talloc: Release talloc 2.3.1
[Samba.git] / selftest / target / Samba3.pm
blobfab8bdda86e88c984bd55a1fc1aba72cb4fde164
1 #!/usr/bin/perl
2 # Bootstrap Samba and run a number of tests against it.
3 # Copyright (C) 2005-2007 Jelmer Vernooij <jelmer@samba.org>
4 # Published under the GNU GPL, v3 or later.
6 # NOTE: Refer to the README for more details about the various testenvs,
7 # and tips about adding new testenvs.
9 package Samba3;
11 use strict;
12 use Cwd qw(abs_path);
13 use FindBin qw($RealBin);
14 use POSIX;
15 use target::Samba;
16 use File::Path 'remove_tree';
18 sub have_ads($) {
19 my ($self) = @_;
20 my $found_ads = 0;
21 my $smbd_build_options = Samba::bindir_path($self, "smbd") . " -b|";
22 open(IN, $smbd_build_options) or die("Unable to run $smbd_build_options: $!");
24 while (<IN>) {
25 if (/WITH_ADS/) {
26 $found_ads = 1;
29 close IN;
31 # If we were not built with ADS support, pretend we were never even available
32 print "smbd does not have ADS support\n" unless $found_ads;
33 return $found_ads;
36 # return smb.conf parameters applicable to @path, based on the underlying
37 # filesystem type
38 sub get_fs_specific_conf($$)
40 my ($self, $path) = @_;
41 my $mods = "";
42 my $stat_out = `stat --file-system $path` or return "";
44 if ($stat_out =~ m/Type:\s+btrfs/) {
45 $mods .= "streams_xattr btrfs";
48 if ($mods) {
49 return "vfs objects = $mods";
52 return undef;
55 sub new($$) {
56 my ($classname, $bindir, $srcdir, $server_maxtime) = @_;
57 my $self = { vars => {},
58 bindir => $bindir,
59 srcdir => $srcdir,
60 server_maxtime => $server_maxtime
62 bless $self;
63 return $self;
66 sub teardown_env($$)
68 my ($self, $envvars) = @_;
69 my $count = 0;
71 # This should cause smbd to terminate gracefully
72 close($envvars->{STDIN_PIPE});
74 my $smbdpid = $envvars->{SMBD_TL_PID};
75 my $nmbdpid = $envvars->{NMBD_TL_PID};
76 my $winbinddpid = $envvars->{WINBINDD_TL_PID};
78 # This should give it time to write out the gcov data
79 until ($count > 20) {
80 my $smbdchild = Samba::cleanup_child($smbdpid, "smbd");
81 my $nmbdchild = Samba::cleanup_child($nmbdpid, "nmbd");
82 my $winbinddchild = Samba::cleanup_child($winbinddpid, "winbindd");
83 if ($smbdchild == -1
84 && $nmbdchild == -1
85 && $winbinddchild == -1) {
86 last;
88 sleep(1);
89 $count++;
92 if ($count <= 20 && kill(0, $smbdpid, $nmbdpid, $winbinddpid) == 0) {
93 return;
96 $self->stop_sig_term($smbdpid);
97 $self->stop_sig_term($nmbdpid);
98 $self->stop_sig_term($winbinddpid);
100 $count = 0;
101 until ($count > 10) {
102 my $smbdchild = Samba::cleanup_child($smbdpid, "smbd");
103 my $nmbdchild = Samba::cleanup_child($nmbdpid, "nmbd");
104 my $winbinddchild = Samba::cleanup_child($winbinddpid, "winbindd");
105 if ($smbdchild == -1
106 && $nmbdchild == -1
107 && $winbinddchild == -1) {
108 last;
110 sleep(1);
111 $count++;
114 if ($count <= 10 && kill(0, $smbdpid, $nmbdpid, $winbinddpid) == 0) {
115 return;
118 warn("timelimit process did not quit on SIGTERM, sending SIGKILL");
119 $self->stop_sig_kill($smbdpid);
120 $self->stop_sig_kill($nmbdpid);
121 $self->stop_sig_kill($winbinddpid);
123 return 0;
126 sub getlog_env_app($$$)
128 my ($self, $envvars, $name) = @_;
130 my $title = "$name LOG of: $envvars->{NETBIOSNAME}\n";
131 my $out = $title;
133 open(LOG, "<".$envvars->{$name."_TEST_LOG"});
135 seek(LOG, $envvars->{$name."_TEST_LOG_POS"}, SEEK_SET);
136 while (<LOG>) {
137 $out .= $_;
139 $envvars->{$name."_TEST_LOG_POS"} = tell(LOG);
140 close(LOG);
142 return "" if $out eq $title;
144 return $out;
147 sub getlog_env($$)
149 my ($self, $envvars) = @_;
150 my $ret = "";
152 $ret .= $self->getlog_env_app($envvars, "SMBD");
153 $ret .= $self->getlog_env_app($envvars, "NMBD");
154 $ret .= $self->getlog_env_app($envvars, "WINBINDD");
156 return $ret;
159 sub check_env($$)
161 my ($self, $envvars) = @_;
163 my $childpid = waitpid(-1, WNOHANG);
165 # TODO ...
166 return 1;
169 # Declare the environments Samba3 makes available.
170 # To be set up, they will be called as
171 # samba3->setup_$envname($self, $path, $dep_1_vars, $dep_2_vars, ...)
172 %Samba3::ENV_DEPS = (
173 # name => [dep_1, dep_2, ...],
174 nt4_dc => [],
175 nt4_dc_schannel => [],
177 simpleserver => [],
178 fileserver => [],
179 maptoguest => [],
180 ktest => [],
182 nt4_member => ["nt4_dc"],
184 ad_member => ["ad_dc", "fl2008r2dc", "fl2003dc"],
185 ad_member_rfc2307 => ["ad_dc_ntvfs"],
186 ad_member_idmap_rid => ["ad_dc"],
187 ad_member_idmap_ad => ["fl2008r2dc"],
190 %Samba3::ENV_DEPS_POST = ();
192 sub setup_nt4_dc
194 my ($self, $path) = @_;
196 print "PROVISIONING NT4 DC...";
198 my $nt4_dc_options = "
199 domain master = yes
200 domain logons = yes
201 lanman auth = yes
202 ntlm auth = yes
203 raw NTLMv2 auth = yes
204 server schannel = auto
206 rpc_server:epmapper = external
207 rpc_server:spoolss = external
208 rpc_server:lsarpc = external
209 rpc_server:samr = external
210 rpc_server:netlogon = external
211 rpc_server:register_embedded_np = yes
212 rpc_server:FssagentRpc = external
214 rpc_daemon:epmd = fork
215 rpc_daemon:spoolssd = fork
216 rpc_daemon:lsasd = fork
217 rpc_daemon:fssd = fork
218 fss: sequence timeout = 1
219 check parent directory delete on close = yes
222 my $vars = $self->provision($path, "SAMBA-TEST",
223 "LOCALNT4DC2",
224 "localntdc2pass",
225 $nt4_dc_options);
227 $vars or return undef;
229 if (not $self->check_or_start($vars, "yes", "yes", "yes")) {
230 return undef;
233 $vars->{DOMSID} = $vars->{SAMSID};
234 $vars->{DC_SERVER} = $vars->{SERVER};
235 $vars->{DC_SERVER_IP} = $vars->{SERVER_IP};
236 $vars->{DC_SERVER_IPV6} = $vars->{SERVER_IPV6};
237 $vars->{DC_NETBIOSNAME} = $vars->{NETBIOSNAME};
238 $vars->{DC_USERNAME} = $vars->{USERNAME};
239 $vars->{DC_PASSWORD} = $vars->{PASSWORD};
241 return $vars;
244 sub setup_nt4_dc_schannel
246 my ($self, $path) = @_;
248 print "PROVISIONING NT4 DC WITH SERVER SCHANNEL ...";
250 my $pdc_options = "
251 domain master = yes
252 domain logons = yes
253 lanman auth = yes
255 rpc_server:epmapper = external
256 rpc_server:spoolss = external
257 rpc_server:lsarpc = external
258 rpc_server:samr = external
259 rpc_server:netlogon = external
260 rpc_server:register_embedded_np = yes
262 rpc_daemon:epmd = fork
263 rpc_daemon:spoolssd = fork
264 rpc_daemon:lsasd = fork
266 server schannel = yes
267 # used to reproduce bug #12772
268 server max protocol = SMB2_02
271 my $vars = $self->provision($path, "NT4SCHANNEL",
272 "LOCALNT4DC9",
273 "localntdc9pass",
274 $pdc_options);
276 $vars or return undef;
278 if (not $self->check_or_start($vars, "yes", "yes", "yes")) {
279 return undef;
282 $vars->{DOMSID} = $vars->{SAMSID};
283 $vars->{DC_SERVER} = $vars->{SERVER};
284 $vars->{DC_SERVER_IP} = $vars->{SERVER_IP};
285 $vars->{DC_SERVER_IPV6} = $vars->{SERVER_IPV6};
286 $vars->{DC_NETBIOSNAME} = $vars->{NETBIOSNAME};
287 $vars->{DC_USERNAME} = $vars->{USERNAME};
288 $vars->{DC_PASSWORD} = $vars->{PASSWORD};
290 return $vars;
293 sub setup_nt4_member
295 my ($self, $prefix, $nt4_dc_vars) = @_;
296 my $count = 0;
297 my $rc;
299 print "PROVISIONING MEMBER...";
301 my $require_mutexes = "dbwrap_tdb_require_mutexes:* = yes";
302 $require_mutexes = "" if ($ENV{SELFTEST_DONT_REQUIRE_TDB_MUTEX_SUPPORT} eq "1");
304 my $member_options = "
305 security = domain
306 dbwrap_tdb_mutexes:* = yes
307 ${require_mutexes}
309 my $ret = $self->provision($prefix, $nt4_dc_vars->{DOMAIN},
310 "LOCALNT4MEMBER3",
311 "localnt4member3pass",
312 $member_options);
314 $ret or return undef;
316 my $nmblookup = Samba::bindir_path($self, "nmblookup");
317 do {
318 print "Waiting for the LOGON SERVER registration ...\n";
319 $rc = system("$nmblookup $ret->{CONFIGURATION} $ret->{DOMAIN}\#1c");
320 if ($rc != 0) {
321 sleep(1);
323 $count++;
324 } while ($rc != 0 && $count < 10);
325 if ($count == 10) {
326 print "NMBD not reachable after 10 retries\n";
327 teardown_env($self, $ret);
328 return 0;
331 my $net = Samba::bindir_path($self, "net");
332 # Add hosts file for name lookups
333 my $cmd = "NSS_WRAPPER_HOSTS='$ret->{NSS_WRAPPER_HOSTS}' ";
334 $cmd .= "SOCKET_WRAPPER_DEFAULT_IFACE=\"$ret->{SOCKET_WRAPPER_DEFAULT_IFACE}\" ";
335 $cmd .= "SELFTEST_WINBINDD_SOCKET_DIR=\"$ret->{SELFTEST_WINBINDD_SOCKET_DIR}\" ";
336 $cmd .= "$net rpc join $ret->{CONFIGURATION} $nt4_dc_vars->{DOMAIN} member";
337 $cmd .= " -U$nt4_dc_vars->{USERNAME}\%$nt4_dc_vars->{PASSWORD}";
339 if (system($cmd) != 0) {
340 warn("Join failed\n$cmd");
341 return undef;
344 # Add hosts file for name lookups
345 my $cmd = "NSS_WRAPPER_HOSTS='$ret->{NSS_WRAPPER_HOSTS}' ";
346 $cmd .= "SOCKET_WRAPPER_DEFAULT_IFACE=\"$ret->{SOCKET_WRAPPER_DEFAULT_IFACE}\" ";
347 $cmd .= "SELFTEST_WINBINDD_SOCKET_DIR=\"$ret->{SELFTEST_WINBINDD_SOCKET_DIR}\" ";
348 $cmd .= "$net $ret->{CONFIGURATION} primarytrust dumpinfo | grep -q 'REDACTED SECRET VALUES'";
350 if (system($cmd) != 0) {
351 warn("check failed\n$cmd");
352 return undef;
355 if (not $self->check_or_start($ret, "yes", "yes", "yes")) {
356 return undef;
359 $ret->{DOMSID} = $nt4_dc_vars->{DOMSID};
360 $ret->{DC_SERVER} = $nt4_dc_vars->{SERVER};
361 $ret->{DC_SERVER_IP} = $nt4_dc_vars->{SERVER_IP};
362 $ret->{DC_SERVER_IPV6} = $nt4_dc_vars->{SERVER_IPV6};
363 $ret->{DC_NETBIOSNAME} = $nt4_dc_vars->{NETBIOSNAME};
364 $ret->{DC_USERNAME} = $nt4_dc_vars->{USERNAME};
365 $ret->{DC_PASSWORD} = $nt4_dc_vars->{PASSWORD};
367 return $ret;
370 sub setup_ad_member
372 my ($self, $prefix, $dcvars, $trustvars_f, $trustvars_e) = @_;
374 my $prefix_abs = abs_path($prefix);
375 my @dirs = ();
377 # If we didn't build with ADS, pretend this env was never available
378 if (not $self->have_ads()) {
379 return "UNKNOWN";
382 print "PROVISIONING S3 AD MEMBER...";
384 mkdir($prefix_abs, 0777);
386 my $share_dir="$prefix_abs/share";
387 push(@dirs, $share_dir);
389 my $substitution_path = "$share_dir/D_$dcvars->{DOMAIN}";
390 push(@dirs, $substitution_path);
392 $substitution_path = "$share_dir/D_$dcvars->{DOMAIN}/U_alice";
393 push(@dirs, $substitution_path);
395 $substitution_path = "$share_dir/D_$dcvars->{DOMAIN}/U_alice/G_domain users";
396 push(@dirs, $substitution_path);
398 # Using '/' as the winbind separator is a bad idea ...
