The branch, master has been updated
       via  be3e479 selftest: add smb2.rename to testsuite
       via  bff119a s4:torture: add some SMB2 renaming tests
      from  d2ccaaa gensec: explain gensec_use_kerberos_mechs() logic

http://gitweb.samba.org/?p=samba.git;a=shortlog;h=master


- Log -----------------------------------------------------------------
commit be3e479feb3bb8305c8d5bd6e20118191db01226
Author: Christian Ambach <a...@samba.org>
Date:   Wed Feb 8 16:05:34 2012 +0100

    selftest: add smb2.rename to testsuite
    
    Autobuild-User: Christian Ambach <a...@samba.org>
    Autobuild-Date: Fri Feb 10 15:02:51 CET 2012 on sn-devel-104

commit bff119a3b7d5208d375a6699c6f458b3954eb84d
Author: Christian Ambach <a...@samba.org>
Date:   Tue Feb 7 18:02:56 2012 +0100

    s4:torture: add some SMB2 renaming tests

-----------------------------------------------------------------------

Summary of changes:
 selftest/knownfail                 |   10 +
 source3/selftest/tests.py          |    2 +-
 source4/torture/smb2/rename.c      |  841 ++++++++++++++++++++++++++++++++++++
 source4/torture/smb2/smb2.c        |    1 +
 source4/torture/smb2/wscript_build |    2 +-
 5 files changed, 854 insertions(+), 2 deletions(-)
 create mode 100644 source4/torture/smb2/rename.c


Changeset truncated at 500 lines:

diff --git a/selftest/knownfail b/selftest/knownfail
index 4a9f99e..b838ee7 100644
--- a/selftest/knownfail
+++ b/selftest/knownfail
@@ -11,6 +11,9 @@
 ^samba3.*rap.sam.*.useradd # Not provided by Samba 3
 ^samba3.*rap.sam.*.userdelete # Not provided by Samba 3
 ^samba3.posix_s3.libsmbclient .opendir # This requires a workgroup called 
'WORKGROUP' and for netbios browse lists to have been registered
+# see bug 8412
+^samba3.posix_s3.smb2.rename.*.simple_nodelete
+^samba3.posix_s3.smb2.rename.*.no_share_delete_no_delete_access
 #These rpcclient combinations (pipe-level authentication but without sign or 
seal) need fixing in s3
 ^samba3.blackbox.rpcclient over ncacn_np with \[spnego\]
 ^samba3.blackbox.rpcclient over ncacn_np with \[spnego,bigendian\]
@@ -58,6 +61,13 @@
 ^samba4.rap.*netsessionenum
 ^samba4.rap.*netsessiongetinfo
 ^samba4.rap.*netremotetod
+# SMB2 in s4 does not seem to support rename correctly
+^samba4.smb2.rename.simple$
+^samba4.smb2.rename.no_sharing$
+^samba4.smb2.rename.share_delete_and_delete_access$
+^samba4.smb2.rename.no_share_delete_but_delete_access$
+^samba4.smb2.rename.share_delete_no_delete_access$
+^samba4.smb2.rename.no_share_delete_no_delete_access$
 ^samba4.smb2.persistent.handles1
 ^samba4.winbind.struct.*.show_sequence     # Not yet working in winbind
 ^samba4.*base.delaywrite.*update of write time and SMBwrite truncate$
diff --git a/source3/selftest/tests.py b/source3/selftest/tests.py
index ce6d964..6376eae 100755
--- a/source3/selftest/tests.py
+++ b/source3/selftest/tests.py
@@ -224,7 +224,7 @@ raw = ["raw.acls", "raw.chkpath", "raw.close", 
"raw.composite", "raw.context", "
        "raw.samba3checkfsp", "raw.samba3closeerr", "raw.samba3oplocklogoff"]
 
