summaryrefslogtreecommitdiffstats
path: root/src/tests/cwrap/test_wrapper_pam_sss.c
blob: c0d1fa5415f7b4ac3c7565f8a30607863372f74b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
/*
    Copyright (C) 2015 Red Hat

    SSSD tests: PAM tests

    This program is free software; you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
    the Free Software Foundation; either version 3 of the License, or
    (at your option) any later version.

    This program is distributed in the hope that it will be useful,
    but WITHOUT ANY WARRANTY; without even the implied warranty of
    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    GNU General Public License for more details.

    You should have received a copy of the GNU General Public License
    along with this program.  If not, see <http://www.gnu.org/licenses/>.
*/

#include <popt.h>
#include <libpamtest.h>

#include "util/util.h"
#include "tests/cmocka/common_mock.h"

static void test_pam_authenticate(void **state)
{
    enum pamtest_err perr;
    const char *testuser_authtoks[] = {
        "secret",
        NULL,
    };
    struct pamtest_case tests[] = {
        { PAMTEST_AUTHENTICATE, PAM_SUCCESS, 0, 0 },
        { PAMTEST_SENTINEL, 0, 0, 0 },
    };

    (void) state;	/* unused */

    perr = pamtest("test_pam_sss", "testuser", testuser_authtoks, tests);
    assert_int_equal(perr, PAMTEST_ERR_OK);
}

static void test_pam_authenticate_err(void **state)
{
    enum pamtest_err perr;
    const char *testuser_authtoks[] = {
        "wrong_secret",
        NULL,
    };
    struct pamtest_case tests[] = {
        { PAMTEST_AUTHENTICATE, PAM_AUTH_ERR, 0, 0 },
        { PAMTEST_SENTINEL, 0, 0, 0 },
    };

    (void) state;	/* unused */

    perr = pamtest("test_pam_sss", "testuser", testuser_authtoks, tests);
    assert_int_equal(perr, PAMTEST_ERR_OK);
}

int main(int argc, const char *argv[])
{
    poptContext pc;
    int opt;
    struct poptOption long_options[] = {
        POPT_AUTOHELP
        SSSD_DEBUG_OPTS
        POPT_TABLEEND
    };

    const struct CMUnitTest tests[] = {
        cmocka_unit_test(test_pam_authenticate),
        cmocka_unit_test(test_pam_authenticate_err),
    };

    /* Set debug level to invalid value so we can deside if -d 0 was used. */
    debug_level = SSSDBG_INVALID;

    pc = poptGetContext(argv[0], argc, argv, long_options, 0);
    while((opt = poptGetNextOpt(pc)) != -1) {
        switch(opt) {
        default:
            fprintf(stderr, "\nInvalid option %s: %s\n\n",
                    poptBadOption(pc, 0), poptStrerror(opt));
            poptPrintUsage(pc, stderr, 0);
            return 1;
        }
    }
    poptFreeContext(pc);

    DEBUG_CLI_INIT(debug_level);
    tests_set_cwd();

    return cmocka_run_group_tests(tests, NULL, NULL);
}