399 $substitution_path = "$share_dir/D_$dcvars->{DOMAIN}/u_$dcvars->{DOMAIN}";
400 push(@dirs, $substitution_path);
402 $substitution_path = "$share_dir/D_$dcvars->{DOMAIN}/u_$dcvars->{DOMAIN}/alice";
403 push(@dirs, $substitution_path);
405 $substitution_path = "$share_dir/D_$dcvars->{DOMAIN}/u_$dcvars->{DOMAIN}/alice/g_$dcvars->{DOMAIN}";
406 push(@dirs, $substitution_path);
408 $substitution_path = "$share_dir/D_$dcvars->{DOMAIN}/u_$dcvars->{DOMAIN}/alice/g_$dcvars->{DOMAIN}/domain users";
409 push(@dirs, $substitution_path);
411 my $member_options = "
412 security = ads
413 workgroup = $dcvars->{DOMAIN}
414 realm = $dcvars->{REALM}
415 netbios aliases = foo bar
416 template homedir = /home/%D/%G/%U
417 auth event notification = true
418 password server = $dcvars->{SERVER}
419 winbind scan trusted domains = no
420 winbind use krb5 enterprise principals = yes
422 [sub_dug]
423 path = $share_dir/D_%D/U_%U/G_%G
424 writeable = yes
426 [sub_dug2]
427 path = $share_dir/D_%D/u_%u/g_%g
428 writeable = yes
432 my $ret = $self->provision($prefix, $dcvars->{DOMAIN},
433 "LOCALADMEMBER",
434 "loCalMemberPass",
435 $member_options,
436 $dcvars->{SERVER_IP},
437 $dcvars->{SERVER_IPV6});
439 $ret or return undef;
441 mkdir($_, 0777) foreach(@dirs);
443 close(USERMAP);
444 $ret->{DOMAIN} = $dcvars->{DOMAIN};
445 $ret->{REALM} = $dcvars->{REALM};
446 $ret->{DOMSID} = $dcvars->{DOMSID};
448 my $ctx;
449 $ctx = {};
450 $ctx->{krb5_conf} = "$prefix_abs/lib/krb5.conf";
451 $ctx->{domain} = $dcvars->{DOMAIN};
452 $ctx->{realm} = $dcvars->{REALM};
453 $ctx->{dnsname} = lc($dcvars->{REALM});
454 $ctx->{kdc_ipv4} = $dcvars->{SERVER_IP};
455 $ctx->{kdc_ipv6} = $dcvars->{SERVER_IPV6};
456 $ctx->{krb5_ccname} = "$prefix_abs/krb5cc_%{uid}";
457 Samba::mk_krb5_conf($ctx, "");
459 $ret->{KRB5_CONFIG} = $ctx->{krb5_conf};
460 $ret->{RESOLV_CONF} = $dcvars->{RESOLV_CONF};
462 my $net = Samba::bindir_path($self, "net");
463 # Add hosts file for name lookups
464 my $cmd = "NSS_WRAPPER_HOSTS='$ret->{NSS_WRAPPER_HOSTS}' ";
465 $cmd .= "SOCKET_WRAPPER_DEFAULT_IFACE=\"$ret->{SOCKET_WRAPPER_DEFAULT_IFACE}\" ";
466 if (defined($ret->{RESOLV_WRAPPER_CONF})) {
467 $cmd .= "RESOLV_WRAPPER_CONF=\"$ret->{RESOLV_WRAPPER_CONF}\" ";
468 } else {
469 $cmd .= "RESOLV_WRAPPER_HOSTS=\"$ret->{RESOLV_WRAPPER_HOSTS}\" ";
471 $cmd .= "KRB5_CONFIG=\"$ret->{KRB5_CONFIG}\" ";
472 $cmd .= "SELFTEST_WINBINDD_SOCKET_DIR=\"$ret->{SELFTEST_WINBINDD_SOCKET_DIR}\" ";
473 $cmd .= "$net join $ret->{CONFIGURATION}";
474 $cmd .= " -U$dcvars->{USERNAME}\%$dcvars->{PASSWORD}";
476 if (system($cmd) != 0) {
477 warn("Join failed\n$cmd");
478 return undef;
481 # We need world access to this share, as otherwise the domain
482 # administrator from the AD domain provided by Samba4 can't
483 # access the share for tests.
484 chmod 0777, "$prefix/share";
486 if (not $self->check_or_start($ret, "yes", "yes", "yes")) {
487 return undef;
490 $ret->{DC_SERVER} = $dcvars->{SERVER};
491 $ret->{DC_SERVER_IP} = $dcvars->{SERVER_IP};
492 $ret->{DC_SERVER_IPV6} = $dcvars->{SERVER_IPV6};
493 $ret->{DC_SERVERCONFFILE} = $dcvars->{SERVERCONFFILE};
494 $ret->{DC_NETBIOSNAME} = $dcvars->{NETBIOSNAME};
495 $ret->{DC_USERNAME} = $dcvars->{USERNAME};
496 $ret->{DC_PASSWORD} = $dcvars->{PASSWORD};
498 # forest trust
499 $ret->{TRUST_F_BOTH_SERVER} = $trustvars_f->{SERVER};
500 $ret->{TRUST_F_BOTH_SERVER_IP} = $trustvars_f->{SERVER_IP};
501 $ret->{TRUST_F_BOTH_SERVER_IPV6} = $trustvars_f->{SERVER_IPV6};
502 $ret->{TRUST_F_BOTH_NETBIOSNAME} = $trustvars_f->{NETBIOSNAME};
503 $ret->{TRUST_F_BOTH_USERNAME} = $trustvars_f->{USERNAME};
504 $ret->{TRUST_F_BOTH_PASSWORD} = $trustvars_f->{PASSWORD};
505 $ret->{TRUST_F_BOTH_DOMAIN} = $trustvars_f->{DOMAIN};
506 $ret->{TRUST_F_BOTH_REALM} = $trustvars_f->{REALM};
508 # external trust
509 $ret->{TRUST_E_BOTH_SERVER} = $trustvars_e->{SERVER};
510 $ret->{TRUST_E_BOTH_SERVER_IP} = $trustvars_e->{SERVER_IP};
511 $ret->{TRUST_E_BOTH_SERVER_IPV6} = $trustvars_e->{SERVER_IPV6};
512 $ret->{TRUST_E_BOTH_NETBIOSNAME} = $trustvars_e->{NETBIOSNAME};
513 $ret->{TRUST_E_BOTH_USERNAME} = $trustvars_e->{USERNAME};
514 $ret->{TRUST_E_BOTH_PASSWORD} = $trustvars_e->{PASSWORD};
515 $ret->{TRUST_E_BOTH_DOMAIN} = $trustvars_e->{DOMAIN};
516 $ret->{TRUST_E_BOTH_REALM} = $trustvars_e->{REALM};
518 return $ret;
521 sub setup_ad_member_rfc2307
523 my ($self, $prefix, $dcvars) = @_;
525 # If we didn't build with ADS, pretend this env was never available
526 if (not $self->have_ads()) {
527 return "UNKNOWN";
530 print "PROVISIONING S3 AD MEMBER WITH idmap_rfc2307 config...";
532 my $member_options = "
533 security = ads
534 workgroup = $dcvars->{DOMAIN}
535 realm = $dcvars->{REALM}
536 idmap cache time = 0
537 idmap negative cache time = 0
538 idmap config * : backend = autorid
539 idmap config * : range = 1000000-1999999
540 idmap config * : rangesize = 100000
541 idmap config $dcvars->{DOMAIN} : backend = rfc2307
542 idmap config $dcvars->{DOMAIN} : range = 2000000-2999999
543 idmap config $dcvars->{DOMAIN} : ldap_server = ad
544 idmap config $dcvars->{DOMAIN} : bind_path_user = ou=idmap,dc=samba,dc=example,dc=com
545 idmap config $dcvars->{DOMAIN} : bind_path_group = ou=idmap,dc=samba,dc=example,dc=com
547 password server = $dcvars->{SERVER}
550 my $ret = $self->provision($prefix, $dcvars->{DOMAIN},
551 "RFC2307MEMBER",
552 "loCalMemberPass",
553 $member_options,
554 $dcvars->{SERVER_IP},
555 $dcvars->{SERVER_IPV6});
557 $ret or return undef;
559 close(USERMAP);
560 $ret->{DOMAIN} = $dcvars->{DOMAIN};
561 $ret->{REALM} = $dcvars->{REALM};
562 $ret->{DOMSID} = $dcvars->{DOMSID};
564 my $ctx;
565 my $prefix_abs = abs_path($prefix);
566 $ctx = {};
567 $ctx->{krb5_conf} = "$prefix_abs/lib/krb5.conf";
568 $ctx->{domain} = $dcvars->{DOMAIN};
569 $ctx->{realm} = $dcvars->{REALM};
570 $ctx->{dnsname} = lc($dcvars->{REALM});
571 $ctx->{kdc_ipv4} = $dcvars->{SERVER_IP};
572 $ctx->{kdc_ipv6} = $dcvars->{SERVER_IPV6};
573 $ctx->{krb5_ccname} = "$prefix_abs/krb5cc_%{uid}";
574 Samba::mk_krb5_conf($ctx, "");
576 $ret->{KRB5_CONFIG} = $ctx->{krb5_conf};
577 $ret->{RESOLV_CONF} = $dcvars->{RESOLV_CONF};
579 my $net = Samba::bindir_path($self, "net");
580 # Add hosts file for name lookups
581 my $cmd = "NSS_WRAPPER_HOSTS='$ret->{NSS_WRAPPER_HOSTS}' ";
582 $cmd .= "SOCKET_WRAPPER_DEFAULT_IFACE=\"$ret->{SOCKET_WRAPPER_DEFAULT_IFACE}\" ";
583 if (defined($ret->{RESOLV_WRAPPER_CONF})) {
584 $cmd .= "RESOLV_WRAPPER_CONF=\"$ret->{RESOLV_WRAPPER_CONF}\" ";
585 } else {
586 $cmd .= "RESOLV_WRAPPER_HOSTS=\"$ret->{RESOLV_WRAPPER_HOSTS}\" ";
588 $cmd .= "KRB5_CONFIG=\"$ret->{KRB5_CONFIG}\" ";
589 $cmd .= "SELFTEST_WINBINDD_SOCKET_DIR=\"$ret->{SELFTEST_WINBINDD_SOCKET_DIR}\" ";
590 $cmd .= "$net join $ret->{CONFIGURATION}";
591 $cmd .= " -U$dcvars->{USERNAME}\%$dcvars->{PASSWORD}";
593 if (system($cmd) != 0) {
594 warn("Join failed\n$cmd");
595 return undef;
598 # We need world access to this share, as otherwise the domain
599 # administrator from the AD domain provided by Samba4 can't
600 # access the share for tests.
