6849c706fc
Resolves: rhbz#1765354 - [RFE] - Show password expiration warning when IdM users login with SSH keys Resolves: rhbz#1913839 - filter_groups doesn't filter GID from 'id' output: AD + 'ldap_id_mapping = True' corner case Resolves: rhbz#2100789 - [Improvement] sssctl config-check command does not show an error when we don't have id_provider in the domain section Resolves: rhbz#2152177 - [RFE] Add support for ldapi:// URLs Resolves: rhbz#2164852 - man page entry should make clear that a nested group needs a name Resolves: rhbz#2166627 - Improvement: sss_client: add 'getsidbyusername()' and 'getsidbygroupname()' and corresponding python bindings Resolves: rhbz#2166943 - kinit switches KCM away from the newly issued ticket Resolves: rhbz#2167728 - [sssd] Auth fails if client cannot speak to forest root domain (ldap_sasl_interactive_bind_s failed)
249 lines
9.0 KiB
Diff
249 lines
9.0 KiB
Diff
From eb43c2400a34a4ab77be4f75ba7536baecda3bef Mon Sep 17 00:00:00 2001
|
|
From: =?UTF-8?q?Alejandro=20L=C3=B3pez?= <allopez@redhat.com>
|
|
Date: Wed, 10 May 2023 17:29:07 +0200
|
|
Subject: [PATCH] FILE WATCH: Callback not executed on link or relative path
|
|
MIME-Version: 1.0
|
|
Content-Type: text/plain; charset=UTF-8
|
|
Content-Transfer-Encoding: 8bit
|
|
|
|
When the watched file was a symbolic link or was a relative path,
|
|
the calback was not executed because the filename comparison
|
|
was wrongly considering the files to be different.
|
|
|
|
The solution is to normalize the filenames before comparing them.
|
|
This cannot be easily done at setup because the file could not
|
|
exist at that moment.
|
|
|
|
The test was adapted to check this situation.
|
|
|
|
Resolves: https://github.com/SSSD/sssd/issues/6718
|
|
|
|
Reviewed-by: Alexey Tikhonov <atikhono@redhat.com>
|
|
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
|
|
(cherry picked from commit b2a4ff2aa67707c226c5835c1fcac042fce1cae3)
|
|
---
|
|
src/tests/file_watch-tests.c | 83 ++++++++++++++++++++++++++----------
|
|
src/util/file_watch.c | 26 +++++++++--
|
|
2 files changed, 83 insertions(+), 26 deletions(-)
|
|
|
|
diff --git a/src/tests/file_watch-tests.c b/src/tests/file_watch-tests.c
|
|
index 3ca5b44f9..3e1aea6ce 100644
|
|
--- a/src/tests/file_watch-tests.c
|
|
+++ b/src/tests/file_watch-tests.c
|
|
@@ -36,11 +36,19 @@
|
|
#include "util/file_watch.h"
|
|
#include "tests/common.h"
|
|
|
|
-#define FW_DIR TEST_DIR "/file-watch"
|
|
-#define WATCHED_FILE_INOTIFY FW_DIR "/watched_file_inotify"
|
|
-#define WATCHED_FILE_POLL FW_DIR "/watched_file_poll"
|
|
-#define WATCHED_EXISTING_FILE_INOTIFY FW_DIR "/watched_file_inotify.exists"
|
|
-#define WATCHED_EXISTING_FILE_POLL FW_DIR "/watched_file_poll.exists"
|
|
+#define FW_NAME "/file-watch-test-dir"
|
|
+#define FILE_INOTIFY_NAME "watched_file_inotify"
|
|
+#define FILE_POLL_NAME "watched_file_poll"
|
|
+#define FW_DIR TEST_DIR FW_NAME
|
|
+#define EXISTING_FILE_INOTIFY_NAME FILE_INOTIFY_NAME ".exists"
|
|
+#define EXISTING_FILE_POLL_NAME FILE_POLL_NAME ".exists"
|
|
+#define WATCHED_FILE_INOTIFY FW_DIR "/.." FW_NAME "/" FILE_INOTIFY_NAME
|
|
+#define WATCHED_FILE_POLL FW_DIR "/.." FW_NAME "/" FILE_POLL_NAME