 smb2 = ["smb2.lock", "smb2.read", "smb2.compound", "smb2.connect", 
"smb2.scan", "smb2.scanfind",
-        "smb2.bench-oplock"]
+        "smb2.bench-oplock", "smb2.rename"]
 
 rpc = ["rpc.authcontext", "rpc.samba3.bind", "rpc.samba3.srvsvc", 
"rpc.samba3.sharesec",
        "rpc.samba3.spoolss", "rpc.samba3.wkssvc", "rpc.samba3.winreg",
diff --git a/source4/torture/smb2/rename.c b/source4/torture/smb2/rename.c
new file mode 100644
index 0000000..aced971
--- /dev/null
+++ b/source4/torture/smb2/rename.c
@@ -0,0 +1,841 @@
+/*
+   Unix SMB/CIFS implementation.
+
+   SMB2 rename test suite
+
+   Copyright (C) Christian Ambach 2012
+
+   This program is free software; you can redistribute it and/or modify
+   it under the terms of the GNU General Public License as published by
+   the Free Software Foundation; either version 3 of the License, or
+   (at your option) any later version.
+
+   This program is distributed in the hope that it will be useful,
+   but WITHOUT ANY WARRANTY; without even the implied warranty of
+   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+   GNU General Public License for more details.
+
+   You should have received a copy of the GNU General Public License
+   along with this program.  If not, see <http://www.gnu.org/licenses/>.
+*/
+
+#include "includes.h"
+#include "libcli/smb2/smb2.h"
+#include "libcli/smb2/smb2_calls.h"
+
+#include "torture/torture.h"
+#include "torture/smb2/proto.h"
+
+#include "librpc/gen_ndr/security.h"
+
+#define CHECK_STATUS(status, correct) do { \
+       if (!NT_STATUS_EQUAL(status, correct)) { \
+               torture_result(torture, TORTURE_FAIL, \
+                      "(%s) Incorrect status %s - should be %s\n", \
+                      __location__, nt_errstr(status), nt_errstr(correct)); \
+               ret = false; \
+               goto done; \
+       }} while (0)
+
+#define BASEDIR "test_rename"
+
+/*
+ * basic testing of rename: open file with DELETE access
+ * this should pass
+ */
+
+static bool torture_smb2_rename_simple(struct torture_context *torture,
+               struct smb2_tree *tree1)
+{
+       bool ret = true;
+       NTSTATUS status;
+       union smb_open io;
+       union smb_close cl;
+       union smb_setfileinfo sinfo;
+       union smb_fileinfo fi;
+       struct smb2_handle h1;
+
+       smb2_deltree(tree1, BASEDIR);
+       smb2_util_rmdir(tree1, BASEDIR);
+
+       torture_comment(torture, "Creating base directory\n");
+
+       smb2_util_mkdir(tree1, BASEDIR);
+
+
+       torture_comment(torture, "Creating test file\n");
+
+       ZERO_STRUCT(io.smb2);
+       io.generic.level = RAW_OPEN_SMB2;
+       io.smb2.in.create_flags = 0;
+       io.smb2.in.desired_access = SEC_FILE_ALL|SEC_STD_DELETE;
+       io.smb2.in.create_options = NTCREATEX_OPTIONS_NON_DIRECTORY_FILE;
+       io.smb2.in.file_attributes = FILE_ATTRIBUTE_NORMAL;
+       io.smb2.in.share_access = NTCREATEX_SHARE_ACCESS_READ |
+               NTCREATEX_SHARE_ACCESS_WRITE | NTCREATEX_SHARE_ACCESS_DELETE;
+       io.smb2.in.alloc_size = 0;
+       io.smb2.in.create_disposition = NTCREATEX_DISP_CREATE;
+       io.smb2.in.impersonation_level = SMB2_IMPERSONATION_ANONYMOUS;
