3 '''automated testing of the steps of the Samba4 HOWTO'''
7 import wintest
, pexpect
9 def check_prerequesites(t
):
10 t
.info("Checking prerequesites")
11 t
.setvar('HOSTNAME', t
.cmd_output("hostname -s").strip())
13 raise Exception("You must run this script as root")
14 t
.putenv("KRB5_CONFIG", '${PREFIX}/private/krb5.conf')
15 t
.run_cmd('ifconfig ${INTERFACE} ${INTERFACE_NET} up')
16 if t
.getvar('INTERFACE_IPV6'):
17 t
.run_cmd('ifconfig ${INTERFACE} inet6 del ${INTERFACE_IPV6}/64', checkfail
=False)
18 t
.run_cmd('ifconfig ${INTERFACE} inet6 add ${INTERFACE_IPV6}/64 up')
24 t
.chdir('${SOURCETREE}/source4')
25 t
.putenv('CC', 'ccache gcc')
26 t
.run_cmd('make reconfigure || ./configure --enable-auto-reconfigure --enable-developer --prefix=${PREFIX} -C')
28 t
.run_cmd('rm -rf ${PREFIX}')
29 t
.run_cmd('make -j install')
32 def provision_s4(t
, func_level
="2008"):
33 '''provision s4 as a DC'''
34 t
.info('Provisioning s4')
36 t
.del_files(["var", "private"])
37 t
.run_cmd("rm -f etc/smb.conf")
38 provision
=['sbin/provision',
41 '--adminpass=${PASSWORD1}',
42 '--server-role=domain controller',
43 '--function-level=%s' % func_level
,
45 '--option=interfaces=${INTERFACE}',
46 '--host-ip=${INTERFACE_IP}',
47 '--option=bind interfaces only=yes',
48 '--option=rndc command=${RNDC} -c${PREFIX}/etc/rndc.conf']
49 if t
.getvar('INTERFACE_IPV6'):
50 provision
.append('--host-ip6=${INTERFACE_IPV6}')
52 t
.run_cmd('bin/samba-tool newuser testallowed ${PASSWORD1}')
53 t
.run_cmd('bin/samba-tool newuser testdenied ${PASSWORD1}')
54 t
.run_cmd('bin/samba-tool group addmembers "Allowed RODC Password Replication Group" testallowed')
59 t
.info('Starting Samba4')
61 t
.run_cmd('killall -9 -q samba smbd nmbd winbindd', checkfail
=False)
62 t
.run_cmd(['sbin/samba',
63 '--option', 'panic action=gnome-terminal -e "gdb --pid %PID%"'])
64 t
.port_wait("${INTERFACE_IP}", 139)
66 def test_smbclient(t
):
68 t
.info('Testing smbclient')
70 t
.cmd_contains("bin/smbclient --version", ["Version 4.0"])
71 t
.retry_cmd('bin/smbclient -L ${INTERFACE_IP} -U%', ["netlogon", "sysvol", "IPC Service"])
72 child
= t
.pexpect_spawn('bin/smbclient //${INTERFACE_IP}/netlogon -Uadministrator%${PASSWORD1}')
75 child
.expect("blocks available")
76 child
.sendline("mkdir testdir")
78 child
.sendline("cd testdir")
79 child
.expect('testdir')
80 child
.sendline("cd ..")