|
|
+#define WATCHED_EXISTING_FILE_INOTIFY FW_DIR "/.." FW_NAME "/" EXISTING_FILE_INOTIFY_NAME
|
|
+#define WATCHED_EXISTING_FILE_POLL FW_DIR "/.." FW_NAME "/" EXISTING_FILE_POLL_NAME
|
|
+#define WATCHED_EXISTING_LINK_INOTIFY FW_DIR "/" EXISTING_FILE_INOTIFY_NAME ".link"
|
|
+#define WATCHED_EXISTING_LINK_POLL FW_DIR "/" EXISTING_FILE_POLL_NAME ".link"
|
|
+#define UNWATCHED_FILE FW_DIR "/unwatched_file"
|
|
|
|
|
|
static TALLOC_CTX *test_mem_ctx;
|
|
@@ -50,34 +58,51 @@ struct fn_arg {
|
|
int counter;
|
|
};
|
|
|
|
-static void setup_file_watch(void)
|
|
+static void remove_files(void)
|
|
{
|
|
- test_mem_ctx = talloc_new(NULL);
|
|
- mkdir(FW_DIR, 0700);
|
|
unlink(WATCHED_FILE_INOTIFY);
|
|
unlink(WATCHED_FILE_POLL);
|
|
+ unlink(WATCHED_EXISTING_LINK_INOTIFY);
|
|
+ unlink(WATCHED_EXISTING_LINK_POLL);
|
|
unlink(WATCHED_EXISTING_FILE_INOTIFY);
|
|
unlink(WATCHED_EXISTING_FILE_POLL);
|
|
+ unlink(UNWATCHED_FILE);
|
|
}
|
|
|
|
+static void setup_file_watch(void)
|
|
+{
|
|
+ DEBUG(SSSDBG_TRACE_ALL, "==========================================\n");
|
|
+ test_mem_ctx = talloc_new(NULL);
|
|
+ mkdir(FW_DIR, 0700);
|
|
+ remove_files();
|
|
+}
|
|
|
|
static void teardown_file_watch(void)
|
|
{
|
|
- unlink(WATCHED_FILE_INOTIFY);
|
|
- unlink(WATCHED_FILE_POLL);
|
|
- unlink(WATCHED_EXISTING_FILE_INOTIFY);
|
|
- unlink(WATCHED_EXISTING_FILE_POLL);
|
|
talloc_free(test_mem_ctx);
|
|
+ remove_files();
|
|
+ rmdir(FW_DIR);
|
|
}
|
|
|
|
|
|
static void callback(const char *filename, void *arg)
|
|
{
|
|
- DEBUG(SSSDBG_TRACE_FUNC, "Callback invoked\n");
|
|
+ static char received[PATH_MAX + 1];
|
|
+ static char expected[PATH_MAX + 1];
|
|
+ char *res;
|
|
struct fn_arg *data = (struct fn_arg *) arg;
|
|
|
|
+ DEBUG(SSSDBG_TRACE_FUNC, "Callback invoked\n");
|
|
+
|
|
ck_assert_msg(data != NULL, "Callback received NULL argument");
|
|
- ck_assert_msg(strcmp(filename, data->filename) == 0,
|
|
+
|
|
+ res = realpath(data->filename, expected);
|
|
+ ck_assert_msg(res != NULL, "Failed to normalize the expected filename");
|
|
+
|
|
+ res = realpath(filename, received);
|
|
+ ck_assert_msg(res != NULL, "Failed to normalize the received filename");
|
|
+
|
|
+ ck_assert_msg(strcmp(expected, received) == 0,
|
|
"Wrong filename in the callback.");
|
|
data->counter++;
|
|
}
|
|
@@ -88,7 +113,7 @@ static void modify_file(const char *filename)
|
|
int fd;
|
|
int res;
|
|
|
|
- DEBUG(SSSDBG_TRACE_FUNC, "File modified\n");
|
|
+ DEBUG(SSSDBG_TRACE_FUNC, "Modifying file %s\n", filename);
|
|
fd = open(filename, O_WRONLY | O_CREAT | O_APPEND, S_IRUSR | S_IWUSR);
|
|
ck_assert_msg(fd != -1, "Failed to open the file.");
|
|
|
|
@@ -119,11 +144,14 @@ static void test_file_watch_no_file(bool use_inotify)
|
|
arg.filename = filename;
|
|
arg.counter = 0;
|
|
|
|
+ DEBUG(SSSDBG_TRACE_ALL, "Watching file %s\n", filename);
|
|
ctx = fw_watch_file(test_mem_ctx, ev, filename, use_inotify, callback, &arg);
|
|
ck_assert_msg(ctx != NULL, "Failed to watch a file.");
|
|
ck_assert_msg(arg.counter == 0, "Unexpected callback invocation.");
|
|
|
|
- // At this point the file doesn't exist, we will create it.