601 chmod 0777, "$prefix/share";
603 if (not $self->check_or_start($ret, "yes", "yes", "yes")) {
604 return undef;
607 $ret->{DC_SERVER} = $dcvars->{SERVER};
608 $ret->{DC_SERVER_IP} = $dcvars->{SERVER_IP};
609 $ret->{DC_SERVER_IPV6} = $dcvars->{SERVER_IPV6};
610 $ret->{DC_NETBIOSNAME} = $dcvars->{NETBIOSNAME};
611 $ret->{DC_USERNAME} = $dcvars->{USERNAME};
612 $ret->{DC_PASSWORD} = $dcvars->{PASSWORD};
614 return $ret;
617 sub setup_ad_member_idmap_rid
619 my ($self, $prefix, $dcvars) = @_;
621 # If we didn't build with ADS, pretend this env was never available
622 if (not $self->have_ads()) {
623 return "UNKNOWN";
626 print "PROVISIONING S3 AD MEMBER WITH idmap_rid config...";
628 my $member_options = "
629 security = ads
630 workgroup = $dcvars->{DOMAIN}
631 realm = $dcvars->{REALM}
632 idmap config * : backend = tdb
633 idmap config * : range = 1000000-1999999
634 idmap config $dcvars->{DOMAIN} : backend = rid
635 idmap config $dcvars->{DOMAIN} : range = 2000000-2999999
636 # Prevent overridding the provisioned lib/krb5.conf which sets certain
637 # values required for tests to succeed
638 create krb5 conf = no
639 map to guest = bad user
642 my $ret = $self->provision($prefix, $dcvars->{DOMAIN},
643 "IDMAPRIDMEMBER",
644 "loCalMemberPass",
645 $member_options,
646 $dcvars->{SERVER_IP},
647 $dcvars->{SERVER_IPV6});
649 $ret or return undef;
651 close(USERMAP);
652 $ret->{DOMAIN} = $dcvars->{DOMAIN};
653 $ret->{REALM} = $dcvars->{REALM};
654 $ret->{DOMSID} = $dcvars->{DOMSID};
656 my $ctx;
657 my $prefix_abs = abs_path($prefix);
658 $ctx = {};
659 $ctx->{krb5_conf} = "$prefix_abs/lib/krb5.conf";
660 $ctx->{domain} = $dcvars->{DOMAIN};
661 $ctx->{realm} = $dcvars->{REALM};
662 $ctx->{dnsname} = lc($dcvars->{REALM});
663 $ctx->{kdc_ipv4} = $dcvars->{SERVER_IP};
664 $ctx->{kdc_ipv6} = $dcvars->{SERVER_IPV6};
665 $ctx->{krb5_ccname} = "$prefix_abs/krb5cc_%{uid}";
666 Samba::mk_krb5_conf($ctx, "");
668 $ret->{KRB5_CONFIG} = $ctx->{krb5_conf};
669 $ret->{RESOLV_CONF} = $dcvars->{RESOLV_CONF};
671 my $net = Samba::bindir_path($self, "net");
672 # Add hosts file for name lookups
673 my $cmd = "NSS_WRAPPER_HOSTS='$ret->{NSS_WRAPPER_HOSTS}' ";
674 $cmd .= "SOCKET_WRAPPER_DEFAULT_IFACE=\"$ret->{SOCKET_WRAPPER_DEFAULT_IFACE}\" ";
675 if (defined($ret->{RESOLV_WRAPPER_CONF})) {
676 $cmd .= "RESOLV_WRAPPER_CONF=\"$ret->{RESOLV_WRAPPER_CONF}\" ";
677 } else {
678 $cmd .= "RESOLV_WRAPPER_HOSTS=\"$ret->{RESOLV_WRAPPER_HOSTS}\" ";
680 $cmd .= "KRB5_CONFIG=\"$ret->{KRB5_CONFIG}\" ";
681 $cmd .= "SELFTEST_WINBINDD_SOCKET_DIR=\"$ret->{SELFTEST_WINBINDD_SOCKET_DIR}\" ";
682 $cmd .= "$net join $ret->{CONFIGURATION}";
683 $cmd .= " -U$dcvars->{USERNAME}\%$dcvars->{PASSWORD}";
685 if (system($cmd) != 0) {
686 warn("Join failed\n$cmd");
687 return undef;
690 # We need world access to this share, as otherwise the domain
691 # administrator from the AD domain provided by Samba4 can't
692 # access the share for tests.
693 chmod 0777, "$prefix/share";
695 if (not $self->check_or_start($ret, "yes", "yes", "yes")) {
696 return undef;
699 $ret->{DC_SERVER} = $dcvars->{SERVER};
700 $ret->{DC_SERVER_IP} = $dcvars->{SERVER_IP};
701 $ret->{DC_SERVER_IPV6} = $dcvars->{SERVER_IPV6};
702 $ret->{DC_NETBIOSNAME} = $dcvars->{NETBIOSNAME};
703 $ret->{DC_USERNAME} = $dcvars->{USERNAME};
704 $ret->{DC_PASSWORD} = $dcvars->{PASSWORD};
706 return $ret;
709 sub setup_ad_member_idmap_ad
711 my ($self, $prefix, $dcvars) = @_;
713 # If we didn't build with ADS, pretend this env was never available
714 if (not $self->have_ads()) {
715 return "UNKNOWN";
718 print "PROVISIONING S3 AD MEMBER WITH idmap_ad config...";
720 my $member_options = "
721 security = ads
722 workgroup = $dcvars->{DOMAIN}
723 realm = $dcvars->{REALM}
724 password server = $dcvars->{SERVER}
725 idmap config * : backend = tdb
726 idmap config * : range = 1000000-1999999
727 idmap config $dcvars->{DOMAIN} : backend = ad
728 idmap config $dcvars->{DOMAIN} : range = 2000000-2999999
729 idmap config $dcvars->{TRUST_DOMAIN} : backend = ad
730 idmap config $dcvars->{TRUST_DOMAIN} : range = 2000000-2999999
733 my $ret = $self->provision($prefix, $dcvars->{DOMAIN},
734 "IDMAPADMEMBER",
735 "loCalMemberPass",
736 $member_options,
737 $dcvars->{SERVER_IP},
738 $dcvars->{SERVER_IPV6});
740 $ret or return undef;
742 close(USERMAP);
743 $ret->{DOMAIN} = $dcvars->{DOMAIN};
744 $ret->{REALM} = $dcvars->{REALM};
745 $ret->{DOMSID} = $dcvars->{DOMSID};
747 my $ctx;
748 my $prefix_abs = abs_path($prefix);
749 $ctx = {};
750 $ctx->{krb5_conf} = "$prefix_abs/lib/krb5.conf";
751 $ctx->{domain} = $dcvars->{DOMAIN};
752 $ctx->{realm} = $dcvars->{REALM};
753 $ctx->{dnsname} = lc($dcvars->{REALM});
754 $ctx->{kdc_ipv4} = $dcvars->{SERVER_IP};
755 $ctx->{kdc_ipv6} = $dcvars->{SERVER_IPV6};
756 $ctx->{krb5_ccname} = "$prefix_abs/krb5cc_%{uid}";
757 Samba::mk_krb5_conf($ctx, "");
759 $ret->{KRB5_CONFIG} = $ctx->{krb5_conf};
760 $ret->{RESOLV_CONF} = $dcvars->{RESOLV_CONF};
762 my $net = Samba::bindir_path($self, "net");
763 # Add hosts file for name lookups
764 my $cmd = "NSS_WRAPPER_HOSTS='$ret->{NSS_WRAPPER_HOSTS}' ";
765 $cmd .= "SOCKET_WRAPPER_DEFAULT_IFACE=\"$ret->{SOCKET_WRAPPER_DEFAULT_IFACE}\" ";
766 if (defined($ret->{RESOLV_WRAPPER_CONF})) {
767 $cmd .= "RESOLV_WRAPPER_CONF=\"$ret->{RESOLV_WRAPPER_CONF}\" ";
768 } else {
769 $cmd .= "RESOLV_WRAPPER_HOSTS=\"$ret->{RESOLV_WRAPPER_HOSTS}\" ";
771 $cmd .= "KRB5_CONFIG=\"$ret->{KRB5_CONFIG}\" ";
772 $cmd .= "SELFTEST_WINBINDD_SOCKET_DIR=\"$ret->{SELFTEST_WINBINDD_SOCKET_DIR}\" ";
773 $cmd .= "$net join $ret->{CONFIGURATION}";
774 $cmd .= " -U$dcvars->{USERNAME}\%$dcvars->{PASSWORD}";
776 if (system($cmd) != 0) {
777 warn("Join failed\n$cmd");
778 return undef;
781 # We need world access to this share, as otherwise the domain
782 # administrator from the AD domain provided by Samba4 can't
783 # access the share for tests.
784 chmod 0777, "$prefix/share";
786 if (not $self->check_or_start($ret, "yes", "yes", "yes")) {
787 return undef;
790 $ret->{DC_SERVER} = $dcvars->{SERVER};
791 $ret->{DC_SERVER_IP} = $dcvars->{SERVER_IP};
792 $ret->{DC_SERVER_IPV6} = $dcvars->{SERVER_IPV6};
793 $ret->{DC_NETBIOSNAME} = $dcvars->{NETBIOSNAME};
794 $ret->{DC_USERNAME} = $dcvars->{USERNAME};
795 $ret->{DC_PASSWORD} = $dcvars->{PASSWORD};
797 $ret->{TRUST_SERVER} = $dcvars->{TRUST_SERVER};
798 $ret->{TRUST_USERNAME} = $dcvars->{TRUST_USERNAME};
799 $ret->{TRUST_PASSWORD} = $dcvars->{TRUST_PASSWORD};
800 $ret->{TRUST_DOMAIN} = $dcvars->{TRUST_DOMAIN};
801 $ret->{TRUST_REALM} = $dcvars->{TRUST_REALM};
802 $ret->{TRUST_DOMSID} = $dcvars->{TRUST_DOMSID};
804 return $ret;
807 sub setup_simpleserver
809 my ($self, $path) = @_;
811 print "PROVISIONING simple server...";
813 my $prefix_abs = abs_path($path);
815 my $simpleserver_options = "
816 lanman auth = yes
817 ntlm auth = yes
818 vfs objects = xattr_tdb streams_depot
819 change notify = no
820 smb encrypt = off
822 [vfs_aio_pthread]
823 path = $prefix_abs/share
824 read only = no
825 vfs objects = aio_pthread
826 aio_pthread:aio open = yes
827 smbd:async dosmode = no
829 [vfs_aio_pthread_async_dosmode_default1]
830 path = $prefix_abs/share
831 read only = no
832 vfs objects = aio_pthread
833 store dos attributes = yes
834 aio_pthread:aio open = yes
835 smbd:async dosmode = yes
837 [vfs_aio_pthread_async_dosmode_default2]
838 path = $prefix_abs/share
839 read only = no
840 vfs objects = aio_pthread xattr_tdb
841 store dos attributes = yes
842 aio_pthread:aio open = yes
843 smbd:async dosmode = yes
845 [vfs_aio_pthread_async_dosmode_force_sync1]
846 path = $prefix_abs/share
847 read only = no
848 vfs objects = aio_pthread
849 store dos attributes = yes
850 aio_pthread:aio open = yes
851 smbd:async dosmode = yes
852 # This simulates non linux systems
853 smbd:force sync user path safe threadpool = yes
854 smbd:force sync user chdir safe threadpool = yes
855 smbd:force sync root path safe threadpool = yes
856 smbd:force sync root chdir safe threadpool = yes
858 [vfs_aio_pthread_async_dosmode_force_sync2]
859 path = $prefix_abs/share
860 read only = no
861 vfs objects = aio_pthread xattr_tdb
862 store dos attributes = yes
863 aio_pthread:aio open = yes
864 smbd:async dosmode = yes
865 # This simulates non linux systems
866 smbd:force sync user path safe threadpool = yes
867 smbd:force sync user chdir safe threadpool = yes
868 smbd:force sync root path safe threadpool = yes
869 smbd:force sync root chdir safe threadpool = yes
871 [vfs_aio_fork]
872 path = $prefix_abs/share
873 vfs objects = aio_fork
874 read only = no
875 vfs_aio_fork:erratic_testing_mode=yes
877 [dosmode]
878 path = $prefix_abs/share
879 vfs objects =
880 store dos attributes = yes
881 hide files = /hidefile/
882 hide dot files = yes
884 [enc_desired]
885 path = $prefix_abs/share
886 vfs objects =
887 smb encrypt = desired
889 [hidenewfiles]
890 path = $prefix_abs/share
891 hide new files timeout = 5
894 my $vars = $self->provision($path, "WORKGROUP",
895 "LOCALSHARE4",
896 "local4pass",
897 $simpleserver_options);
899 $vars or return undef;
901 if (not $self->check_or_start($vars, "yes", "no", "yes")) {
902 return undef;
905 return $vars;
908 sub setup_fileserver
910 my ($self, $path) = @_;
911 my $prefix_abs = abs_path($path);
912 my $srcdir_abs = abs_path($self->{srcdir});
914 print "PROVISIONING file server ...\n";
916 my @dirs = ();
918 mkdir($prefix_abs, 0777);
920 my $usershare_dir="$prefix_abs/lib/usershare";
922 mkdir("$prefix_abs/lib", 0755);
923 remove_tree($usershare_dir);
924 mkdir($usershare_dir, 01770);