+       io.smb2.in.security_flags = 0;
+       io.smb2.in.fname = BASEDIR "\\file.txt";
+
+       status = smb2_create(tree1, torture, &(io.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h1 = io.smb2.out.file.handle;
+
+       torture_comment(torture, "Renaming test file\n");
+
+       ZERO_STRUCT(sinfo);
+       sinfo.rename_information.level = RAW_SFILEINFO_RENAME_INFORMATION;
+       sinfo.rename_information.in.file.handle = io.smb2.out.file.handle;
+       sinfo.rename_information.in.overwrite = 0;
+       sinfo.rename_information.in.root_fid = 0;
+       sinfo.rename_information.in.new_name =
+               BASEDIR "\\newname.txt";
+       status = smb2_setinfo_file(tree1, &sinfo);
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       torture_comment(torture, "Checking for new filename\n");
+
+       ZERO_STRUCT(fi);
+       fi.generic.level = RAW_FILEINFO_SMB2_ALL_INFORMATION;
+       fi.generic.in.file.handle = h1;
+       status = smb2_getinfo_file(tree1, torture, &fi);
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+
+       torture_comment(torture, "Closing test file\n");
+
+       ZERO_STRUCT(cl.smb2);
+       cl.smb2.level = RAW_CLOSE_SMB2;
+       cl.smb2.in.file.handle = h1;
+       status = smb2_close(tree1, &(cl.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       ZERO_STRUCT(h1);
+
+done:
+
+       torture_comment(torture, "Cleaning up\n");
+
+       if (h1.data) {
+               ZERO_STRUCT(cl.smb2);
+               cl.smb2.level = RAW_CLOSE_SMB2;
+               cl.smb2.in.file.handle = h1;
+               status = smb2_close(tree1, &(cl.smb2));
+       }
+       smb2_deltree(tree1, BASEDIR);
+       return ret;
+}
+
+/*
+ * basic testing of rename, this time do not request DELETE access
+ * for the file, this should fail
+ */
+
+static bool torture_smb2_rename_simple2(struct torture_context *torture,
+               struct smb2_tree *tree1)
+{
+       bool ret = true;
+       NTSTATUS status;
+       union smb_open io;
+       union smb_close cl;
+       union smb_setfileinfo sinfo;
+       struct smb2_handle h1;
+
+       smb2_deltree(tree1, BASEDIR);
+       smb2_util_rmdir(tree1, BASEDIR);
+
+       torture_comment(torture, "Creating base directory\n");
+
+       smb2_util_mkdir(tree1, BASEDIR);
+
+
+       torture_comment(torture, "Creating test file\n");
+
+       ZERO_STRUCT(io.smb2);
+       io.generic.level = RAW_OPEN_SMB2;
+       io.smb2.in.create_flags = 0;
+       io.smb2.in.desired_access = SEC_FILE_ALL;
+       io.smb2.in.create_options = NTCREATEX_OPTIONS_NON_DIRECTORY_FILE;
+       io.smb2.in.file_attributes = FILE_ATTRIBUTE_NORMAL;
+       io.smb2.in.share_access = NTCREATEX_SHARE_ACCESS_READ |
+               NTCREATEX_SHARE_ACCESS_WRITE | NTCREATEX_SHARE_ACCESS_DELETE;
+       io.smb2.in.alloc_size = 0;
+       io.smb2.in.create_disposition = NTCREATEX_DISP_CREATE;
+       io.smb2.in.impersonation_level = SMB2_IMPERSONATION_ANONYMOUS;
+       io.smb2.in.security_flags = 0;
+       io.smb2.in.fname = BASEDIR "\\file.txt";
+
+       status = smb2_create(tree1, torture, &(io.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h1 = io.smb2.out.file.handle;
+
+       torture_comment(torture, "Renaming test file\n");