81 child
.sendline("rmdir testdir")
85 '''create some test shares'''
86 t
.info("Adding test shares")
88 t
.write_file("etc/smb.conf", '''
93 path = ${PREFIX}/var/profiles
97 t
.run_cmd("mkdir -p test")
98 t
.run_cmd("mkdir -p var/profiles")
101 def set_nameserver(t
, nameserver
):
102 '''set the nameserver in resolv.conf'''
103 t
.write_file("/etc/resolv.conf.wintest", '''
104 # Generated by wintest, the Samba v Windows automated testing system
107 # your original resolv.conf appears below:
108 ''' % t
.substitute(nameserver
))
109 child
= t
.pexpect_spawn("cat /etc/resolv.conf", crlf
=False)
110 i
= child
.expect(['your original resolv.conf appears below:', pexpect
.EOF
])
112 child
.expect(pexpect
.EOF
)
113 contents
= child
.before
.lstrip().replace('\r', '')
114 t
.write_file('/etc/resolv.conf.wintest', contents
, mode
='a')
115 t
.write_file('/etc/resolv.conf.wintest-bak', contents
)
116 t
.run_cmd("mv -f /etc/resolv.conf.wintest /etc/resolv.conf")
117 t
.resolv_conf_backup
= '/etc/resolv.conf.wintest-bak';
120 def restore_resolv_conf(t
):
121 '''restore the /etc/resolv.conf after testing is complete'''
122 if getattr(t
, 'resolv_conf_backup', False):
123 t
.info("restoring /etc/resolv.conf")
124 t
.run_cmd("mv -f %s /etc/resolv.conf" % t
.resolv_conf_backup
)
126 def rndc_cmd(t
, cmd
, checkfail
=True):
127 '''run a rndc command'''
128 t
.run_cmd("${RNDC} -c ${PREFIX}/etc/rndc.conf %s" % cmd
, checkfail
=checkfail
)
132 '''restart the test environment version of bind'''
133 t
.info("Restarting bind9")
134 t
.putenv('KEYTAB_FILE', '${PREFIX}/private/dns.keytab')
135 t
.putenv('KRB5_KTNAME', '${PREFIX}/private/dns.keytab')
137 t
.run_cmd("mkdir -p var/named/data")
138 t
.run_cmd("chown -R ${BIND_USER} var/named")
140 nameserver
= t
.get_nameserver()
141 if nameserver
== t
.getvar('INTERFACE_IP'):
142 raise RuntimeError("old /etc/resolv.conf must not contain %s as a nameserver, this will create loops with the generated dns configuration" % nameserver
)
143 t
.setvar('DNSSERVER', nameserver
)
145 if t
.getvar('INTERFACE_IPV6'):
146 ipv6_listen
= 'listen-on-v6 port 53 { ${INTERFACE_IPV6}; };'
149 t
.setvar('BIND_LISTEN_IPV6', ipv6_listen
)
151 t
.write_file("etc/named.conf", '''
153 listen-on port 53 { ${INTERFACE_IP}; };
155 directory "${PREFIX}/var/named";
156 dump-file "${PREFIX}/var/named/data/cache_dump.db";
157 pid-file "${PREFIX}/var/named/named.pid";
158 statistics-file "${PREFIX}/var/named/data/named_stats.txt";
159 memstatistics-file "${PREFIX}/var/named/data/named_mem_stats.txt";
160 allow-query { any; };
162 tkey-gssapi-credential "DNS/${HOSTNAME}.${LCREALM}";
163 tkey-domain "${REALM}";
176 secret "lA/cTrno03mt5Ju17ybEYw==";
180 inet ${INTERFACE_IP} port 953
181 allow { any; } keys { "rndc-key"; };
184 include "${PREFIX}/private/named.conf";
187 # add forwarding for the windows domains
188 domains
= t
.get_domains()
190 t
.write_file('etc/named.conf',
199 ''' % (d
, domains
[d
]),
203 t
.write_file("etc/rndc.conf", '''
207 secret "lA/cTrno03mt5Ju17ybEYw==";
211 default-key "rndc-key";
212 default-server ${INTERFACE_IP};
217 set_nameserver(t
, t
.getvar('INTERFACE_IP'))
219 rndc_cmd(t
, "stop", checkfail
=False)
220 t
.port_wait("${INTERFACE_IP}", 53, wait_for_fail
=True)
221 t
.bind_child
= t
.run_child("${BIND9} -u ${BIND_USER} -n 1 -c ${PREFIX}/etc/named.conf -g")
223 t
.port_wait("${INTERFACE_IP}", 53)
228 '''test that DNS is OK'''
229 t
.info("Testing DNS")
230 t
.cmd_contains("host -t SRV _ldap._tcp.${LCREALM}.",
231 ['_ldap._tcp.${LCREALM} has SRV record 0 100 389 ${HOSTNAME}.${LCREALM}'])
232 t
.cmd_contains("host -t SRV _kerberos._udp.${LCREALM}.",
233 ['_kerberos._udp.${LCREALM} has SRV record 0 100 88 ${HOSTNAME}.${LCREALM}'])
234 t