926 my $share_dir="$prefix_abs/share";
928 # Create share directory structure
929 my $lower_case_share_dir="$share_dir/lower-case";
930 push(@dirs, $lower_case_share_dir);
932 my $lower_case_share_dir_30000="$share_dir/lower-case-30000";
933 push(@dirs, $lower_case_share_dir_30000);
935 my $dfree_share_dir="$share_dir/dfree";
936 push(@dirs, $dfree_share_dir);
937 push(@dirs, "$dfree_share_dir/subdir1");
938 push(@dirs, "$dfree_share_dir/subdir2");
939 push(@dirs, "$dfree_share_dir/subdir3");
941 my $quotadir_dir="$share_dir/quota";
942 push(@dirs, $quotadir_dir);
944 my $valid_users_sharedir="$share_dir/valid_users";
945 push(@dirs,$valid_users_sharedir);
947 my $offline_sharedir="$share_dir/offline";
948 push(@dirs,$offline_sharedir);
950 my $force_user_valid_users_dir = "$share_dir/force_user_valid_users";
951 push(@dirs, $force_user_valid_users_dir);
953 my $smbget_sharedir="$share_dir/smbget";
954 push(@dirs,$smbget_sharedir);
956 my $tarmode_sharedir="$share_dir/tarmode";
957 push(@dirs,$tarmode_sharedir);
959 my $usershare_sharedir="$share_dir/usershares";
960 push(@dirs,$usershare_sharedir);
962 my $fileserver_options = "
963 kernel change notify = yes
964 rpc_server:mdssvc = embedded
965 spotlight backend = elasticsearch
966 elasticsearch:address = 127.0.0.35
967 elasticsearch:port = 8080
968 elasticsearch:mappings = \"$srcdir_abs/source3/rpc_server/mdssvc/elasticsearch_mappings.json\"
970 usershare path = $usershare_dir
971 usershare max shares = 10
972 usershare allow guests = yes
973 usershare prefix allow list = $usershare_sharedir
975 get quota command = $prefix_abs/getset_quota.py
976 set quota command = $prefix_abs/getset_quota.py
977 [spotlight]
978 path = $share_dir
979 spotlight = yes
980 read only = no
981 [no_spotlight]
982 path = $share_dir
983 spotlight = no
984 read only = no
985 [lowercase]
986 path = $lower_case_share_dir
987 comment = smb username is [%U]
988 case sensitive = True
989 default case = lower
990 preserve case = no
991 short preserve case = no
992 [lowercase-30000]
993 path = $lower_case_share_dir_30000
994 comment = smb username is [%U]
995 case sensitive = True
996 default case = lower
997 preserve case = no
998 short preserve case = no
999 [dfree]
1000 path = $dfree_share_dir
1001 comment = smb username is [%U]
1002 dfree command = $srcdir_abs/testprogs/blackbox/dfree.sh
1003 [valid-users-access]
1004 path = $valid_users_sharedir
1005 valid users = +userdup
1006 [offline]
1007 path = $offline_sharedir
1008 vfs objects = offline
1010 # BUG: https://bugzilla.samba.org/show_bug.cgi?id=9878
1011 # RH BUG: https://bugzilla.redhat.com/show_bug.cgi?id=1077651
1012 [force_user_valid_users]
1013 path = $force_user_valid_users_dir
1014 comment = force user with valid users combination test share
1015 valid users = +force_user
1016 force user = force_user
1017 force group = everyone
1018 write list = force_user
1020 [smbget]
1021 path = $smbget_sharedir
1022 comment = smb username is [%U]
1023 guest ok = yes
1024 [ign_sysacls]
1025 path = $share_dir
1026 comment = ignore system acls
1027 acl_xattr:ignore system acls = yes
1028 [inherit_owner]
1029 path = $share_dir
1030 comment = inherit owner
1031 inherit owner = yes
1032 [inherit_owner_u]
1033 path = $share_dir
1034 comment = inherit only unix owner
1035 inherit owner = unix only
1036 acl_xattr:ignore system acls = yes
1037 # BUG: https://bugzilla.samba.org/show_bug.cgi?id=13690
1038 [force_group_test]
1039 path = $share_dir
1040 comment = force group test
1041 # force group = everyone
1042 [homes]
1043 comment = Home directories
1044 browseable = No
1045 read only = No
1048 my $vars = $self->provision($path, "WORKGROUP",
1049 "FILESERVER",
1050 "fileserver",
1051 $fileserver_options,
1052 undef,
1053 undef,
1056 $vars or return undef;
1058 if (not $self->check_or_start($vars, "yes", "no", "yes")) {
1059 return undef;
1063 mkdir($_, 0777) foreach(@dirs);
1065 ## Create case sensitive lower case share dir
1066 foreach my $file ('a'..'z') {
1067 my $full_path = $lower_case_share_dir . '/' . $file;
1068 open my $fh, '>', $full_path;
1069 # Add some content to file
1070 print $fh $full_path;
1071 close $fh;
1074 for (my $file = 1; $file < 51; ++$file) {
1075 my $full_path = $lower_case_share_dir . '/' . $file;
1076 open my $fh, '>', $full_path;
1077 # Add some content to file
1078 print $fh $full_path;
1079 close $fh;
1082 # Create content for 30000 share
1083 foreach my $file ('a'..'z') {
1084 my $full_path = $lower_case_share_dir_30000 . '/' . $file;
1085 open my $fh, '>', $full_path;
1086 # Add some content to file
1087 print $fh $full_path;
1088 close $fh;
1091 for (my $file = 1; $file < 30001; ++$file) {
1092 my $full_path = $lower_case_share_dir_30000 . '/' . $file;
1093 open my $fh, '>', $full_path;
1094 # Add some content to file
1095 print $fh $full_path;
1096 close $fh;
1100 ## create a listable file in valid_users_share
1102 my $valid_users_target = "$valid_users_sharedir/foo";
1103 unless (open(VALID_USERS_TARGET, ">$valid_users_target")) {
1104 warn("Unable to open $valid_users_target");
1105 return undef;
1107 close(VALID_USERS_TARGET);
1108 chmod 0644, $valid_users_target;
1110 return $vars;
1113 sub setup_ktest
1115 my ($self, $prefix) = @_;
1117 # If we didn't build with ADS, pretend this env was never available
1118 if (not $self->have_ads()) {
1119 return "UNKNOWN";
1122 print "PROVISIONING server with security=ads...";
1124 my $ktest_options = "
1125 workgroup = KTEST
1126 realm = ktest.samba.example.com
1127 security = ads
1128 username map = $prefix/lib/username.map
1129 server signing = required
1130 server min protocol = SMB3_00
1131 client max protocol = SMB3
1133 # This disables NTLM auth against the local SAM, which
1134 # we use can then test this setting by.
1135 ntlm auth = disabled
1138 my $ret = $self->provision($prefix, "KTEST",
1139 "LOCALKTEST6",
1140 "localktest6pass",
1141 $ktest_options);
1143 $ret or return undef;
1145 my $ctx;
1146 my $prefix_abs = abs_path($prefix);
1147 $ctx = {};
1148 $ctx->{krb5_conf} = "$prefix_abs/lib/krb5.conf";
1149 $ctx->{domain} = "KTEST";
1150 $ctx->{realm} = "KTEST.SAMBA.EXAMPLE.COM";
1151 $ctx->{dnsname} = lc($ctx->{realm});
1152 $ctx->{kdc_ipv4} = "0.0.0.0";
1153 $ctx->{kdc_ipv6} = "::";
1154 $ctx->{krb5_ccname} = "$prefix_abs/krb5cc_%{uid}";
1155 Samba::mk_krb5_conf($ctx, "");
1157 $ret->{KRB5_CONFIG} = $ctx->{krb5_conf};
1159 open(USERMAP, ">$prefix/lib/username.map") or die("Unable to open $prefix/lib/username.map");
1160 print USERMAP "
1161 $ret->{USERNAME} = KTEST\\Administrator
1163 close(USERMAP);
1165 #This is the secrets.tdb created by 'net ads join' from Samba3 to a
1166 #Samba4 DC with the same parameters as are being used here. The
1167 #domain SID is S-1-5-21-1071277805-689288055-3486227160
1168 $ret->{SAMSID} = "S-1-5-21-1911091480-1468226576-2729736297";
1169 $ret->{DOMSID} = "S-1-5-21-1071277805-689288055-3486227160";
1171 system("cp $self->{srcdir}/source3/selftest/ktest-secrets.tdb $prefix/private/secrets.tdb");
1172 chmod 0600, "$prefix/private/secrets.tdb";
1174 #Make sure there's no old ntdb file.
1175 system("rm -f $prefix/private/secrets.ntdb");
1177 #This uses a pre-calculated krb5 credentials cache, obtained by running Samba4 with:
1178 # "--option=kdc:service ticket lifetime=239232" "--option=kdc:user ticket lifetime=239232" "--option=kdc:renewal lifetime=239232"
1180 #and having in krb5.conf:
1181 # ticket_lifetime = 799718400
1182 # renew_lifetime = 799718400
1184 # The commands for the -2 keytab where were:
1185 # kinit administrator@KTEST.SAMBA.EXAMPLE.COM
1186 # kvno host/localktest6@KTEST.SAMBA.EXAMPLE.COM
1187 # kvno cifs/localktest6@KTEST.SAMBA.EXAMPLE.COM
1188 # kvno host/LOCALKTEST6@KTEST.SAMBA.EXAMPLE.COM
1189 # kvno cifs/LOCALKTEST6@KTEST.SAMBA.EXAMPLE.COM
1191 # and then for the -3 keytab, I did
1193 # net changetrustpw; kdestroy and the same again.
1195 # This creates a credential cache with a very long lifetime (2036 at
1196 # at 2011-04), and shows that running 'net changetrustpw' does not
1197 # break existing logins (for the secrets.tdb method at least).
1200 $ret->{KRB5_CCACHE}="FILE:$prefix/krb5_ccache";
1202 system("cp $self->{srcdir}/source3/selftest/ktest-krb5_ccache-2 $prefix/krb5_ccache-2");
1203 chmod 0600, "$prefix/krb5_ccache-2";
1205 system("cp $self->{srcdir}/source3/selftest/ktest-krb5_ccache-3 $prefix/krb5_ccache-3");
1206 chmod 0600, "$prefix/krb5_ccache-3";
1208 # We need world access to this share, as otherwise the domain
1209 # administrator from the AD domain provided by ktest can't
1210 # access the share for tests.
1211 chmod 0777, "$prefix/share";
1213 if (not $self->check_or_start($ret, "yes", "no", "yes")) {
1214 return undef;
1216 return $ret;
1219 sub setup_maptoguest
1221 my ($self, $path) = @_;
1223 print "PROVISIONING maptoguest...";
1225 my $options = "
1226 map to guest = bad user
1227 ntlm auth = yes
1230 my $vars = $self->provision($path, "WORKGROUP",
1231 "maptoguest",
1232 "maptoguestpass",
1233 $options);
1235 $vars or return undef;
1237 if (not $self->check_or_start($vars, "yes", "no", "yes")) {
1238 return undef;
1241 return $vars;
1244 sub stop_sig_term($$) {
1245 my ($self, $pid) = @_;
1246 kill("USR1", $pid) or kill("ALRM", $pid) or warn("Unable to kill $pid: $!");
1249 sub stop_sig_kill($$) {
1250 my ($self, $pid) = @_;
1251 kill("ALRM", $pid) or warn("Unable to kill $pid: $!");
1254 sub write_pid($$$)
1256 my ($env_vars, $app, $pid) = @_;
1258 open(PID, ">$env_vars->{PIDDIR}/timelimit.$app.pid");
1259 print PID $pid;
1260 close(PID);