+
+       ZERO_STRUCT(sinfo);
+       sinfo.rename_information.level = RAW_SFILEINFO_RENAME_INFORMATION;
+       sinfo.rename_information.in.file.handle = io.smb2.out.file.handle;
+       sinfo.rename_information.in.overwrite = 0;
+       sinfo.rename_information.in.root_fid = 0;
+       sinfo.rename_information.in.new_name =
+               BASEDIR "\\newname.txt";
+       status = smb2_setinfo_file(tree1, &sinfo);
+       CHECK_STATUS(status, NT_STATUS_ACCESS_DENIED);
+
+       torture_comment(torture, "Closing test file\n");
+
+       ZERO_STRUCT(cl.smb2);
+       cl.smb2.level = RAW_CLOSE_SMB2;
+       cl.smb2.in.file.handle = h1;
+       status = smb2_close(tree1, &(cl.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       ZERO_STRUCT(h1);
+
+done:
+
+       torture_comment(torture, "Cleaning up\n");
+
+       if (h1.data) {
+               ZERO_STRUCT(cl.smb2);
+               cl.smb2.level = RAW_CLOSE_SMB2;
+               cl.smb2.in.file.handle = h1;
+               status = smb2_close(tree1, &(cl.smb2));
+       }
+       smb2_deltree(tree1, BASEDIR);
+       return ret;
+}
+
+
+/*
+ * testing of rename with no sharing allowed on file
+ * this should work
+ */
+
+static bool torture_smb2_rename_no_sharemode(struct torture_context *torture,
+               struct smb2_tree *tree1)
+{
+       bool ret = true;
+       NTSTATUS status;
+       union smb_open io;
+       union smb_close cl;
+       union smb_setfileinfo sinfo;
+       union smb_fileinfo fi;
+       struct smb2_handle h1;
+
+       smb2_deltree(tree1, BASEDIR);
+       smb2_util_rmdir(tree1, BASEDIR);
+
+       torture_comment(torture, "Creating base directory\n");
+
+       smb2_util_mkdir(tree1, BASEDIR);
+
+
+       torture_comment(torture, "Creating test file\n");
+
+       ZERO_STRUCT(io.smb2);
+       io.generic.level = RAW_OPEN_SMB2;
+       io.smb2.in.create_flags = 0;
+       io.smb2.in.desired_access = 0x0017019f;
+       io.smb2.in.create_options = NTCREATEX_OPTIONS_NON_DIRECTORY_FILE;
+       io.smb2.in.file_attributes = FILE_ATTRIBUTE_NORMAL;
+       io.smb2.in.share_access = 0;
+       io.smb2.in.alloc_size = 0;
+       io.smb2.in.create_disposition = NTCREATEX_DISP_CREATE;
+       io.smb2.in.impersonation_level = SMB2_IMPERSONATION_ANONYMOUS;
+       io.smb2.in.security_flags = 0;
+       io.smb2.in.fname = BASEDIR "\\file.txt";
+
+       status = smb2_create(tree1, torture, &(io.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h1 = io.smb2.out.file.handle;
+
+       torture_comment(torture, "Renaming test file\n");
+
+       ZERO_STRUCT(sinfo);
+       sinfo.rename_information.level = RAW_SFILEINFO_RENAME_INFORMATION;
+       sinfo.rename_information.in.file.handle = io.smb2.out.file.handle;
+       sinfo.rename_information.in.overwrite = 0;
+       sinfo.rename_information.in.root_fid = 0;
+       sinfo.rename_information.in.new_name =
+               BASEDIR "\\newname.txt";
+       status = smb2_setinfo_file(tree1, &sinfo);
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       torture_comment(torture, "Checking for new filename\n");
+
+       ZERO_STRUCT(fi);
+       fi.generic.level = RAW_FILEINFO_SMB2_ALL_INFORMATION;
