GCC Code Coverage Report


Directory: cvmfs/
File: cvmfs/sanitizer.cc
Date: 2026-03-01 02:36:14
Exec Total Coverage
Lines: 69 71 97.2%
Branches: 40 49 81.6%

Line Branch Exec Source
1 /**
2 * This file is part of the CernVM File System.
3 *
4 * Provides input data sanitizer in the form of whitelist of character ranges.
5 */
6
7
8 #include "sanitizer.h"
9
10 #include <cassert>
11
12 using namespace std; // NOLINT
13
14 #ifdef CVMFS_NAMESPACE_GUARD
15 namespace CVMFS_NAMESPACE_GUARD {
16 #endif
17
18 namespace sanitizer {
19
20 22017 CharRange::CharRange(const char range_begin, const char range_end) {
21 22017 range_begin_ = range_begin;
22 22017 range_end_ = range_end;
23 22017 }
24
25
26 21372 CharRange::CharRange(const char single_char) {
27 21372 range_begin_ = range_end_ = single_char;
28 21372 }
29
30
31 209019 bool CharRange::InRange(const char c) const {
32
4/4
✓ Branch 0 taken 171178 times.
✓ Branch 1 taken 37841 times.
✓ Branch 2 taken 138156 times.
✓ Branch 3 taken 33022 times.
209019 return (c >= range_begin_) && (c <= range_end_);
33 }
34
35
36 //------------------------------------------------------------------------------
37
38
39 20845 InputSanitizer::InputSanitizer(const string &whitelist) : max_length_(-1) {
40
1/2
✓ Branch 1 taken 20845 times.
✗ Branch 2 not taken.
20845 InitValidRanges(whitelist);
41 20845 }
42
43
44 59 InputSanitizer::InputSanitizer(const string &whitelist, int max_length)
45 59 : max_length_(max_length) {
46
1/2
✓ Branch 1 taken 59 times.
✗ Branch 2 not taken.
59 InitValidRanges(whitelist);
47 59 }
48
49
50 20904 void InputSanitizer::InitValidRanges(const std::string &whitelist) {
51 // Parse the whitelist
52 20904 const unsigned length = whitelist.length();
53 20904 unsigned pickup_pos = 0;
54
2/2
✓ Branch 0 taken 65406 times.
✓ Branch 1 taken 20904 times.
86310 for (unsigned i = 0; i < length; ++i) {
55
7/8
✓ Branch 0 taken 44503 times.
✓ Branch 1 taken 20903 times.
✓ Branch 3 taken 22017 times.
✓ Branch 4 taken 22486 times.
✗ Branch 5 not taken.
✓ Branch 6 taken 22017 times.
✓ Branch 7 taken 43389 times.
✓ Branch 8 taken 22017 times.
65406 if ((i + 1 >= length) || (whitelist[i + 1] == ' ') || (i == length - 1)) {
56
1/2
✓ Branch 1 taken 43389 times.
✗ Branch 2 not taken.
43389 const string range = whitelist.substr(pickup_pos, i - pickup_pos + 1);
57
2/3
✓ Branch 1 taken 21372 times.
✓ Branch 2 taken 22017 times.
✗ Branch 3 not taken.
43389 switch (range.length()) {
58 21372 case 1:
59
1/2
✓ Branch 3 taken 21372 times.
✗ Branch 4 not taken.
21372 valid_ranges_.push_back(CharRange(range[0]));
60 21372 break;
61 22017 case 2:
62
1/2
✓ Branch 4 taken 22017 times.
✗ Branch 5 not taken.
22017 valid_ranges_.push_back(CharRange(range[0], range[1]));
63 22017 break;
64 default:
65 assert(false);
66 }
67 43389 ++i;
68 43389 pickup_pos = i + 1;
69 43389 }
70 }
71 20904 }
72
73
74 21726 bool InputSanitizer::Sanitize(std::string::const_iterator begin,
75 std::string::const_iterator end,
76 std::string *filtered_output) const {
77 21726 int pos = 0;
78 21726 bool is_sane = true;
79
2/2
✓ Branch 2 taken 154784 times.
✓ Branch 3 taken 21722 times.
176506 for (; begin != end; ++begin) {
80
2/2
✓ Branch 2 taken 138156 times.
✓ Branch 3 taken 16628 times.
154784 if (CheckRanges(*begin)) {
81
4/4
✓ Branch 0 taken 643 times.
✓ Branch 1 taken 137513 times.
✓ Branch 2 taken 4 times.
✓ Branch 3 taken 639 times.
138156 if ((max_length_ >= 0) && (pos >= max_length_)) {
82 4 is_sane = false;
83 4 break;
84 }
85 138152 filtered_output->push_back(*begin);
86 138152 pos++;
87 } else {
88 16628 is_sane = false;
89 }
90 }
91 21726 return is_sane;
92 }
93
94
95 154784 bool InputSanitizer::CheckRanges(const char chr) const {
96
2/2
✓ Branch 1 taken 209019 times.
✓ Branch 2 taken 16628 times.
225647 for (unsigned j = 0; j < valid_ranges_.size(); ++j) {
97
2/2
✓ Branch 2 taken 138156 times.
✓ Branch 3 taken 70863 times.
209019 if (valid_ranges_[j].InRange(chr)) {
98 138156 return true;
99 }
100 }
101 16628 return false;
102 }
103
104
105 492 string InputSanitizer::Filter(const std::string &input) const {
106 492 string filtered_output;
107
1/2
✓ Branch 1 taken 492 times.
✗ Branch 2 not taken.
492 Sanitize(input, &filtered_output);
108 492 return filtered_output;
109 }
110
111
112 21236 bool InputSanitizer::IsValid(const std::string &input) const {
113 21236 string dummy;
114
1/2
✓ Branch 1 taken 21236 times.
✗ Branch 2 not taken.
42472 return Sanitize(input, &dummy);
115 21236 }
116
117
118 502 bool IntegerSanitizer::Sanitize(std::string::const_iterator begin,
119 std::string::const_iterator end,
120 std::string *filtered_output) const {
121
2/2
✓ Branch 1 taken 1 times.
✓ Branch 2 taken 501 times.
502 if (std::distance(begin, end) == 0) {
122 1 return false;
123 }
124
125
2/2
✓ Branch 1 taken 2 times.
✓ Branch 2 taken 499 times.
501 if (*begin == '-') {
126 // minus is allowed as the first character!
127 2 filtered_output->push_back('-');
128 2 begin++;
129 }
130
131 501 return InputSanitizer::Sanitize(begin, end, filtered_output);
132 }
133
134
135 10 bool PositiveIntegerSanitizer::Sanitize(std::string::const_iterator begin,
136 std::string::const_iterator end,
137 std::string *filtered_output) const {
138
2/2
✓ Branch 1 taken 1 times.
✓ Branch 2 taken 9 times.
10 if (std::distance(begin, end) == 0) {
139 1 return false;
140 }
141
142 9 return InputSanitizer::Sanitize(begin, end, filtered_output);
143 }
144
145 } // namespace sanitizer
146
147 #ifdef CVMFS_NAMESPACE_GUARD
148 } // namespace CVMFS_NAMESPACE_GUARD
149 #endif
150