1263 sub read_pid($$)
1265 my ($env_vars, $app) = @_;
1267 open(PID, "<$env_vars->{PIDDIR}/timelimit.$app.pid");
1268 my $pid = <PID>;
1269 close(PID);
1270 return $pid;
1273 # builds up the cmd args to run an s3 binary (i.e. smbd, nmbd, etc)
1274 sub make_bin_cmd
1276 my ($self, $binary, $env_vars, $options, $valgrind, $dont_log_stdout) = @_;
1278 my @optargs = ("-d0");
1279 if (defined($options)) {
1280 @optargs = split(/ /, $options);
1282 my @preargs = (Samba::bindir_path($self, "timelimit"), $self->{server_maxtime});
1284 if (defined($valgrind)) {
1285 @preargs = split(/ /, $valgrind);
1287 my @args = ("-F", "--no-process-group",
1288 "-s", $env_vars->{SERVERCONFFILE},
1289 "-l", $env_vars->{LOGDIR});
1291 if (not defined($dont_log_stdout)) {
1292 push(@args, "--log-stdout");
1294 return (@preargs, $binary, @args, @optargs);
1297 sub check_or_start($$$$$) {
1298 my ($self, $env_vars, $nmbd, $winbindd, $smbd) = @_;
1299 my $STDIN_READER;
1301 # use a pipe for stdin in the child processes. This allows
1302 # those processes to monitor the pipe for EOF to ensure they
1303 # exit when the test script exits
1304 pipe($STDIN_READER, $env_vars->{STDIN_PIPE});
1306 my $binary = Samba::bindir_path($self, "nmbd");
1307 my @full_cmd = $self->make_bin_cmd($binary, $env_vars,
1308 $ENV{NMBD_OPTIONS}, $ENV{NMBD_VALGRIND},
1309 $ENV{NMBD_DONT_LOG_STDOUT});
1310 my $nmbd_envs = Samba::get_env_for_process("nmbd", $env_vars);
1311 delete $nmbd_envs->{RESOLV_WRAPPER_CONF};
1312 delete $nmbd_envs->{RESOLV_WRAPPER_HOSTS};
1314 # fork and exec() nmbd in the child process
1315 my $daemon_ctx = {
1316 NAME => "nmbd",
1317 BINARY_PATH => $binary,
1318 FULL_CMD => [ @full_cmd ],
1319 LOG_FILE => $env_vars->{NMBD_TEST_LOG},
1320 ENV_VARS => $nmbd_envs,
1322 if ($nmbd ne "yes") {
1323 $daemon_ctx->{SKIP_DAEMON} = 1;
1325 my $pid = Samba::fork_and_exec($self, $env_vars, $daemon_ctx, $STDIN_READER);
1327 $env_vars->{NMBD_TL_PID} = $pid;
1328 write_pid($env_vars, "nmbd", $pid);
1330 $binary = Samba::bindir_path($self, "winbindd");
1331 @full_cmd = $self->make_bin_cmd($binary, $env_vars,
1332 $ENV{WINBINDD_OPTIONS}, $ENV{WINBINDD_VALGRIND}, "N/A");
1334 if (not defined($ENV{WINBINDD_DONT_LOG_STDOUT})) {
1335 push(@full_cmd, "--stdout");
1338 # fork and exec() winbindd in the child process
1339 $daemon_ctx = {
1340 NAME => "winbindd",
1341 BINARY_PATH => $binary,
1342 FULL_CMD => [ @full_cmd ],
1343 LOG_FILE => $env_vars->{WINBINDD_TEST_LOG},
1345 if ($winbindd ne "yes") {
1346 $daemon_ctx->{SKIP_DAEMON} = 1;
1348 my $pid = Samba::fork_and_exec($self, $env_vars, $daemon_ctx, $STDIN_READER);
1350 $env_vars->{WINBINDD_TL_PID} = $pid;
1351 write_pid($env_vars, "winbindd", $pid);
1353 $binary = Samba::bindir_path($self, "smbd");
1354 @full_cmd = $self->make_bin_cmd($binary, $env_vars,
1355 $ENV{SMBD_OPTIONS}, $ENV{SMBD_VALGRIND},
1356 $ENV{SMBD_DONT_LOG_STDOUT});
1358 # fork and exec() smbd in the child process
1359 $daemon_ctx = {
1360 NAME => "smbd",
1361 BINARY_PATH => $binary,
1362 FULL_CMD => [ @full_cmd ],
1363 LOG_FILE => $env_vars->{SMBD_TEST_LOG},
1365 if ($smbd ne "yes") {
1366 $daemon_ctx->{SKIP_DAEMON} = 1;
1369 my $pid = Samba::fork_and_exec($self, $env_vars, $daemon_ctx, $STDIN_READER);
1371 $env_vars->{SMBD_TL_PID} = $pid;
1372 write_pid($env_vars, "smbd", $pid);
1374 # close the parent's read-end of the pipe
1375 close(STDIN_READER);
1377 return $self->wait_for_start($env_vars, $nmbd, $winbindd, $smbd);
1380 sub createuser($$$$$)
1382 my ($self, $username, $password, $conffile, $env) = @_;
1383 my $cmd = "UID_WRAPPER_ROOT=1 " . Samba::bindir_path($self, "smbpasswd")." -c $conffile -L -s -a $username > /dev/null";
1385 keys %$env;
1386 while(my($var, $val) = each %$env) {
1387 $cmd = "$var=\"$val\" $cmd";
1390 unless (open(PWD, "|$cmd")) {
1391 warn("Unable to set password for $username account\n$cmd");
1392 return undef;
1394 print PWD "$password\n$password\n";
1395 unless (close(PWD)) {
1396 warn("Unable to set password for $username account\n$cmd");
1397 return undef;
1401 sub provision($$$$$$$$$)
1403 my ($self, $prefix, $domain, $server, $password, $extra_options, $dc_server_ip, $dc_server_ipv6, $no_delete_prefix) = @_;
1406 ## setup the various environment variables we need
1409 my $samsid = Samba::random_domain_sid();
1410 my $swiface = Samba::get_interface($server);
1411 my %ret = ();
1412 my %createuser_env = ();
1413 my $server_ip = Samba::get_ipv4_addr($server);
1414 my $server_ipv6 = Samba::get_ipv6_addr($server);
1416 my $unix_name = ($ENV{USER} or $ENV{LOGNAME} or `PATH=/usr/ucb:$ENV{PATH} whoami`);
1417 chomp $unix_name;
1418 my $unix_uid = $>;
1419 my $unix_gids_str = $);
1420 my @unix_gids = split(" ", $unix_gids_str);
1422 my $prefix_abs = abs_path($prefix);
1423 my $bindir_abs = abs_path($self->{bindir});
1425 my @dirs = ();
1427 my $shrdir="$prefix_abs/share";
1428 push(@dirs,$shrdir);
1430 my $libdir="$prefix_abs/lib";
1431 push(@dirs,$libdir);
1433 my $piddir="$prefix_abs/pid";
1434 push(@dirs,$piddir);
1436 my $privatedir="$prefix_abs/private";
1437 push(@dirs,$privatedir);
1439 my $binddnsdir = "$prefix_abs/bind-dns";
1440 push(@dirs, $binddnsdir);
1442 my $lockdir="$prefix_abs/lockdir";
1443 push(@dirs,$lockdir);
1445 my $eventlogdir="$prefix_abs/lockdir/eventlog";
1446 push(@dirs,$eventlogdir);
1448 my $logdir="$prefix_abs/logs";
1449 push(@dirs,$logdir);
1451 my $driver32dir="$shrdir/W32X86";
1452 push(@dirs,$driver32dir);
1454 my $driver64dir="$shrdir/x64";
1455 push(@dirs,$driver64dir);
1457 my $driver40dir="$shrdir/WIN40";
1458 push(@dirs,$driver40dir);
1460 my $ro_shrdir="$shrdir/root-tmp";
1461 push(@dirs,$ro_shrdir);
1463 my $noperm_shrdir="$shrdir/noperm-tmp";
1464 push(@dirs,$noperm_shrdir);
1466 my $msdfs_shrdir="$shrdir/msdfsshare";
1467 push(@dirs,$msdfs_shrdir);
1469 my $msdfs_deeppath="$msdfs_shrdir/deeppath";
1470 push(@dirs,$msdfs_deeppath);
1472 my $badnames_shrdir="$shrdir/badnames";
1473 push(@dirs,$badnames_shrdir);
1475 my $lease1_shrdir="$shrdir/SMB2_10";
1476 push(@dirs,$lease1_shrdir);
1478 my $lease2_shrdir="$shrdir/SMB3_00";
1479 push(@dirs,$lease2_shrdir);
1481 my $manglenames_shrdir="$shrdir/manglenames";
1482 push(@dirs,$manglenames_shrdir);
1484 my $widelinks_shrdir="$shrdir/widelinks";
1485 push(@dirs,$widelinks_shrdir);
1487 my $widelinks_linkdir="$shrdir/widelinks_foo";
1488 push(@dirs,$widelinks_linkdir);
1490 my $fsrvp_shrdir="$shrdir/fsrvp";
1491 push(@dirs,$fsrvp_shrdir);
1493 my $shadow_tstdir="$shrdir/shadow";
1494 push(@dirs,$shadow_tstdir);
1495 my $shadow_mntdir="$shadow_tstdir/mount";
1496 push(@dirs,$shadow_mntdir);
1497 my $shadow_basedir="$shadow_mntdir/base";
1498 push(@dirs,$shadow_basedir);
1499 my $shadow_shrdir="$shadow_basedir/share";
1500 push(@dirs,$shadow_shrdir);
1502 my $nosymlinks_shrdir="$shrdir/nosymlinks";
1503 push(@dirs,$nosymlinks_shrdir);
1505 my $local_symlinks_shrdir="$shrdir/local_symlinks";
1506 push(@dirs,$local_symlinks_shrdir);
1508 # this gets autocreated by winbindd
1509 my $wbsockdir="$prefix_abs/winbindd";
1511 my $nmbdsockdir="$prefix_abs/nmbd";
1512 unlink($nmbdsockdir);
1515 ## create the test directory layout
1517 die ("prefix_abs = ''") if $prefix_abs eq "";
1518 die ("prefix_abs = '/'") if $prefix_abs eq "/";
1520 mkdir($prefix_abs, 0777);
1521 print "CREATE TEST ENVIRONMENT IN '$prefix'...";
1522 if (not defined($no_delete_prefix) or not $no_delete_prefix) {
1523 system("rm -rf $prefix_abs/*");
1525 mkdir($_, 0777) foreach(@dirs);
1527 my $fs_specific_conf = $self->get_fs_specific_conf($shrdir);
1530 ## lockdir and piddir must be 0755
1532 chmod 0755, $lockdir;
1533 chmod 0755, $piddir;
1537 ## Create a directory without permissions to enter
1539 chmod 0000, $noperm_shrdir;
1542 ## create ro and msdfs share layout
1545 chmod 0755, $ro_shrdir;
1546 my $unreadable_file = "$ro_shrdir/unreadable_file";
1547 unless (open(UNREADABLE_FILE, ">$unreadable_file")) {
1548 warn("Unable to open $unreadable_file");
1549 return undef;
1551 close(UNREADABLE_FILE);
1552 chmod 0600, $unreadable_file;
1554 my $msdfs_target = "$ro_shrdir/msdfs-target";
1555 unless (open(MSDFS_TARGET, ">$msdfs_target")) {
1556 warn("Unable to open $msdfs_target");
1557 return undef;
1559 close(MSDFS_TARGET);
1560 chmod 0666, $msdfs_target;
1561 symlink "msdfs:$server_ip\\ro-tmp,$server_ipv6\\ro-tmp",
1562 "$msdfs_shrdir/msdfs-src1";
1563 symlink "msdfs:$server_ipv6\\ro-tmp", "$msdfs_shrdir/deeppath/msdfs-src2";
1566 ## create bad names in $badnames_shrdir
1568 ## (An invalid name, would be mangled to 8.3).
1569 my $badname_target = "$badnames_shrdir/\340|\231\216\377\177";
1570 unless (open(BADNAME_TARGET, ">$badname_target")) {
1571 warn("Unable to open $badname_target");
1572 return undef;
1574 close(BADNAME_TARGET);
1575 chmod 0666, $badname_target;
1577 ## (A bad name, would not be mangled to 8.3).
1578 my $badname_target = "$badnames_shrdir/\240\276\346\327\377\177";
1579 unless (open(BADNAME_TARGET, ">$badname_target")) {
1580 warn("Unable to open $badname_target");
1581 return undef;
1583 close(BADNAME_TARGET);
1584 chmod 0666, $badname_target;
1586 ## (A bad good name).
1587 my $badname_target = "$badnames_shrdir/blank.txt";
1588 unless (open(BADNAME_TARGET, ">$badname_target")) {
1589 warn("Unable to open $badname_target");
1590 return undef;
1592 close(BADNAME_TARGET);
1593 chmod 0666, $badname_target;
1596 ## create mangleable directory names in $manglenames_shrdir
1598 my $manglename_target = "$manglenames_shrdir/foo:bar";
1599 mkdir($manglename_target, 0777);
1602 ## create symlinks for widelinks tests.