+       fi.generic.in.file.handle = h1;
+       status = smb2_getinfo_file(tree1, torture, &fi);
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+
+       torture_comment(torture, "Closing test file\n");
+
+       ZERO_STRUCT(cl.smb2);
+       cl.smb2.level = RAW_CLOSE_SMB2;
+       cl.smb2.in.file.handle = h1;
+       status = smb2_close(tree1, &(cl.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       ZERO_STRUCT(h1);
+
+done:
+
+       torture_comment(torture, "Cleaning up\n");
+
+       if (h1.data) {
+               ZERO_STRUCT(cl.smb2);
+               cl.smb2.level = RAW_CLOSE_SMB2;
+               cl.smb2.in.file.handle = h1;
+               status = smb2_close(tree1, &(cl.smb2));
+       }
+       smb2_deltree(tree1, BASEDIR);
+       return ret;
+}
+
+/*
+ * testing of rename when opening parent dir with delete access and delete
+ * sharing allowed
+ * should result in sharing violation
+ */
+
+static bool torture_smb2_rename_with_delete_access(struct torture_context 
*torture,
+               struct smb2_tree *tree1)
+{
+       bool ret = true;
+       NTSTATUS status;
+       union smb_open io;
+       union smb_close cl;
+       union smb_setfileinfo sinfo;
+       struct smb2_handle fh, dh;
+
+       smb2_deltree(tree1, BASEDIR);
+       smb2_util_rmdir(tree1, BASEDIR);
+
+       torture_comment(torture, "Creating base directory\n");
+
+       smb2_util_mkdir(tree1, BASEDIR);
+
+       torture_comment(torture, "Opening parent directory\n");
+
+       ZERO_STRUCT(io.smb2);
+       io.generic.level = RAW_OPEN_SMB2;
+       io.smb2.in.create_flags = 0;
+       io.smb2.in.desired_access = SEC_STD_SYNCHRONIZE | SEC_STD_WRITE_DAC |
+               SEC_STD_READ_CONTROL | SEC_STD_DELETE | 
SEC_FILE_WRITE_ATTRIBUTE |
+               SEC_FILE_READ_ATTRIBUTE | SEC_FILE_EXECUTE | SEC_FILE_WRITE_EA |
+               SEC_FILE_READ_EA | SEC_FILE_APPEND_DATA | SEC_FILE_READ_DATA |
+               SEC_FILE_WRITE_DATA;
+       io.smb2.in.create_options = NTCREATEX_OPTIONS_DIRECTORY;
+       io.smb2.in.file_attributes = FILE_ATTRIBUTE_DIRECTORY;
+       io.smb2.in.share_access = NTCREATEX_SHARE_ACCESS_READ |
+               NTCREATEX_SHARE_ACCESS_WRITE | NTCREATEX_SHARE_ACCESS_DELETE;
+       io.smb2.in.alloc_size = 0;
+       io.smb2.in.create_disposition = NTCREATEX_DISP_OPEN;
+       io.smb2.in.impersonation_level = SMB2_IMPERSONATION_ANONYMOUS;
+       io.smb2.in.security_flags = 0;
+       io.smb2.in.fname = BASEDIR;
+
+       status = smb2_create(tree1, torture, &(io.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+       dh = io.smb2.out.file.handle;
+
+
+       torture_comment(torture, "Creating test file\n");
+
+       ZERO_STRUCT(io.smb2);
+       io.generic.level = RAW_OPEN_SMB2;
+       io.smb2.in.create_flags = 0;
+       io.smb2.in.desired_access = SEC_STD_SYNCHRONIZE | SEC_STD_WRITE_DAC |
+               SEC_STD_READ_CONTROL | SEC_STD_DELETE | 
SEC_FILE_WRITE_ATTRIBUTE |
+               SEC_FILE_READ_ATTRIBUTE | SEC_FILE_WRITE_EA | SEC_FILE_READ_EA |
+               SEC_FILE_APPEND_DATA | SEC_FILE_READ_DATA | SEC_FILE_WRITE_DATA;
+       io.smb2.in.create_options = NTCREATEX_OPTIONS_NON_DIRECTORY_FILE;
