/** * test2 creating users * * Create a user * Try to create a duplicate user - expects a failure * Remove that user - expected to fail as one user must always remain */ static int test2() { char *err; if ((err = admin_add_user("user0", "passwd0")) != NULL) { fprintf(stderr, "admin_add_user: test 2.1 (add user) failed, %s.\n", err); return 1; } if (admin_add_user("user0", "passwd0") == NULL) { fprintf(stderr, "admin_add_user: test 2.2 (add user) failed, du;plicate.\n"); return 1; } /* Deleting the last user is forbidden so we expect this to fail */ if ((err = admin_remove_user("user0", "passwd0")) == NULL) { fprintf(stderr, "admin_remove_user: test 2.3 (add user) failed, %s.\n", err); return 1; } return 0; }
int main(int argc, char **argv) { int result = 0; char *home, buf[1024]; /* Unlink any existing password file before running this test */ sprintf(buf, "%s/passwd", get_datadir()); if(!is_valid_posix_path(buf)) exit(1); if (strcmp(buf, "/etc/passwd") != 0) unlink(buf); result += test1(); result += test2(); result += test3(); result += test4(); result += test5(); /* Add the default user back so other tests can use it */ admin_add_user("admin", "mariadb"); exit(result); }
int main(int argc, char **argv) { int result = 0; char *home, buf[1024]; /* Unlink any existing password file before running this test */ if ((home = getenv("MAXSCALE_HOME")) == NULL || strlen(home) >= 1024) home = "/usr/local/skysql"; sprintf(buf, "%s/etc/passwd", home); if(!is_valid_posix_path(buf)) exit(1); if (strcmp(buf, "/etc/passwd") != 0) unlink(buf); result += test1(); result += test2(); result += test3(); result += test4(); result += test5(); /* Add the default user back so other tests can use it */ admin_add_user("admin", "skysql"); exit(result); }
/** * Add a new maxscale admin user * * @param dcb The DCB for messages * @param user The user name * @param passwd The Password of the user */ static void telnetdAddUser(DCB *dcb, char *user, char *passwd) { char *err; if (admin_search_user(user)) { dcb_printf(dcb, "User %s already exists.\n", user); return; } if ((err = admin_add_user(user, passwd)) == NULL) dcb_printf(dcb, "User %s has been successfully added.\n", user); else dcb_printf(dcb, "Failed to add new user. %s\n", err); }
/** * test5 remove first user * * Create a user so that user0 may be removed * Remove the first user created (user0) */ static int test5() { char *err; if ((err = admin_add_user("user", "passwd")) != NULL) { fprintf(stderr, "admin_add_user: test 5.1 (add user) failed, %s.\n", err); return 1; } if ((err = admin_remove_user("user0", "passwd0")) != NULL) { fprintf(stderr, "admin_remove_user: test 5.2 (add user) failed, %s.\n", err); return 1; } return 0; }
/** * test3 search/verify users * * Create a user * Search for that user * Search for a non-existant user * Remove the user * Search for the user that was removed */ static int test3() { char *err; if ((err = admin_add_user("user1", "passwd1")) != NULL) { fprintf(stderr, "admin_add_user: test 3.1 (add user) failed, %s.\n", err); return 1; } if (admin_search_user("user1") == 0) { fprintf(stderr, "admin_search_user: test 3.2 (search user) failed.\n"); return 1; } if (admin_search_user("user2") != 0) { fprintf(stderr, "admin_search_user: test 3.3 (search user) failed, unexpeted user found.\n"); return 1; } if ((err = admin_remove_user("user1", "passwd1")) != NULL) { fprintf(stderr, "admin_remove_user: test 3.4 (add user) failed, %s.\n", err); return 1; } if (admin_search_user("user1")) { fprintf(stderr, "admin_search_user: test 3.5 (search user) failed - user was deleted.\n"); return 1; } return 0; }
/** * test4 verify users * * Create a numebr of users * search for each user in turn * verify each user in turn (password verification) * Verify each user in turn with incorrect password * Randomly verify each user * Remove each user */ static int test4() { char *err, user[40], passwd[40]; int i, n_users = 50; for (i = 1; i < n_users; i++) { sprintf(user, "user%d", i); sprintf(passwd, "passwd%d", i); if ((err = admin_add_user(user, passwd)) != NULL) { fprintf(stderr, "admin_add_user: test 4.1 (add user) failed, %s.\n", err); return 1; } } for (i = 1; i < n_users; i++) { sprintf(user, "user%d", i); if (admin_search_user(user) == 0) { fprintf(stderr, "admin_search_user: test 4.2 (search user) failed.\n"); return 1; } } for (i = 1; i < n_users; i++) { sprintf(user, "user%d", i); sprintf(passwd, "passwd%d", i); if (admin_verify(user, passwd) == 0) { fprintf(stderr, "admin_verify: test 4.3 (search user) failed.\n"); return 1; } } for (i = 1; i < n_users; i++) { sprintf(user, "user%d", i); sprintf(passwd, "badpasswd%d", i); if (admin_verify(user, passwd) != 0) { fprintf(stderr, "admin_verify: test 4.4 (search user) failed.\n"); return 1; } } srand(time(0)); for (i = 1; i < 1000; i++) { int j; j = rand() % n_users; if (j == 0) j = 1; sprintf(user, "user%d", j); sprintf(passwd, "passwd%d", j); if (admin_verify(user, passwd) == 0) { fprintf(stderr, "admin_verify: test 4.5 (random) failed.\n"); return 1; } } for (i = 1; i < n_users; i++) { sprintf(user, "user%d", i); sprintf(passwd, "passwd%d", i); if ((err = admin_remove_user(user, passwd)) != NULL) { fprintf(stderr, "admin_remove_user: test 4.6 (add user) failed, %s.\n", err); return 1; } } return 0; }