1604 my $widelinks_target = "$widelinks_linkdir/target";
1605 unless (open(WIDELINKS_TARGET, ">$widelinks_target")) {
1606 warn("Unable to open $widelinks_target");
1607 return undef;
1609 close(WIDELINKS_TARGET);
1610 chmod 0666, $widelinks_target;
1612 ## This link should get ACCESS_DENIED
1614 symlink "$widelinks_target", "$widelinks_shrdir/source";
1616 ## This link should be allowed
1618 symlink "$widelinks_shrdir", "$widelinks_shrdir/dot";
1620 my $conffile="$libdir/server.conf";
1621 my $dfqconffile="$libdir/dfq.conf";
1622 my $errorinjectconf="$libdir/error_inject.conf";
1623 my $delayinjectconf="$libdir/delay_inject.conf";
1624 my $globalinjectconf="$libdir/global_inject.conf";
1626 my $nss_wrapper_pl = "$ENV{PERL} $self->{srcdir}/third_party/nss_wrapper/nss_wrapper.pl";
1627 my $nss_wrapper_passwd = "$privatedir/passwd";
1628 my $nss_wrapper_group = "$privatedir/group";
1629 my $nss_wrapper_hosts = "$ENV{SELFTEST_PREFIX}/hosts";
1630 my $resolv_conf = "$privatedir/resolv.conf";
1631 my $dns_host_file = "$ENV{SELFTEST_PREFIX}/dns_host_file";
1633 my $mod_printer_pl = "$ENV{PERL} $self->{srcdir}/source3/script/tests/printing/modprinter.pl";
1635 my $fake_snap_pl = "$ENV{PERL} $self->{srcdir}/source3/script/tests/fake_snap.pl";
1637 my @eventlog_list = ("dns server", "application");
1640 ## calculate uids and gids
1643 my ($max_uid, $max_gid);
1644 my ($uid_nobody, $uid_root, $uid_pdbtest, $uid_pdbtest2, $uid_userdup);
1645 my ($uid_pdbtest_wkn);
1646 my ($uid_smbget);
1647 my ($uid_force_user);
1648 my ($gid_nobody, $gid_nogroup, $gid_root, $gid_domusers, $gid_domadmins);
1649 my ($gid_userdup, $gid_everyone);
1650 my ($gid_force_user);
1651 my ($uid_user1);
1652 my ($uid_user2);
1653 my ($uid_gooduser);
1654 my ($uid_eviluser);
1655 my ($uid_slashuser);
1657 if ($unix_uid < 0xffff - 13) {
1658 $max_uid = 0xffff;
1659 } else {
1660 $max_uid = $unix_uid;
1663 $uid_root = $max_uid - 1;
1664 $uid_nobody = $max_uid - 2;
1665 $uid_pdbtest = $max_uid - 3;
1666 $uid_pdbtest2 = $max_uid - 4;
1667 $uid_userdup = $max_uid - 5;
1668 $uid_pdbtest_wkn = $max_uid - 6;
1669 $uid_force_user = $max_uid - 7;
1670 $uid_smbget = $max_uid - 8;
1671 $uid_user1 = $max_uid - 9;
1672 $uid_user2 = $max_uid - 10;
1673 $uid_gooduser = $max_uid - 11;
1674 $uid_eviluser = $max_uid - 12;
1675 $uid_slashuser = $max_uid - 13;
1677 if ($unix_gids[0] < 0xffff - 8) {
1678 $max_gid = 0xffff;
1679 } else {
1680 $max_gid = $unix_gids[0];
1683 $gid_nobody = $max_gid - 1;
1684 $gid_nogroup = $max_gid - 2;
1685 $gid_root = $max_gid - 3;
1686 $gid_domusers = $max_gid - 4;
1687 $gid_domadmins = $max_gid - 5;
1688 $gid_userdup = $max_gid - 6;
1689 $gid_everyone = $max_gid - 7;
1690 $gid_force_user = $max_gid - 8;
1693 ## create conffile
1696 unless (open(CONF, ">$conffile")) {
1697 warn("Unable to open $conffile");
1698 return undef;
1701 my $interfaces = Samba::get_interfaces_config($server);
1703 print CONF "
1704 [global]
1705 netbios name = $server
1706 interfaces = $interfaces
1707 bind interfaces only = yes
1708 panic action = cd $self->{srcdir} && $self->{srcdir}/selftest/gdb_backtrace %d %\$(MAKE_TEST_BINARY)
1709 smbd:suicide mode = yes
1711 client min protocol = CORE
1712 server min protocol = LANMAN1
1714 workgroup = $domain
1716 private dir = $privatedir
1717 binddns dir = $binddnsdir
1718 pid directory = $piddir
1719 lock directory = $lockdir
1720 log file = $logdir/log.\%m
1721 log level = 1
1722 debug pid = yes
1723 max log size = 0
1725 state directory = $lockdir
1726 cache directory = $lockdir
1728 passdb backend = tdbsam
1730 time server = yes
1732 add user script = $nss_wrapper_pl --passwd_path $nss_wrapper_passwd --type passwd --action add --name %u --gid $gid_nogroup
1733 add group script = $nss_wrapper_pl --group_path $nss_wrapper_group --type group --action add --name %g
1734 add machine script = $nss_wrapper_pl --passwd_path $nss_wrapper_passwd --type passwd --action add --name %u --gid $gid_nogroup
1735 add user to group script = $nss_wrapper_pl --passwd_path $nss_wrapper_passwd --type member --action add --member %u --name %g --group_path $nss_wrapper_group
1736 delete user script = $nss_wrapper_pl --passwd_path $nss_wrapper_passwd --type passwd --action delete --name %u
1737 delete group script = $nss_wrapper_pl --group_path $nss_wrapper_group --type group --action delete --name %g
1738 delete user from group script = $nss_wrapper_pl --passwd_path $nss_wrapper_passwd --type member --action delete --member %u --name %g --group_path $nss_wrapper_group
1740 addprinter command = $mod_printer_pl -a -s $conffile --
1741 deleteprinter command = $mod_printer_pl -d -s $conffile --
1743 eventlog list = application \"dns server\"
1745 kernel oplocks = no
1746 kernel change notify = no
1748 logging = file
1749 printing = bsd
1750 printcap name = /dev/null
1752 winbindd socket directory = $wbsockdir
1753 nmbd:socket dir = $nmbdsockdir
1754 idmap config * : range = 100000-200000
1755 winbind enum users = yes
1756 winbind enum groups = yes
1757 winbind separator = /
1758 include system krb5 conf = no
1760 # min receivefile size = 4000
1762 read only = no
1764 smbd:sharedelay = 100000
1765 smbd:writetimeupdatedelay = 500000
1766 map hidden = no
1767 map system = no
1768 map readonly = no
1769 store dos attributes = yes
1770 create mask = 755
1771 dos filemode = yes
1772 strict rename = yes
1773 strict sync = yes
1774 mangled names = yes
1775 vfs objects = acl_xattr fake_acls xattr_tdb streams_depot time_audit full_audit
1777 full_audit:syslog = no
1778 full_audit:success = none
1779 full_audit:failure = none
1781 printing = vlp
1782 print command = $bindir_abs/vlp tdbfile=$lockdir/vlp.tdb print %p %s
1783 lpq command = $bindir_abs/vlp tdbfile=$lockdir/vlp.tdb lpq %p
1784 lp rm command = $bindir_abs/vlp tdbfile=$lockdir/vlp.tdb lprm %p %j
1785 lp pause command = $bindir_abs/vlp tdbfile=$lockdir/vlp.tdb lppause %p %j
1786 lp resume command = $bindir_abs/vlp tdbfile=$lockdir/vlp.tdb lpresume %p %j
1787 queue pause command = $bindir_abs/vlp tdbfile=$lockdir/vlp.tdb queuepause %p
1788 queue resume command = $bindir_abs/vlp tdbfile=$lockdir/vlp.tdb queueresume %p
1789 lpq cache time = 0
1790 print notify backchannel = yes
1792 ncalrpc dir = $prefix_abs/ncalrpc
1794 # The samba3.blackbox.smbclient_s3 test uses this to test that
1795 # sending messages works, and that the %m sub works.
1796 message command = mv %s $shrdir/message.%m
1798 # fsrvp server requires registry shares
1799 registry shares = yes
1801 # Used by RPC SRVSVC tests
1802 add share command = $bindir_abs/smbaddshare
1803 change share command = $bindir_abs/smbchangeshare
1804 delete share command = $bindir_abs/smbdeleteshare
1806 # fruit:copyfile is a global option
1807 fruit:copyfile = yes
1809 #this does not mean that we use non-secure test env,
1810 #it just means we ALLOW one to be configured.
1811 allow insecure wide links = yes
1813 include = $globalinjectconf
1815 # Begin extra options
1816 $extra_options
1817 # End extra options
1819 #Include user defined custom parameters if set
1822 if (defined($ENV{INCLUDE_CUSTOM_CONF})) {
1823 print CONF "\t$ENV{INCLUDE_CUSTOM_CONF}\n";
1826 print CONF "
1827 [tmp]
1828 path = $shrdir
1829 comment = smb username is [%U]
1830 [tmpsort]
1831 path = $shrdir
1832 comment = Load dirsort module
1833 vfs objects = dirsort acl_xattr fake_acls xattr_tdb streams_depot
1834 [tmpenc]
1835 path = $shrdir
1836 comment = encrypt smb username is [%U]
1837 smb encrypt = required
1838 vfs objects = dirsort
1839 [tmpguest]
1840 path = $shrdir
1841 guest ok = yes
1842 [guestonly]
1843 path = $shrdir
1844 guest only = yes
1845 guest ok = yes
1846 [forceuser]
1847 path = $shrdir
1848 force user = $unix_name
1849 guest ok = yes
1850 [forceuser_unixonly]
1851 comment = force a user with unix user SID and group SID
1852 path = $shrdir
1853 force user = pdbtest
1854 guest ok = yes
1855 [forceuser_wkngroup]
1856 comment = force a user with well-known group SID
1857 path = $shrdir
1858 force user = pdbtest_wkn
1859 guest ok = yes
1860 [forcegroup]
1861 path = $shrdir
1862 force group = nogroup
1863 guest ok = yes
1864 [ro-tmp]
1865 path = $ro_shrdir
1866 guest ok = yes
1867 [noperm]
1868 path = $noperm_shrdir
1869 wide links = yes
1870 guest ok = yes
1871 [write-list-tmp]
1872 path = $shrdir
1873 read only = yes
1874 write list = $unix_name
1875 [valid-users-tmp]
1876 path = $shrdir
1877 valid users = $unix_name
1878 access based share enum = yes
1879 [msdfs-share]
1880 path = $msdfs_shrdir
1881 msdfs root = yes
1882 msdfs shuffle referrals = yes
1883 guest ok = yes
1884 [hideunread]
1885 copy = tmp
1886 hide unreadable = yes
1887 [tmpcase]
1888 copy = tmp
1889 case sensitive = yes
1890 [hideunwrite]
1891 copy = tmp
1892 hide unwriteable files = yes
1893 [durable]
1894 copy = tmp
1895 kernel share modes = no
1896 kernel oplocks = no
1897 posix locking = no
1898 [fs_specific]
1899 copy = tmp
1900 $fs_specific_conf
1901 [print1]
1902 copy = tmp
1903 printable = yes
1905 [print2]
1906 copy = print1
1907 [print3]
1908 copy = print1
1909 default devmode = no
1910 [lp]
1911 copy = print1
1913 [nfs4acl_simple_40]
1914 path = $shrdir
1915 comment = smb username is [%U]
1916 nfs4:mode = simple
1917 nfs4acl_xattr:version = 40
1918 vfs objects = nfs4acl_xattr xattr_tdb
1920 [nfs4acl_special_40]
1921 path = $shrdir
1922 comment = smb username is [%U]
1923 nfs4:mode = special
1924 nfs4acl_xattr:version = 40
1925 vfs objects = nfs4acl_xattr xattr_tdb
1927 [nfs4acl_simple_41]
1928 path = $shrdir
1929 comment = smb username is [%U]
1930 nfs4:mode = simple
1931 vfs objects = nfs4acl_xattr xattr_tdb
1933 [nfs4acl_xdr_40]
1934 path = $shrdir
1935 comment = smb username is [%U]
1936 vfs objects = nfs4acl_xattr xattr_tdb
1937 nfs4:mode = simple
1938 nfs4acl_xattr:encoding = xdr
1939 nfs4acl_xattr:version = 40
1941 [nfs4acl_xdr_41]
1942 path = $shrdir
1943 comment = smb username is [%U]
1944 vfs objects = nfs4acl_xattr xattr_tdb
1945 nfs4:mode = simple
1946 nfs4acl_xattr:encoding = xdr
1947 nfs4acl_xattr:version = 41
1949 [nfs4acl_nfs_40]
1950 path = $shrdir
1951 comment = smb username is [%U]
1952 vfs objects = nfs4acl_xattr xattr_tdb
1953 nfs4:mode = simple
1954 nfs4acl_xattr:encoding = nfs
1955 nfs4acl_xattr:version = 40
1956 nfs4acl_xattr:xattr_name = security.nfs4acl_xdr
1958 [nfs4acl_nfs_41]
1959 path = $shrdir
1960 comment = smb username is [%U]
1961 vfs objects = nfs4acl_xattr xattr_tdb
1962 nfs4:mode = simple
1963 nfs4acl_xattr:encoding = nfs
1964 nfs4acl_xattr:version = 41
1965 nfs4acl_xattr:xattr_name = security.nfs4acl_xdr
1967 [xcopy_share]
1968 path = $shrdir
1969 comment = smb username is [%U]
1970 create mask = 777
1971 force create mode = 777
1972 [posix_share]
1973 path = $shrdir
1974 comment = smb username is [%U]
1975 create mask = 0777
1976 force create mode = 0
1977 directory mask = 0777
1978 force directory mode = 0
1979 vfs objects = xattr_tdb streams_depot
1980 [aio]
1981 copy = tmp
1982 aio read size = 1
1983 aio write size = 1
1985 [print\$]
1986 copy = tmp
