GCC Code Coverage Report


Directory: cvmfs/
File: cvmfs/sanitizer.cc
Date: 2026-03-22 02:40:38
Exec Total Coverage
Lines: 69 71 97.2%
Branches: 40 49 81.6%

Line Branch Exec Source
1 /**
2 * This file is part of the CernVM File System.
3 *
4 * Provides input data sanitizer in the form of whitelist of character ranges.
5 */
6
7
8 #include "sanitizer.h"
9
10 #include <cassert>
11
12 using namespace std; // NOLINT
13
14 #ifdef CVMFS_NAMESPACE_GUARD
15 namespace CVMFS_NAMESPACE_GUARD {
16 #endif
17
18 namespace sanitizer {
19
20 18935 CharRange::CharRange(const char range_begin, const char range_end) {
21 18935 range_begin_ = range_begin;
22 18935 range_end_ = range_end;
23 18935 }
24
25
26 17894 CharRange::CharRange(const char single_char) {
27 17894 range_begin_ = range_end_ = single_char;
28 17894 }
29
30
31 194204 bool CharRange::InRange(const char c) const {
32
4/4
✓ Branch 0 taken 155613 times.
✓ Branch 1 taken 38591 times.
✓ Branch 2 taken 123310 times.
✓ Branch 3 taken 32303 times.
194204 return (c >= range_begin_) && (c <= range_end_);
33 }
34
35
36 //------------------------------------------------------------------------------
37
38
39 17556 InputSanitizer::InputSanitizer(const string &whitelist) : max_length_(-1) {
40
1/2
✓ Branch 1 taken 17556 times.
✗ Branch 2 not taken.
17556 InitValidRanges(whitelist);
41 17556 }
42
43
44 123 InputSanitizer::InputSanitizer(const string &whitelist, int max_length)
45 123 : max_length_(max_length) {
46
1/2
✓ Branch 1 taken 123 times.
✗ Branch 2 not taken.
123 InitValidRanges(whitelist);
47 123 }
48
49
50 17679 void InputSanitizer::InitValidRanges(const std::string &whitelist) {
51 // Parse the whitelist
52 17679 const unsigned length = whitelist.length();
53 17679 unsigned pickup_pos = 0;
54
2/2
✓ Branch 0 taken 55764 times.
✓ Branch 1 taken 17679 times.
73443 for (unsigned i = 0; i < length; ++i) {
55
7/8
✓ Branch 0 taken 38121 times.
✓ Branch 1 taken 17643 times.
✓ Branch 3 taken 18935 times.
✓ Branch 4 taken 19186 times.
✗ Branch 5 not taken.
✓ Branch 6 taken 18935 times.
✓ Branch 7 taken 36829 times.
✓ Branch 8 taken 18935 times.
55764 if ((i + 1 >= length) || (whitelist[i + 1] == ' ') || (i == length - 1)) {
56
1/2
✓ Branch 1 taken 36829 times.
✗ Branch 2 not taken.
36829 const string range = whitelist.substr(pickup_pos, i - pickup_pos + 1);
57
2/3
✓ Branch 1 taken 17894 times.
✓ Branch 2 taken 18935 times.
✗ Branch 3 not taken.
36829 switch (range.length()) {
58 17894 case 1:
59
1/2
✓ Branch 3 taken 17894 times.
✗ Branch 4 not taken.
17894 valid_ranges_.push_back(CharRange(range[0]));
60 17894 break;
61 18935 case 2:
62
1/2
✓ Branch 4 taken 18935 times.
✗ Branch 5 not taken.
18935 valid_ranges_.push_back(CharRange(range[0], range[1]));
63 18935 break;
64 default:
65 assert(false);
66 }
67 36829 ++i;
68 36829 pickup_pos = i + 1;
69 36829 }
70 }
71 17679 }
72
73
74 19299 bool InputSanitizer::Sanitize(std::string::const_iterator begin,
75 std::string::const_iterator end,
76 std::string *filtered_output) const {
77 19299 int pos = 0;
78 19299 bool is_sane = true;
79
2/2
✓ Branch 2 taken 139805 times.
✓ Branch 3 taken 19155 times.
158960 for (; begin != end; ++begin) {
80
2/2
✓ Branch 2 taken 123310 times.
✓ Branch 3 taken 16495 times.
139805 if (CheckRanges(*begin)) {
81
4/4
✓ Branch 0 taken 1137 times.
✓ Branch 1 taken 122173 times.
✓ Branch 2 taken 144 times.
✓ Branch 3 taken 993 times.
123310 if ((max_length_ >= 0) && (pos >= max_length_)) {
82 144 is_sane = false;
83 144 break;
84 }
85 123166 filtered_output->push_back(*begin);
86 123166 pos++;
87 } else {
88 16495 is_sane = false;
89 }
90 }
91 19299 return is_sane;
92 }
93
94
95 139805 bool InputSanitizer::CheckRanges(const char chr) const {
96
2/2
✓ Branch 1 taken 194204 times.
✓ Branch 2 taken 16495 times.
210699 for (unsigned j = 0; j < valid_ranges_.size(); ++j) {
97
2/2
✓ Branch 2 taken 123310 times.
✓ Branch 3 taken 70894 times.
194204 if (valid_ranges_[j].InRange(chr)) {
98 123310 return true;
99 }
100 }
101 16495 return false;
102 }
103
104
105 636 string InputSanitizer::Filter(const std::string &input) const {
106 636 string filtered_output;
107
1/2
✓ Branch 1 taken 636 times.
✗ Branch 2 not taken.
636 Sanitize(input, &filtered_output);
108 636 return filtered_output;
109 }
110
111
112 18735 bool InputSanitizer::IsValid(const std::string &input) const {
113 18735 string dummy;
114
1/2
✓ Branch 1 taken 18735 times.
✗ Branch 2 not taken.
37470 return Sanitize(input, &dummy);
115 18735 }
116
117
118 468 bool IntegerSanitizer::Sanitize(std::string::const_iterator begin,
119 std::string::const_iterator end,
120 std::string *filtered_output) const {
121
2/2
✓ Branch 1 taken 36 times.
✓ Branch 2 taken 432 times.
468 if (std::distance(begin, end) == 0) {
122 36 return false;
123 }
124
125
2/2
✓ Branch 1 taken 72 times.
✓ Branch 2 taken 360 times.
432 if (*begin == '-') {
126 // minus is allowed as the first character!
127 72 filtered_output->push_back('-');
128 72 begin++;
129 }
130
131 432 return InputSanitizer::Sanitize(begin, end, filtered_output);
132 }
133
134
135 360 bool PositiveIntegerSanitizer::Sanitize(std::string::const_iterator begin,
136 std::string::const_iterator end,
137 std::string *filtered_output) const {
138
2/2
✓ Branch 1 taken 36 times.
✓ Branch 2 taken 324 times.
360 if (std::distance(begin, end) == 0) {
139 36 return false;
140 }
141
142 324 return InputSanitizer::Sanitize(begin, end, filtered_output);
143 }
144
145 } // namespace sanitizer
146
147 #ifdef CVMFS_NAMESPACE_GUARD
148 } // namespace CVMFS_NAMESPACE_GUARD
149 #endif
150