|
|
+ // At this point the file doesn't exist. We create the watched and an
|
|
+ // unwatched file
|
|
+ modify_file(UNWATCHED_FILE);
|
|
modify_file(filename);
|
|
if (use_inotify) {
|
|
res = tevent_loop_once(ev);
|
|
@@ -152,26 +180,35 @@ static void test_file_watch_with_file(bool use_inotify)
|
|
{
|
|
struct file_watch_ctx *ctx;
|
|
struct tevent_context *ev;
|
|
+ const char *filepath;
|
|
const char *filename;
|
|
+ const char *linkpath;
|
|
struct fn_arg arg;
|
|
int res;
|
|
|
|
if (use_inotify) {
|
|
- filename = WATCHED_EXISTING_FILE_INOTIFY;
|
|
+ filename = EXISTING_FILE_INOTIFY_NAME;
|
|
+ filepath = WATCHED_EXISTING_FILE_INOTIFY;
|
|
+ linkpath = WATCHED_EXISTING_LINK_INOTIFY;
|
|
} else {
|
|
- filename = WATCHED_EXISTING_FILE_POLL;
|
|
+ filename = EXISTING_FILE_POLL_NAME;
|
|
+ filepath = WATCHED_EXISTING_FILE_POLL;
|
|
+ linkpath = WATCHED_EXISTING_LINK_POLL;
|
|
}
|
|
- modify_file(filename);
|
|
+ modify_file(filepath);
|
|
+ res = symlink(filename, linkpath);
|
|
+ ck_assert_msg(res == 0, "Failed create the symbolic link");
|
|
|
|
ev = tevent_context_init(test_mem_ctx);
|
|
ck_assert_msg(ev != NULL, "Failed to create the tevent context.");
|
|
|
|
- arg.filename = filename;
|
|
+ arg.filename = linkpath;
|
|
arg.counter = 0;
|
|
|
|
// File already exists
|
|
- ctx = fw_watch_file(test_mem_ctx, ev, filename, use_inotify, callback, &arg);
|
|
- ck_assert_msg(ctx != NULL, "Failed to watch a file.");
|
|
+ DEBUG(SSSDBG_TRACE_ALL, "Watching link %s\n", linkpath);
|
|
+ ctx = fw_watch_file(test_mem_ctx, ev, linkpath, use_inotify, callback, &arg);
|
|
+ ck_assert_msg(ctx != NULL, "Failed to watch a link.");
|
|
ck_assert_msg(arg.counter >= 1, "Callback not invoked at start up.");
|
|
ck_assert_msg(arg.counter <= 1, "Callback invoked too many times at start up.");
|
|
|
|
@@ -179,7 +216,7 @@ static void test_file_watch_with_file(bool use_inotify)
|
|
if (!use_inotify) {
|
|
sleep(2); // Detection by polling is based on the file's modification time.
|
|
}
|
|
- modify_file(filename);
|
|
+ modify_file(filepath);
|
|
if (use_inotify) {
|
|
res = tevent_loop_once(ev);
|
|
ck_assert_msg(res == 0, "tevent_loop_once() failed.");
|
|
diff --git a/src/util/file_watch.c b/src/util/file_watch.c
|
|
index b994e4116..d19fdccd6 100644
|
|
--- a/src/util/file_watch.c
|
|
+++ b/src/util/file_watch.c
|
|
@@ -121,7 +121,10 @@ static int watched_file_inotify_cb(const char *filename,
|
|
uint32_t flags,
|
|
void *pvt)
|
|
{
|
|
+ static char received[PATH_MAX + 1];
|
|
+ static char expected[PATH_MAX + 1];
|
|
struct file_watch_ctx *fw_ctx;
|
|
+ char *res;
|
|
|
|
DEBUG(SSSDBG_TRACE_LIBS,
|
|
"Received inotify notification for %s\n", filename);
|
|
@@ -131,15 +134,32 @@ static int watched_file_inotify_cb(const char *filename,
|
|
return EINVAL;
|
|
}
|
|
|
|
- if (strcmp(fw_ctx->filename, filename) == 0) {
|
|
- if (access(fw_ctx->filename, F_OK) == 0) {
|
|
- fw_ctx->cb(fw_ctx->filename, fw_ctx->cb_arg);
|
|
+ res = realpath(fw_ctx->filename, expected);
|
|
+ if (res == NULL) {
|
|
+ DEBUG(SSSDBG_TRACE_LIBS,
|
|
+ "Normalization failed for expected %s. Skipping the callback.\n",
|
|
+ fw_ctx->filename);
|
|
+ goto done;
|
|
+ }
|
|
+
|
|
+ res = realpath(filename, received);
|
|
+ if (res == NULL) {
|
|
+ DEBUG(SSSDBG_TRACE_LIBS,
|
|
+ "Normalization failed for received %s. Skipping the callback.\n",
|
|
+ filename);
|
|
+ goto done;
|
|
+ }
|
|
+
|
|
+ if (strcmp(expected, received) == 0) {
|
|
+ if (access(received, F_OK) == 0) {
|
|
+ fw_ctx->cb(received, fw_ctx->cb_arg);
|
|
} else {
|
|
DEBUG(SSSDBG_TRACE_LIBS,
|
|
"File %s is missing. Skipping the callback.\n", filename);
|
|
}
|
|
}
|
|
|
|
+done:
|
|
return EOK;
|
|
}
|
|
|
|
--
|
|
2.38.1
|
|
|