GCC Code Coverage Report


Directory: cvmfs/
File: cvmfs/sanitizer.cc
Date: 2025-06-29 02:35:41
Exec Total Coverage
Lines: 69 71 97.2%
Branches: 40 49 81.6%

Line Branch Exec Source
1 /**
2 * This file is part of the CernVM File System.
3 *
4 * Provides input data sanitizer in the form of whitelist of character ranges.
5 */
6
7
8 #include "sanitizer.h"
9
10 #include <cassert>
11
12 using namespace std; // NOLINT
13
14 #ifdef CVMFS_NAMESPACE_GUARD
15 namespace CVMFS_NAMESPACE_GUARD {
16 #endif
17
18 namespace sanitizer {
19
20 17921 CharRange::CharRange(const char range_begin, const char range_end) {
21 17921 range_begin_ = range_begin;
22 17921 range_end_ = range_end;
23 17921 }
24
25
26 17125 CharRange::CharRange(const char single_char) {
27 17125 range_begin_ = range_end_ = single_char;
28 17125 }
29
30
31 173306 bool CharRange::InRange(const char c) const {
32
4/4
✓ Branch 0 taken 142053 times.
✓ Branch 1 taken 31253 times.
✓ Branch 2 taken 114431 times.
✓ Branch 3 taken 27622 times.
173306 return (c >= range_begin_) && (c <= range_end_);
33 }
34
35
36 //------------------------------------------------------------------------------
37
38
39 16896 InputSanitizer::InputSanitizer(const string &whitelist) : max_length_(-1) {
40
1/2
✓ Branch 1 taken 16896 times.
✗ Branch 2 not taken.
16896 InitValidRanges(whitelist);
41 16896 }
42
43
44 67 InputSanitizer::InputSanitizer(const string &whitelist, int max_length)
45 67 : max_length_(max_length) {
46
1/2
✓ Branch 1 taken 67 times.
✗ Branch 2 not taken.
67 InitValidRanges(whitelist);
47 67 }
48
49
50 16963 void InputSanitizer::InitValidRanges(const std::string &whitelist) {
51 // Parse the whitelist
52 16963 const unsigned length = whitelist.length();
53 16963 unsigned pickup_pos = 0;
54
2/2
✓ Branch 0 taken 52967 times.
✓ Branch 1 taken 16963 times.
69930 for (unsigned i = 0; i < length; ++i) {
55
7/8
✓ Branch 0 taken 36006 times.
✓ Branch 1 taken 16961 times.
✓ Branch 3 taken 17921 times.
✓ Branch 4 taken 18085 times.
✗ Branch 5 not taken.
✓ Branch 6 taken 17921 times.
✓ Branch 7 taken 35046 times.
✓ Branch 8 taken 17921 times.
52967 if ((i + 1 >= length) || (whitelist[i + 1] == ' ') || (i == length - 1)) {
56
1/2
✓ Branch 1 taken 35046 times.
✗ Branch 2 not taken.
35046 const string range = whitelist.substr(pickup_pos, i - pickup_pos + 1);
57
2/3
✓ Branch 1 taken 17125 times.
✓ Branch 2 taken 17921 times.
✗ Branch 3 not taken.
35046 switch (range.length()) {
58 17125 case 1:
59
1/2
✓ Branch 3 taken 17125 times.
✗ Branch 4 not taken.
17125 valid_ranges_.push_back(CharRange(range[0]));
60 17125 break;
61 17921 case 2:
62
1/2
✓ Branch 4 taken 17921 times.
✗ Branch 5 not taken.
17921 valid_ranges_.push_back(CharRange(range[0], range[1]));
63 17921 break;
64 default:
65 assert(false);
66 }
67 35046 ++i;
68 35046 pickup_pos = i + 1;
69 35046 }
70 }
71 16963 }
72
73
74 17506 bool InputSanitizer::Sanitize(std::string::const_iterator begin,
75 std::string::const_iterator end,
76 std::string *filtered_output) const {
77 17506 int pos = 0;
78 17506 bool is_sane = true;
79
2/2
✓ Branch 2 taken 128327 times.
✓ Branch 3 taken 17498 times.
145825 for (; begin != end; ++begin) {
80
2/2
✓ Branch 2 taken 114431 times.
✓ Branch 3 taken 13896 times.
128327 if (CheckRanges(*begin)) {
81
4/4
✓ Branch 0 taken 725 times.
✓ Branch 1 taken 113706 times.
✓ Branch 2 taken 8 times.
✓ Branch 3 taken 717 times.
114431 if ((max_length_ >= 0) && (pos >= max_length_)) {
82 8 is_sane = false;
83 8 break;
84 }
85 114423 filtered_output->push_back(*begin);
86 114423 pos++;
87 } else {
88 13896 is_sane = false;
89 }
90 }
91 17506 return is_sane;
92 }
93
94
95 128327 bool InputSanitizer::CheckRanges(const char chr) const {
96
2/2
✓ Branch 1 taken 173306 times.
✓ Branch 2 taken 13896 times.
187202 for (unsigned j = 0; j < valid_ranges_.size(); ++j) {
97
2/2
✓ Branch 2 taken 114431 times.
✓ Branch 3 taken 58875 times.
173306 if (valid_ranges_[j].InRange(chr)) {
98 114431 return true;
99 }
100 }
101 13896 return false;
102 }
103
104
105 216 string InputSanitizer::Filter(const std::string &input) const {
106 216 string filtered_output;
107
1/2
✓ Branch 1 taken 216 times.
✗ Branch 2 not taken.
216 Sanitize(input, &filtered_output);
108 216 return filtered_output;
109 }
110
111
112 17294 bool InputSanitizer::IsValid(const std::string &input) const {
113 17294 string dummy;
114
1/2
✓ Branch 1 taken 17294 times.
✗ Branch 2 not taken.
34588 return Sanitize(input, &dummy);
115 17294 }
116
117
118 524 bool IntegerSanitizer::Sanitize(std::string::const_iterator begin,
119 std::string::const_iterator end,
120 std::string *filtered_output) const {
121
2/2
✓ Branch 1 taken 2 times.
✓ Branch 2 taken 522 times.
524 if (std::distance(begin, end) == 0) {
122 2 return false;
123 }
124
125
2/2
✓ Branch 1 taken 4 times.
✓ Branch 2 taken 518 times.
522 if (*begin == '-') {
126 // minus is allowed as the first character!
127 4 filtered_output->push_back('-');
128 4 begin++;
129 }
130
131 522 return InputSanitizer::Sanitize(begin, end, filtered_output);
132 }
133
134
135 20 bool PositiveIntegerSanitizer::Sanitize(std::string::const_iterator begin,
136 std::string::const_iterator end,
137 std::string *filtered_output) const {
138
2/2
✓ Branch 1 taken 2 times.
✓ Branch 2 taken 18 times.
20 if (std::distance(begin, end) == 0) {
139 2 return false;
140 }
141
142 18 return InputSanitizer::Sanitize(begin, end, filtered_output);
143 }
144
145 } // namespace sanitizer
146
147 #ifdef CVMFS_NAMESPACE_GUARD
148 } // namespace CVMFS_NAMESPACE_GUARD
149 #endif
150