails();
|
|
|
|
// TODO: uncomment once "failed to change ownership of '{}' to {}" added to stdout
|
|
// result.stderr_contains(&"retained as");
|
|
// TODO: uncomment once message changed from "cannot dereference" to "cannot access"
|
|
// result.stderr_contains(&"cannot access 'not_existing': No such file or directory");
|
|
}
|