GCC Code Coverage Report


Directory: cvmfs/
File: cvmfs/sanitizer.cc
Date: 2026-02-15 02:35:50
Exec Total Coverage
Lines: 69 71 97.2%
Branches: 40 49 81.6%

Line Branch Exec Source
1 /**
2 * This file is part of the CernVM File System.
3 *
4 * Provides input data sanitizer in the form of whitelist of character ranges.
5 */
6
7
8 #include "sanitizer.h"
9
10 #include <cassert>
11
12 using namespace std; // NOLINT
13
14 #ifdef CVMFS_NAMESPACE_GUARD
15 namespace CVMFS_NAMESPACE_GUARD {
16 #endif
17
18 namespace sanitizer {
19
20 27089 CharRange::CharRange(const char range_begin, const char range_end) {
21 27089 range_begin_ = range_begin;
22 27089 range_end_ = range_end;
23 27089 }
24
25
26 24236 CharRange::CharRange(const char single_char) {
27 24236 range_begin_ = range_end_ = single_char;
28 24236 }
29
30
31 308792 bool CharRange::InRange(const char c) const {
32
4/4
✓ Branch 0 taken 251803 times.
✓ Branch 1 taken 56989 times.
✓ Branch 2 taken 173808 times.
✓ Branch 3 taken 77995 times.
308792 return (c >= range_begin_) && (c <= range_end_);
33 }
34
35
36 //------------------------------------------------------------------------------
37
38
39 23990 InputSanitizer::InputSanitizer(const string &whitelist) : max_length_(-1) {
40
1/2
✓ Branch 1 taken 23990 times.
✗ Branch 2 not taken.
23990 InitValidRanges(whitelist);
41 23990 }
42
43
44 111 InputSanitizer::InputSanitizer(const string &whitelist, int max_length)
45 111 : max_length_(max_length) {
46
1/2
✓ Branch 1 taken 111 times.
✗ Branch 2 not taken.
111 InitValidRanges(whitelist);
47 111 }
48
49
50 24101 void InputSanitizer::InitValidRanges(const std::string &whitelist) {
51 // Parse the whitelist
52 24101 const unsigned length = whitelist.length();
53 24101 unsigned pickup_pos = 0;
54
2/2
✓ Branch 0 taken 78414 times.
✓ Branch 1 taken 24101 times.
102515 for (unsigned i = 0; i < length; ++i) {
55
7/8
✓ Branch 0 taken 54337 times.
✓ Branch 1 taken 24077 times.
✓ Branch 3 taken 27089 times.
✓ Branch 4 taken 27248 times.
✗ Branch 5 not taken.
✓ Branch 6 taken 27089 times.
✓ Branch 7 taken 51325 times.
✓ Branch 8 taken 27089 times.
78414 if ((i + 1 >= length) || (whitelist[i + 1] == ' ') || (i == length - 1)) {
56
1/2
✓ Branch 1 taken 51325 times.
✗ Branch 2 not taken.
51325 const string range = whitelist.substr(pickup_pos, i - pickup_pos + 1);
57
2/3
✓ Branch 1 taken 24236 times.
✓ Branch 2 taken 27089 times.
✗ Branch 3 not taken.
51325 switch (range.length()) {
58 24236 case 1:
59
1/2
✓ Branch 3 taken 24236 times.
✗ Branch 4 not taken.
24236 valid_ranges_.push_back(CharRange(range[0]));
60 24236 break;
61 27089 case 2:
62
1/2
✓ Branch 4 taken 27089 times.
✗ Branch 5 not taken.
27089 valid_ranges_.push_back(CharRange(range[0], range[1]));
63 27089 break;
64 default:
65 assert(false);
66 }
67 51325 ++i;
68 51325 pickup_pos = i + 1;
69 51325 }
70 }
71 24101 }
72
73
74 25681 bool InputSanitizer::Sanitize(std::string::const_iterator begin,
75 std::string::const_iterator end,
76 std::string *filtered_output) const {
77 25681 int pos = 0;
78 25681 bool is_sane = true;
79
2/2
✓ Branch 2 taken 211139 times.
✓ Branch 3 taken 25585 times.
236724 for (; begin != end; ++begin) {
80
2/2
✓ Branch 2 taken 173808 times.
✓ Branch 3 taken 37331 times.
211139 if (CheckRanges(*begin)) {
81
4/4
✓ Branch 0 taken 1077 times.
✓ Branch 1 taken 172731 times.
✓ Branch 2 taken 96 times.
✓ Branch 3 taken 981 times.
173808 if ((max_length_ >= 0) && (pos >= max_length_)) {
82 96 is_sane = false;
83 96 break;
84 }
85 173712 filtered_output->push_back(*begin);
86 173712 pos++;
87 } else {
88 37331 is_sane = false;
89 }
90 }
91 25681 return is_sane;
92 }
93
94
95 211139 bool InputSanitizer::CheckRanges(const char chr) const {
96
2/2
✓ Branch 1 taken 308792 times.
✓ Branch 2 taken 37331 times.
346123 for (unsigned j = 0; j < valid_ranges_.size(); ++j) {
97
2/2
✓ Branch 2 taken 173808 times.
✓ Branch 3 taken 134984 times.
308792 if (valid_ranges_[j].InRange(chr)) {
98 173808 return true;
99 }
100 }
101 37331 return false;
102 }
103
104
105 492 string InputSanitizer::Filter(const std::string &input) const {
106 492 string filtered_output;
107
1/2
✓ Branch 1 taken 492 times.
✗ Branch 2 not taken.
492 Sanitize(input, &filtered_output);
108 492 return filtered_output;
109 }
110
111
112 25237 bool InputSanitizer::IsValid(const std::string &input) const {
113 25237 string dummy;
114
1/2
✓ Branch 1 taken 25237 times.
✗ Branch 2 not taken.
50474 return Sanitize(input, &dummy);
115 25237 }
116
117
118 732 bool IntegerSanitizer::Sanitize(std::string::const_iterator begin,
119 std::string::const_iterator end,
120 std::string *filtered_output) const {
121
2/2
✓ Branch 1 taken 24 times.
✓ Branch 2 taken 708 times.
732 if (std::distance(begin, end) == 0) {
122 24 return false;
123 }
124
125
2/2
✓ Branch 1 taken 48 times.
✓ Branch 2 taken 660 times.
708 if (*begin == '-') {
126 // minus is allowed as the first character!
127 48 filtered_output->push_back('-');
128 48 begin++;
129 }
130
131 708 return InputSanitizer::Sanitize(begin, end, filtered_output);
132 }
133
134
135 240 bool PositiveIntegerSanitizer::Sanitize(std::string::const_iterator begin,
136 std::string::const_iterator end,
137 std::string *filtered_output) const {
138
2/2
✓ Branch 1 taken 24 times.
✓ Branch 2 taken 216 times.
240 if (std::distance(begin, end) == 0) {
139 24 return false;
140 }
141
142 216 return InputSanitizer::Sanitize(begin, end, filtered_output);
143 }
144
145 } // namespace sanitizer
146
147 #ifdef CVMFS_NAMESPACE_GUARD
148 } // namespace CVMFS_NAMESPACE_GUARD
149 #endif
150