+       io.smb2.in.file_attributes = FILE_ATTRIBUTE_NORMAL;
+       io.smb2.in.share_access = 0;
+       io.smb2.in.alloc_size = 0;
+       io.smb2.in.create_disposition = NTCREATEX_DISP_CREATE;
+       io.smb2.in.impersonation_level = SMB2_IMPERSONATION_ANONYMOUS;
+       io.smb2.in.security_flags = 0;
+       io.smb2.in.fname = BASEDIR "\\file.txt";
+
+       status = smb2_create(tree1, torture, &(io.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+       fh = io.smb2.out.file.handle;
+
+       torture_comment(torture, "Renaming test file\n");
+
+       ZERO_STRUCT(sinfo);
+       sinfo.rename_information.level = RAW_SFILEINFO_RENAME_INFORMATION;
+       sinfo.rename_information.in.file.handle = fh;
+       sinfo.rename_information.in.overwrite = 0;
+       sinfo.rename_information.in.root_fid = 0;
+       sinfo.rename_information.in.new_name =
+               BASEDIR "\\newname.txt";
+       status = smb2_setinfo_file(tree1, &sinfo);
+       CHECK_STATUS(status, NT_STATUS_SHARING_VIOLATION);
+
+       torture_comment(torture, "Closing test file\n");
+
+       ZERO_STRUCT(cl.smb2);
+       cl.smb2.level = RAW_CLOSE_SMB2;
+       cl.smb2.in.file.handle = fh;
+       status = smb2_close(tree1, &(cl.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       ZERO_STRUCT(fh);
+
+       torture_comment(torture, "Closing directory\n");
+
+       ZERO_STRUCT(cl.smb2);
+       cl.smb2.level = RAW_CLOSE_SMB2;
+       cl.smb2.in.file.handle = dh;
+       status = smb2_close(tree1, &(cl.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       ZERO_STRUCT(dh);
+
+
+done:
+
+       torture_comment(torture, "Cleaning up\n");
+
+       if (fh.data) {
+               ZERO_STRUCT(cl.smb2);
+               cl.smb2.level = RAW_CLOSE_SMB2;
+               cl.smb2.in.file.handle = fh;
+               status = smb2_close(tree1, &(cl.smb2));
+       }
+       if (dh.data) {
+               ZERO_STRUCT(cl.smb2);
+               cl.smb2.level = RAW_CLOSE_SMB2;
+               cl.smb2.in.file.handle = dh;
+               status = smb2_close(tree1, &(cl.smb2));
+       }
+
+       smb2_deltree(tree1, BASEDIR);
+       return ret;
+}
+
+
+/*
+ * testing of rename with delete access on parent dir
+ * this is a variation of the test above: parent dir is opened
+ * without share_delete, so rename must fail
+ */
+
+static bool torture_smb2_rename_with_delete_access2(struct torture_context 
*torture,
+               struct smb2_tree *tree1)
+{
+       bool ret = true;
+       NTSTATUS status;
+       union smb_open io;
+       union smb_close cl;
+       union smb_setfileinfo sinfo;
+       struct smb2_handle fh, dh;
+
+       smb2_deltree(tree1, BASEDIR);
+       smb2_util_rmdir(tree1, BASEDIR);
+
+       torture_comment(torture, "Creating base directory\n");
+
+       smb2_util_mkdir(tree1, BASEDIR);
+
+       torture_comment(torture, "Opening parent directory\n");
+
+       ZERO_STRUCT(io.smb2);
+       io.generic.level = RAW_OPEN_SMB2;
+       io.smb2.in.create_flags = 0;
+       io.smb2.in.desired_access = SEC_STD_SYNCHRONIZE | SEC_STD_WRITE_DAC |
+               SEC_STD_READ_CONTROL | SEC_STD_DELETE | 
SEC_FILE_WRITE_ATTRIBUTE |


-- 
Samba Shared Repository

Reply via email to