GCC Code Coverage Report


Directory: cvmfs/
File: cvmfs/sanitizer.cc
Date: 2026-05-03 02:36:16
Exec Total Coverage
Lines: 69 71 97.2%
Branches: 40 49 81.6%

Line Branch Exec Source
1 /**
2 * This file is part of the CernVM File System.
3 *
4 * Provides input data sanitizer in the form of whitelist of character ranges.
5 */
6
7
8 #include "sanitizer.h"
9
10 #include <cassert>
11
12 using namespace std; // NOLINT
13
14 #ifdef CVMFS_NAMESPACE_GUARD
15 namespace CVMFS_NAMESPACE_GUARD {
16 #endif
17
18 namespace sanitizer {
19
20 31432 CharRange::CharRange(const char range_begin, const char range_end) {
21 31432 range_begin_ = range_begin;
22 31432 range_end_ = range_end;
23 31432 }
24
25
26 29065 CharRange::CharRange(const char single_char) {
27 29065 range_begin_ = range_end_ = single_char;
28 29065 }
29
30
31 337162 bool CharRange::InRange(const char c) const {
32
4/4
✓ Branch 0 taken 274009 times.
✓ Branch 1 taken 63153 times.
✓ Branch 2 taken 200788 times.
✓ Branch 3 taken 73221 times.
337162 return (c >= range_begin_) && (c <= range_end_);
33 }
34
35
36 //------------------------------------------------------------------------------
37
38
39 28488 InputSanitizer::InputSanitizer(const string &whitelist) : max_length_(-1) {
40
1/2
✓ Branch 1 taken 28488 times.
✗ Branch 2 not taken.
28488 InitValidRanges(whitelist);
41 28488 }
42
43
44 159 InputSanitizer::InputSanitizer(const string &whitelist, int max_length)
45 159 : max_length_(max_length) {
46
1/2
✓ Branch 1 taken 159 times.
✗ Branch 2 not taken.
159 InitValidRanges(whitelist);
47 159 }
48
49
50 28647 void InputSanitizer::InitValidRanges(const std::string &whitelist) {
51 // Parse the whitelist
52 28647 const unsigned length = whitelist.length();
53 28647 unsigned pickup_pos = 0;
54
2/2
✓ Branch 0 taken 91929 times.
✓ Branch 1 taken 28647 times.
120576 for (unsigned i = 0; i < length; ++i) {
55
7/8
✓ Branch 0 taken 63315 times.
✓ Branch 1 taken 28614 times.
✓ Branch 3 taken 31432 times.
✓ Branch 4 taken 31883 times.
✗ Branch 5 not taken.
✓ Branch 6 taken 31432 times.
✓ Branch 7 taken 60497 times.
✓ Branch 8 taken 31432 times.
91929 if ((i + 1 >= length) || (whitelist[i + 1] == ' ') || (i == length - 1)) {
56
1/2
✓ Branch 1 taken 60497 times.
✗ Branch 2 not taken.
60497 const string range = whitelist.substr(pickup_pos, i - pickup_pos + 1);
57
2/3
✓ Branch 1 taken 29065 times.
✓ Branch 2 taken 31432 times.
✗ Branch 3 not taken.
60497 switch (range.length()) {
58 29065 case 1:
59
1/2
✓ Branch 3 taken 29065 times.
✗ Branch 4 not taken.
29065 valid_ranges_.push_back(CharRange(range[0]));
60 29065 break;
61 31432 case 2:
62
1/2
✓ Branch 4 taken 31432 times.
✗ Branch 5 not taken.
31432 valid_ranges_.push_back(CharRange(range[0], range[1]));
63 31432 break;
64 default:
65 assert(false);
66 }
67 60497 ++i;
68 60497 pickup_pos = i + 1;
69 60497 }
70 }
71 28647 }
72
73
74 30365 bool InputSanitizer::Sanitize(std::string::const_iterator begin,
75 std::string::const_iterator end,
76 std::string *filtered_output) const {
77 30365 int pos = 0;
78 30365 bool is_sane = true;
79
2/2
✓ Branch 2 taken 236520 times.
✓ Branch 3 taken 30233 times.
266753 for (; begin != end; ++begin) {
80
2/2
✓ Branch 2 taken 200788 times.
✓ Branch 3 taken 35732 times.
236520 if (CheckRanges(*begin)) {
81
4/4
✓ Branch 0 taken 1551 times.
✓ Branch 1 taken 199237 times.
✓ Branch 2 taken 132 times.
✓ Branch 3 taken 1419 times.
200788 if ((max_length_ >= 0) && (pos >= max_length_)) {
82 132 is_sane = false;
83 132 break;
84 }
85 200656 filtered_output->push_back(*begin);
86 200656 pos++;
87 } else {
88 35732 is_sane = false;
89 }
90 }
91 30365 return is_sane;
92 }
93
94
95 236520 bool InputSanitizer::CheckRanges(const char chr) const {
96
2/2
✓ Branch 1 taken 337162 times.
✓ Branch 2 taken 35732 times.
372894 for (unsigned j = 0; j < valid_ranges_.size(); ++j) {
97
2/2
✓ Branch 2 taken 200788 times.
✓ Branch 3 taken 136374 times.
337162 if (valid_ranges_[j].InRange(chr)) {
98 200788 return true;
99 }
100 }
101 35732 return false;
102 }
103
104
105 804 string InputSanitizer::Filter(const std::string &input) const {
106 804 string filtered_output;
107
1/2
✓ Branch 1 taken 804 times.
✗ Branch 2 not taken.
804 Sanitize(input, &filtered_output);
108 804 return filtered_output;
109 }
110
111
112 29627 bool InputSanitizer::IsValid(const std::string &input) const {
113 29627 string dummy;
114
1/2
✓ Branch 1 taken 29627 times.
✗ Branch 2 not taken.
59254 return Sanitize(input, &dummy);
115 29627 }
116
117
118 762 bool IntegerSanitizer::Sanitize(std::string::const_iterator begin,
119 std::string::const_iterator end,
120 std::string *filtered_output) const {
121
2/2
✓ Branch 1 taken 33 times.
✓ Branch 2 taken 729 times.
762 if (std::distance(begin, end) == 0) {
122 33 return false;
123 }
124
125
2/2
✓ Branch 1 taken 66 times.
✓ Branch 2 taken 663 times.
729 if (*begin == '-') {
126 // minus is allowed as the first character!
127 66 filtered_output->push_back('-');
128 66 begin++;
129 }
130
131 729 return InputSanitizer::Sanitize(begin, end, filtered_output);
132 }
133
134
135 330 bool PositiveIntegerSanitizer::Sanitize(std::string::const_iterator begin,
136 std::string::const_iterator end,
137 std::string *filtered_output) const {
138
2/2
✓ Branch 1 taken 33 times.
✓ Branch 2 taken 297 times.
330 if (std::distance(begin, end) == 0) {
139 33 return false;
140 }
141
142 297 return InputSanitizer::Sanitize(begin, end, filtered_output);
143 }
144
145 } // namespace sanitizer
146
147 #ifdef CVMFS_NAMESPACE_GUARD
148 } // namespace CVMFS_NAMESPACE_GUARD
149 #endif
150