1988 [vfs_fruit]
1989 path = $shrdir
1990 vfs objects = catia fruit streams_xattr acl_xattr xattr_tdb
1991 fruit:resource = file
1992 fruit:metadata = netatalk
1993 fruit:locking = netatalk
1994 fruit:encoding = native
1995 fruit:veto_appledouble = no
1997 [vfs_fruit_xattr]
1998 path = $shrdir
1999 # This is used by vfs.fruit tests that require real fs xattr
2000 vfs objects = catia fruit streams_xattr acl_xattr
2001 fruit:resource = file
2002 fruit:metadata = netatalk
2003 fruit:locking = netatalk
2004 fruit:encoding = native
2005 fruit:veto_appledouble = no
2007 [vfs_fruit_metadata_stream]
2008 path = $shrdir
2009 vfs objects = fruit streams_xattr acl_xattr xattr_tdb
2010 fruit:resource = file
2011 fruit:metadata = stream
2012 fruit:veto_appledouble = no
2014 [vfs_fruit_stream_depot]
2015 path = $shrdir
2016 vfs objects = fruit streams_depot acl_xattr xattr_tdb
2017 fruit:resource = stream
2018 fruit:metadata = stream
2019 fruit:veto_appledouble = no
2021 [vfs_wo_fruit]
2022 path = $shrdir
2023 vfs objects = streams_xattr acl_xattr xattr_tdb
2025 [vfs_wo_fruit_stream_depot]
2026 path = $shrdir
2027 vfs objects = streams_depot acl_xattr xattr_tdb
2029 [vfs_fruit_timemachine]
2030 path = $shrdir
2031 vfs objects = fruit streams_xattr acl_xattr xattr_tdb
2032 fruit:resource = file
2033 fruit:metadata = stream
2034 fruit:time machine = yes
2035 fruit:time machine max size = 32K
2037 [vfs_fruit_wipe_intentionally_left_blank_rfork]
2038 path = $shrdir
2039 vfs objects = fruit streams_xattr acl_xattr xattr_tdb
2040 fruit:resource = file
2041 fruit:metadata = stream
2042 fruit:wipe_intentionally_left_blank_rfork = true
2043 fruit:delete_empty_adfiles = false
2044 fruit:veto_appledouble = no
2046 [vfs_fruit_delete_empty_adfiles]
2047 path = $shrdir
2048 vfs objects = fruit streams_xattr acl_xattr xattr_tdb
2049 fruit:resource = file
2050 fruit:metadata = stream
2051 fruit:wipe_intentionally_left_blank_rfork = true
2052 fruit:delete_empty_adfiles = true
2053 fruit:veto_appledouble = no
2055 [vfs_fruit_zero_fileid]
2056 path = $shrdir
2057 vfs objects = fruit streams_xattr acl_xattr xattr_tdb
2058 fruit:resource = file
2059 fruit:metadata = stream
2060 fruit:zero_file_id=yes
2062 [badname-tmp]
2063 path = $badnames_shrdir
2064 guest ok = yes
2066 [manglenames_share]
2067 path = $manglenames_shrdir
2068 guest ok = yes
2070 [dynamic_share]
2071 path = $shrdir/%R
2072 guest ok = yes
2074 [widelinks_share]
2075 path = $widelinks_shrdir
2076 wide links = no
2077 guest ok = yes
2079 [fsrvp_share]
2080 path = $fsrvp_shrdir
2081 comment = fake shapshots using rsync
2082 vfs objects = shell_snap shadow_copy2
2083 shell_snap:check path command = $fake_snap_pl --check
2084 shell_snap:create command = $fake_snap_pl --create
2085 shell_snap:delete command = $fake_snap_pl --delete
2086 # a relative path here fails, the snapshot dir is no longer found
2087 shadow:snapdir = $fsrvp_shrdir/.snapshots
2089 [shadow1]
2090 path = $shadow_shrdir
2091 comment = previous versions snapshots under mount point
2092 vfs objects = shadow_copy2
2093 shadow:mountpoint = $shadow_mntdir
2095 [shadow2]
2096 path = $shadow_shrdir
2097 comment = previous versions snapshots outside mount point
2098 vfs objects = shadow_copy2
2099 shadow:mountpoint = $shadow_mntdir
2100 shadow:snapdir = $shadow_tstdir/.snapshots
2102 [shadow3]
2103 path = $shadow_shrdir
2104 comment = previous versions with subvolume snapshots, snapshots under base dir
2105 vfs objects = shadow_copy2
2106 shadow:mountpoint = $shadow_mntdir
2107 shadow:basedir = $shadow_basedir
2108 shadow:snapdir = $shadow_basedir/.snapshots
2110 [shadow4]
2111 path = $shadow_shrdir
2112 comment = previous versions with subvolume snapshots, snapshots outside mount point
2113 vfs objects = shadow_copy2
2114 shadow:mountpoint = $shadow_mntdir
2115 shadow:basedir = $shadow_basedir
2116 shadow:snapdir = $shadow_tstdir/.snapshots
2118 [shadow5]
2119 path = $shadow_shrdir
2120 comment = previous versions at volume root snapshots under mount point
2121 vfs objects = shadow_copy2
2122 shadow:mountpoint = $shadow_shrdir
2124 [shadow6]
2125 path = $shadow_shrdir
2126 comment = previous versions at volume root snapshots outside mount point
2127 vfs objects = shadow_copy2
2128 shadow:mountpoint = $shadow_shrdir
2129 shadow:snapdir = $shadow_tstdir/.snapshots
2131 [shadow7]
2132 path = $shadow_shrdir
2133 comment = previous versions snapshots everywhere
2134 vfs objects = shadow_copy2
2135 shadow:mountpoint = $shadow_mntdir
2136 shadow:snapdirseverywhere = yes
2138 [shadow8]
2139 path = $shadow_shrdir
2140 comment = previous versions using snapsharepath
2141 vfs objects = shadow_copy2
2142 shadow:mountpoint = $shadow_mntdir
2143 shadow:snapdir = $shadow_tstdir/.snapshots
2144 shadow:snapsharepath = share
2146 [shadow_fmt0]
2147 comment = Testing shadow:format with default option
2148 vfs object = shadow_copy2
2149 path = $shadow_shrdir
2150 read only = no
2151 guest ok = yes
2152 shadow:mountpoint = $shadow_mntdir
2153 shadow:basedir = $shadow_basedir
2154 shadow:snapdir = $shadow_basedir/.snapshots
2155 shadow:format = \@GMT-%Y.%m.%d-%H.%M.%S
2157 [shadow_fmt1]
2158 comment = Testing shadow:format with only date component
2159 vfs object = shadow_copy2
2160 path = $shadow_shrdir
2161 read only = no
2162 guest ok = yes
2163 shadow:mountpoint = $shadow_mntdir
2164 shadow:basedir = $shadow_basedir
2165 shadow:snapdir = $shadow_basedir/.snapshots
2166 shadow:format = \@GMT-%Y-%m-%d
2168 [shadow_fmt2]
2169 comment = Testing shadow:format with some hardcoded prefix
2170 vfs object = shadow_copy2
2171 path = $shadow_shrdir
2172 read only = no
2173 guest ok = yes
2174 shadow:mountpoint = $shadow_mntdir
2175 shadow:basedir = $shadow_basedir
2176 shadow:snapdir = $shadow_basedir/.snapshots
2177 shadow:format = snap\@GMT-%Y.%m.%d-%H.%M.%S
2179 [shadow_fmt3]
2180 comment = Testing shadow:format with modified format
2181 vfs object = shadow_copy2
2182 path = $shadow_shrdir
2183 read only = no
2184 guest ok = yes
2185 shadow:mountpoint = $shadow_mntdir
2186 shadow:basedir = $shadow_basedir
2187 shadow:snapdir = $shadow_basedir/.snapshots
2188 shadow:format = \@GMT-%Y.%m.%d-%H_%M_%S-snap
2190 [shadow_fmt4]
2191 comment = Testing shadow:snapprefix regex
2192 vfs object = shadow_copy2
2193 path = $shadow_shrdir
2194 read only = no
2195 guest ok = yes
2196 shadow:mountpoint = $shadow_mntdir
2197 shadow:basedir = $shadow_basedir
2198 shadow:snapdir = $shadow_basedir/.snapshots
2199 shadow:snapprefix = \^s[a-z]*p\$
2200 shadow:format = _GMT-%Y.%m.%d-%H.%M.%S
2202 [shadow_fmt5]
2203 comment = Testing shadow:snapprefix with delim regex
2204 vfs object = shadow_copy2
2205 path = $shadow_shrdir
2206 read only = no
2207 guest ok = yes
2208 shadow:mountpoint = $shadow_mntdir
2209 shadow:basedir = $shadow_basedir
2210 shadow:snapdir = $shadow_basedir/.snapshots
2211 shadow:delimiter = \@GMT
2212 shadow:snapprefix = [a-z]*
2213 shadow:format = \@GMT-%Y.%m.%d-%H.%M.%S
2215 [shadow_wl]
2216 path = $shadow_shrdir
2217 comment = previous versions with wide links allowed
2218 vfs objects = shadow_copy2
2219 shadow:mountpoint = $shadow_mntdir
2220 wide links = yes
2222 [shadow_write]
2223 path = $shadow_tstdir
2224 comment = previous versions snapshots under mount point
2225 vfs objects = shadow_copy2 streams_xattr error_inject
2226 aio write size = 0
2227 error_inject:pwrite = EBADF
2228 shadow:mountpoint = $shadow_tstdir
2230 [dfq]
2231 path = $shrdir/dfree
2232 vfs objects = acl_xattr fake_acls xattr_tdb fake_dfq
2233 admin users = $unix_name
2234 include = $dfqconffile
2235 [dfq_cache]
2236 path = $shrdir/dfree
2237 vfs objects = acl_xattr fake_acls xattr_tdb fake_dfq
2238 admin users = $unix_name
2239 include = $dfqconffile
2240 dfree cache time = 60
2241 [dfq_owner]
2242 path = $shrdir/dfree
2243 vfs objects = acl_xattr fake_acls xattr_tdb fake_dfq
2244 inherit owner = yes
2245 include = $dfqconffile
2246 [quotadir]
2247 path = $shrdir/quota
2248 admin users = $unix_name
2250 [acl_xattr_ign_sysacl_posix]
2251 copy = tmp
2252 acl_xattr:ignore system acls = yes
2253 acl_xattr:default acl style = posix
2254 [acl_xattr_ign_sysacl_windows]
2255 copy = tmp
2256 acl_xattr:ignore system acls = yes
2257 acl_xattr:default acl style = windows
2259 [mangle_illegal]
2260 copy = tmp
2261 mangled names = illegal
2263 [nosymlinks]
2264 copy = tmp
2265 path = $nosymlinks_shrdir
2266 follow symlinks = no
2268 [local_symlinks]
2269 copy = tmp
2270 path = $local_symlinks_shrdir
2271 follow symlinks = yes
2273 [kernel_oplocks]
2274 copy = tmp
2275 kernel oplocks = yes
2276 vfs objects = streams_xattr xattr_tdb
2278 [streams_xattr]
2279 copy = tmp
2280 vfs objects = streams_xattr xattr_tdb
2282 [compound_find]
2283 copy = tmp
2284 smbd:find async delay usec = 10000
2285 [error_inject]
2286 copy = tmp
2287 vfs objects = error_inject
2288 include = $errorinjectconf
2290 [delay_inject]
2291 copy = tmp
2292 vfs objects = delay_inject
2293 kernel share modes = no
2294 kernel oplocks = no
2295 posix locking = no
2296 include = $delayinjectconf
2298 [aio_delay_inject]
2299 copy = tmp
2300 vfs objects = delay_inject
2301 delay_inject:pread_send = 2000
2302 delay_inject:pwrite_send = 2000
2304 [brl_delay_inject1]
2305 copy = tmp
2306 vfs objects = delay_inject
2307 delay_inject:brl_lock_windows = 90
2308 delay_inject:brl_lock_windows_use_timer = yes
2310 [brl_delay_inject2]
2311 copy = tmp
2312 vfs objects = delay_inject
2313 delay_inject:brl_lock_windows = 90
2314 delay_inject:brl_lock_windows_use_timer = no
2316 [delete_readonly]
2317 path = $prefix_abs/share
2318 delete readonly = yes
2320 close(CONF);
2322 my $net = Samba::bindir_path($self, "net");
2323 my $cmd = "";
2324 $cmd .= "SMB_CONF_PATH=\"$conffile\" ";
2325 $cmd .= "$net setlocalsid $samsid";
2327 if (system($cmd) != 0) {
2328 warn("Join failed\n$cmd");
2329 return undef;
2332 unless (open(ERRORCONF, ">$errorinjectconf")) {
2333 warn("Unable to open $errorinjectconf");
2334 return undef;
2336 close(ERRORCONF);
2338 unless (open(DELAYCONF, ">$delayinjectconf")) {
2339 warn("Unable to open $delayinjectconf");
2340 return undef;
2342 close(DELAYCONF);
2344 unless (open(DFQCONF, ">$dfqconffile")) {
2345 warn("Unable to open $dfqconffile");
2346 return undef;
2348 close(DFQCONF);
2350 unless (open(DELAYCONF, ">$globalinjectconf")) {
2351 warn("Unable to open $globalinjectconf");
2352 return undef;
2354 close(DELAYCONF);
2357 ## create a test account
2360 unless (open(PASSWD, ">$nss_wrapper_passwd")) {
2361 warn("Unable to open $nss_wrapper_passwd");
2362 return undef;
2364 print PASSWD "nobody:x:$uid_nobody:$gid_nobody:nobody gecos:$prefix_abs:/bin/false
2365 $unix_name:x:$unix_uid:$unix_gids[0]:$unix_name gecos:$prefix_abs:/bin/false
2366 pdbtest:x:$uid_pdbtest:$gid_nogroup:pdbtest gecos:$prefix_abs:/bin/false
2367 pdbtest2:x:$uid_pdbtest2:$gid_nogroup:pdbtest gecos:$prefix_abs:/bin/false
2368 userdup:x:$uid_userdup:$gid_userdup:userdup gecos:$prefix_abs:/bin/false
2369 pdbtest_wkn:x:$uid_pdbtest_wkn:$gid_everyone:pdbtest_wkn gecos:$prefix_abs:/bin/false
2370 force_user:x:$uid_force_user:$gid_force_user:force user gecos:$prefix_abs:/bin/false
2371 smbget_user:x:$uid_smbget:$gid_domusers:smbget_user gecos:$prefix_abs:/bin/false
2372 user1:x:$uid_user1:$gid_nogroup:user1 gecos:$prefix_abs:/bin/false
2373 user2:x:$uid_user2:$gid_nogroup:user2 gecos:$prefix_abs:/bin/false
2374 gooduser:x:$uid_gooduser:$gid_domusers:gooduser gecos:$prefix_abs:/bin/false
2375 eviluser:x:$uid_eviluser:$gid_domusers:eviluser gecos::/bin/false
2376 slashuser:x:$uid_slashuser:$gid_domusers:slashuser gecos:/:/bin/false
2378 if ($unix_uid != 0) {
2379 print PASSWD "root:x:$uid_root:$gid_root:root gecos:$prefix_abs:/bin/false
2382 close(PASSWD);
2384 unless (open(GROUP, ">$nss_wrapper_group")) {
2385 warn("Unable to open $nss_wrapper_group");
2386 return undef;
2388 print GROUP "nobody:x:$gid_nobody:
2389 nogroup:x:$gid_nogroup:nobody
2390 $unix_name-group:x:$unix_gids[0]:
2391 domusers:X:$gid_domusers:
2392 domadmins:X:$gid_domadmins:
2393 userdup:x:$gid_userdup:$unix_name
2394 everyone:x:$gid_everyone:
2395 force_user:x:$gid_force_user:
2397 if ($unix_gids[0] != 0) {
2398 print GROUP "root:x:$gid_root:
2402 close(GROUP);
2404 ## hosts
2405 my $hostname = lc($server);
2406 unless (open(HOSTS, ">>$nss_wrapper_hosts")) {
2407 warn("Unable to open $nss_wrapper_hosts");
2408 return undef;
2410 print HOSTS "${server_ip} ${hostname}.samba.example.com ${hostname}\n";
2411 print HOSTS "${server_ipv6} ${hostname}.samba.example.com ${hostname}\n";
2412 close(HOSTS);
2414 ## hosts
2415 unless (open(RESOLV_CONF, ">$resolv_conf")) {
2416 warn("Unable to open $resolv_conf");
2417 return undef;
2419 if (defined($dc_server_ip) or defined($dc_server_ipv6)) {
2420 if (defined($dc_server_ip)) {
2421 print RESOLV_CONF "nameserver $dc_server_ip\n";
2423 if (defined($dc_server_ipv6)) {
2424 print RESOLV_CONF "nameserver $dc_server_ipv6\n";
2426 } else {
2427 print RESOLV_CONF "nameserver ${server_ip}\n";
2428 print RESOLV_CONF "nameserver ${server_ipv6}\n";
2430 close(RESOLV_CONF);
2432 foreach my $evlog (@eventlog_list) {
2433 my $evlogtdb = "$eventlogdir/$evlog.tdb";
2434 open(EVENTLOG, ">$evlogtdb") or die("Unable to open $evlogtdb");
2435 close(EVENTLOG);
2438 $createuser_env{NSS_WRAPPER_PASSWD} = $nss_wrapper_passwd;
2439 $createuser_env{NSS_WRAPPER_GROUP} = $nss_wrapper_group;
2440 $createuser_env{NSS_WRAPPER_HOSTS} = $nss_wrapper_hosts;
2441 $createuser_env{NSS_WRAPPER_HOSTNAME} = "${hostname}.samba.example.com";
2442 if ($ENV{SAMBA_DNS_FAKING}) {
2443 $createuser_env{RESOLV_WRAPPER_HOSTS} = $dns_host_file;
2444 } else {
2445 $createuser_env{RESOLV_WRAPPER_CONF} = $resolv_conf;
2448 createuser($self, $unix_name, $password, $conffile, \%createuser_env) || die("Unable to create user");
2449 createuser($self, "force_user", $password, $conffile, \%createuser_env) || die("Unable to create force_user");
2450 createuser($self, "smbget_user", $password, $conffile, \%createuser_env) || die("Unable to create smbget_user");
2451 createuser($self, "user1", $password, $conffile, \%createuser_env) || die("Unable to create user1");
2452 createuser($self, "user2", $password, $conffile, \%createuser_env) || die("Unable to create user2");
2453 createuser($self, "gooduser", $password, $conffile, \%createuser_env) || die("Unable to create gooduser");
2454 createuser($self, "eviluser", $password, $conffile, \%createuser_env) || die("Unable to create eviluser");
2455 createuser($self, "slashuser", $password, $conffile, \%createuser_env) || die("Unable to create slashuser");
2457 open(DNS_UPDATE_LIST, ">$prefix/dns_update_list") or die("Unable to open $$prefix/dns_update_list");
2458 print DNS_UPDATE_LIST "A $server. $server_ip\n";
2459 print DNS_UPDATE_LIST "AAAA $server. $server_ipv6\n";
2460 close(DNS_UPDATE_LIST);
2462 print "DONE\n";
2464 $ret{SERVER_IP} = $server_ip;
2465 $ret{SERVER_IPV6} = $server_ipv6;
2466 $ret{NMBD_TEST_LOG} = "$prefix/nmbd_test.log";
2467 $ret{NMBD_TEST_LOG_POS} = 0;
2468 $ret{WINBINDD_TEST_LOG} = "$prefix/winbindd_test.log";
2469 $ret{WINBINDD_TEST_LOG_POS} = 0;
2470 $ret{SMBD_TEST_LOG} = "$prefix/smbd_test.log";
2471 $ret{SMBD_TEST_LOG_POS} = 0;
2472 $ret{SERVERCONFFILE} = $conffile;
2473 $ret{TESTENV_DIR} = $prefix_abs;
2474 $ret{CONFIGURATION} ="-s $conffile";
2475 $ret{LOCK_DIR} = $lockdir;
2476 $ret{SERVER} = $server;
2477 $ret{USERNAME} = $unix_name;
2478 $ret{USERID} = $unix_uid;
2479 $ret{DOMAIN} = $domain;
2480 $ret{SAMSID} = $samsid;
2481 $ret{NETBIOSNAME} = $server;
2482 $ret{PASSWORD} = $password;
2483 $ret{PIDDIR} = $piddir;
2484 $ret{SELFTEST_WINBINDD_SOCKET_DIR} = $wbsockdir;
2485 $ret{NMBD_SOCKET_DIR} = $nmbdsockdir;
2486 $ret{SOCKET_WRAPPER_DEFAULT_IFACE} = $swiface;
2487 $ret{NSS_WRAPPER_PASSWD} = $nss_wrapper_passwd;
2488 $ret{NSS_WRAPPER_GROUP} = $nss_wrapper_group;
2489 $ret{NSS_WRAPPER_HOSTS} = $nss_wrapper_hosts;
2490 $ret{NSS_WRAPPER_HOSTNAME} = "${hostname}.samba.example.com";
2491 $ret{NSS_WRAPPER_MODULE_SO_PATH} = Samba::nss_wrapper_winbind_so_path($self);
2492 $ret{NSS_WRAPPER_MODULE_FN_PREFIX} = "winbind";
2493 if ($ENV{SAMBA_DNS_FAKING}) {
2494 $ret{RESOLV_WRAPPER_HOSTS} = $dns_host_file;
2495 } else {
2496 $ret{RESOLV_WRAPPER_CONF} = $resolv_conf;
2498 $ret{LOCAL_PATH} = "$shrdir";
2499 $ret{LOGDIR} = $logdir;
2502 # Avoid hitting system krb5.conf -
2503 # An env that needs Kerberos will reset this to the real
2504 # value.
2506 $ret{KRB5_CONFIG} = abs_path($prefix) . "/no_krb5.conf";
2508 # Define KRB5CCNAME for each environment we set up
2509 $ret{KRB5_CCACHE} = abs_path($prefix) . "/krb5ccache";
2510 $ENV{KRB5CCNAME} = $ret{KRB5_CCACHE};
2512 return \%ret;
2515 sub wait_for_start($$$$$)
2517 my ($self, $envvars, $nmbd, $winbindd, $smbd) = @_;
2518 my $cmd;
2519 my $netcmd;
2520 my $ret;
2522 if ($nmbd eq "yes") {
2523 my $count = 0;
2525 # give time for nbt server to register its names
2526 print "checking for nmbd\n";
2528 # This will return quickly when things are up, but be slow if we need to wait for (eg) SSL init
2529 my $nmblookup = Samba::bindir_path($self, "nmblookup");
2531 do {
2532 $ret = system("$nmblookup $envvars->{CONFIGURATION} $envvars->{SERVER}");
2533 if ($ret != 0) {
2534 sleep(1);
2535 } else {
2536 system("$nmblookup $envvars->{CONFIGURATION} -U $envvars->{SERVER_IP} __SAMBA__");
2537 system("$nmblookup $envvars->{CONFIGURATION} __SAMBA__");
2538 system("$nmblookup $envvars->{CONFIGURATION} -U 127.255.255.255 __SAMBA__");
2539 system("$nmblookup $envvars->{CONFIGURATION} -U $envvars->{SERVER_IP} $envvars->{SERVER}");
2541 $count++;
2542 } while ($ret != 0 && $count < 10);
2543 if ($count == 10) {
2544 print "NMBD not reachable after 10 retries\n";
2545 teardown_env($self, $envvars);
2546 return 0;
2550 if ($winbindd eq "yes") {
2551 print "checking for winbindd\n";
2552 my $count = 0;
2553 $cmd = "SELFTEST_WINBINDD_SOCKET_DIR='$envvars->{SELFTEST_WINBINDD_SOCKET_DIR}' ";
2554 $cmd .= "NSS_WRAPPER_PASSWD='$envvars->{NSS_WRAPPER_PASSWD}' ";
2555 $cmd .= "NSS_WRAPPER_GROUP='$envvars->{NSS_WRAPPER_GROUP}' ";
2556 $cmd .= Samba::bindir_path($self, "wbinfo") . " --ping-dc";
2558 do {
2559 if ($ret != 0) {
2560 $ret = system($cmd);
2561 sleep(1);
2563 $count++;
2564 } while ($ret != 0 && $count < 20);
2565 if ($count == 20) {
2566 print "WINBINDD not reachable after 20 seconds\n";
2567 teardown_env($self, $envvars);
2568 return 0;
2572 if ($smbd eq "yes") {
2573 # make sure smbd is also up set
2574 print "wait for smbd\n";
2576 my $count = 0;
2577 do {
2578 $ret = system(Samba::bindir_path($self, "smbclient") ." $envvars->{CONFIGURATION} -L $envvars->{SERVER} -U% -p 139");
2579 if ($ret != 0) {
2580 sleep(1);
2582 $count++
2583 } while ($ret != 0 && $count < 20);
2584 if ($count == 20) {
2585 print "SMBD failed to start up in a reasonable time (20sec)\n";
2586 teardown_env($self, $envvars);
2587 return 0;
2591 # Ensure we have domain users mapped.
2592 $netcmd = "NSS_WRAPPER_PASSWD='$envvars->{NSS_WRAPPER_PASSWD}' ";
2593 $netcmd .= "NSS_WRAPPER_GROUP='$envvars->{NSS_WRAPPER_GROUP}' ";
2594 $netcmd .= Samba::bindir_path($self, "net") ." $envvars->{CONFIGURATION} ";
2596 $cmd = $netcmd . "groupmap delete ntgroup=domusers";
2597 $ret = system($cmd);
2599 $cmd = $netcmd . "groupmap add rid=513 unixgroup=domusers type=domain";
2600 $ret = system($cmd);
2601 if ($ret != 0) {
2602 print("\"$cmd\" failed\n");
2603 return 1;
2606 $cmd = $netcmd . "groupmap delete ntgroup=domadmins";
2607 $ret = system($cmd);
2609 $cmd = $netcmd . "groupmap add rid=512 unixgroup=domadmins type=domain";
2610 $ret = system($cmd);
2611 if ($ret != 0) {
2612 print("\"$cmd\" failed\n");
2613 return 1;
2616 $cmd = $netcmd . "groupmap delete ntgroup=everyone";
2617 $ret = system($cmd);
2619 $cmd = $netcmd . "groupmap add sid=S-1-1-0 unixgroup=everyone type=builtin";
2620 $ret = system($cmd);
2621 if ($ret != 0) {
2622 print("\"$cmd\" failed\n");
2623 return 1;
2626 # note: creating builtin groups requires winbindd for the
2627 # unix id allocator
2628 my $create_builtin_users = "no";
2629 if ($winbindd eq "yes") {
2630 $cmd = "SELFTEST_WINBINDD_SOCKET_DIR='$envvars->{SELFTEST_WINBINDD_SOCKET_DIR}' ";
2631 $cmd .= "NSS_WRAPPER_PASSWD='$envvars->{NSS_WRAPPER_PASSWD}' ";
2632 $cmd .= "NSS_WRAPPER_GROUP='$envvars->{NSS_WRAPPER_GROUP}' ";
2633 $cmd .= Samba::bindir_path($self, "wbinfo") . " --sid-to-gid=S-1-5-32-545";
2634 my $wbinfo_out = qx($cmd 2>&1);
2635 if ($? != 0) {
2636 # wbinfo doesn't give us a better error code then
2637 # WBC_ERR_DOMAIN_NOT_FOUND, but at least that's
2638 # different then WBC_ERR_WINBIND_NOT_AVAILABLE
2639 if ($wbinfo_out !~ /WBC_ERR_DOMAIN_NOT_FOUND/) {
2640 print("Failed to run \"wbinfo --sid-to-gid=S-1-5-32-545\": $wbinfo_out");
2641 teardown_env($self, $envvars);
2642 return 0;
2644 $create_builtin_users = "yes";
2647 if ($create_builtin_users eq "yes") {
2648 $cmd = "SELFTEST_WINBINDD_SOCKET_DIR='$envvars->{SELFTEST_WINBINDD_SOCKET_DIR}' ";
2649 $cmd .= "NSS_WRAPPER_PASSWD='$envvars->{NSS_WRAPPER_PASSWD}' ";
2650 $cmd .= "NSS_WRAPPER_GROUP='$envvars->{NSS_WRAPPER_GROUP}' ";
2651 $cmd .= Samba::bindir_path($self, "net") . " $envvars->{CONFIGURATION} ";
2652 $cmd .= "sam createbuiltingroup Users";
2653 $ret = system($cmd);
2654 if ($ret != 0) {
2655 print "Failed to create BUILTIN\\Users group\n";
2656 teardown_env($self, $envvars);
2657 return 0;
2660 $cmd = Samba::bindir_path($self, "net") . " $envvars->{CONFIGURATION} ";
2661 $cmd .= "cache del IDMAP/SID2XID/S-1-5-32-545";
2662 system($cmd);
2664 $cmd = "SELFTEST_WINBINDD_SOCKET_DIR='$envvars->{SELFTEST_WINBINDD_SOCKET_DIR}' ";
2665 $cmd .= "NSS_WRAPPER_PASSWD='$envvars->{NSS_WRAPPER_PASSWD}' ";
2666 $cmd .= "NSS_WRAPPER_GROUP='$envvars->{NSS_WRAPPER_GROUP}' ";
2667 $cmd .= Samba::bindir_path($self, "wbinfo") . " --sid-to-gid=S-1-5-32-545";
2668 $ret = system($cmd);
2669 if ($ret != 0) {
2670 print "Missing \"BUILTIN\\Users\", did net sam createbuiltingroup Users fail?\n";
2671 teardown_env($self, $envvars);
2672 return 0;
2676 print $self->getlog_env($envvars);
2678 return 1;