.cmd_contains("host -t A ${HOSTNAME}.${LCREALM}",
235 ['${HOSTNAME}.${LCREALM} has address'])
237 def test_kerberos(t
):
238 '''test that kerberos is OK'''
239 t
.info("Testing kerberos")
240 t
.run_cmd("kdestroy")
241 t
.kinit("administrator@${REALM}", "${PASSWORD1}")
242 t
.cmd_contains("klist -e", ["Ticket cache", "Default principal", "Valid starting"])
246 '''test that dynamic DNS is working'''
248 t
.run_cmd("sbin/samba_dnsupdate --fail-immediately")
252 def run_winjoin(t
, vm
):
253 '''join a windows box to our domain'''
256 t
.info("Joining a windows box to the domain")
257 t
.vm_poweroff("${WIN_VM}", checkfail
=False)
258 t
.vm_restore("${WIN_VM}", "${WIN_SNAPSHOT}")
259 child
= t
.open_telnet("${WIN_HOSTNAME}", "${WIN_USER}", "${WIN_PASS}", set_time
=True, set_ip
=True)
260 child
.sendline("netdom join ${WIN_HOSTNAME} /Domain:${LCREALM} /PasswordD:${PASSWORD1} /UserD:administrator")
261 child
.expect("The command completed successfully")
263 child
.sendline("shutdown /r -t 0")
265 child
= t
.open_telnet("${WIN_HOSTNAME}", "${WIN_USER}", "${WIN_PASS}", set_time
=True, set_ip
=True)
266 child
.sendline("ipconfig /registerdns")
267 child
.expect("Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported in the Event Viewer")
270 def test_winjoin(t
, vm
):
271 t
.info("Checking the windows join is OK")
273 t
.port_wait("${WIN_IP}", 139)
274 t
.retry_cmd('bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -Uadministrator@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"], retries
=100)
275 t
.cmd_contains("host -t A ${WIN_HOSTNAME}.${LCREALM}.", ['has address'])
276 t
.cmd_contains('bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -Utestallowed@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"])
277 t
.cmd_contains('bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -k no -Utestallowed@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"])
278 t
.cmd_contains('bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -k yes -Utestallowed@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"])
279 child
= t
.open_telnet("${WIN_HOSTNAME}", "${DOMAIN}\\administrator", "${PASSWORD1}")
280 child
.sendline("net use t: \\\\${HOSTNAME}.${LCREALM}\\test")
281 child
.expect("The command completed successfully")
282 t
.vm_poweroff("${WIN_VM}")
285 def run_dcpromo(t
, vm
):
286 '''run a dcpromo on windows'''
289 t
.info("Joining a windows VM ${WIN_VM} to the domain as a DC using dcpromo")
290 t
.vm_poweroff("${WIN_VM}", checkfail
=False)
291 t
.vm_restore("${WIN_VM}", "${WIN_SNAPSHOT}")
292 child
= t
.open_telnet("${WIN_HOSTNAME}", "administrator", "${WIN_PASS}", set_ip
=True)
293 child
.sendline("copy /Y con answers.txt")
297 RebootOnCompletion=Yes
298 ReplicaOrNewDomain=Replica
299 ReplicaDomainDNSName=${LCREALM}
300 SiteName=Default-First-Site-Name
303 CreateDNSDelegation=No
304 UserDomain=${LCREALM}
305 UserName=${LCREALM}\\administrator
306 Password=${PASSWORD1}
307 DatabasePath="C:\Windows\NTDS"
308 LogPath="C:\Windows\NTDS"
309 SYSVOLPath="C:\Windows\SYSVOL"
310 SafeModeAdminPassword=${PASSWORD1}
313 child
.expect("copied.")
316 child
.sendline("dcpromo /answer:answers.txt")
317 i
= child
.expect(["You must restart this computer", "failed", "Active Directory Domain Services was not installed", "C:"], timeout
=120)
319 raise Exception("dcpromo failed")
323 def test_dcpromo(t
, vm
):
324 '''test that dcpromo worked'''
325 t
.info("Checking the dcpromo join is OK")
327 t
.port_wait("${WIN_IP}", 139)
328 t
.retry_cmd('bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -Uadministrator@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"])
329 t
.cmd_contains("host -t A ${WIN_HOSTNAME}.${LCREALM}.", ['has address'])
330 t
.cmd_contains('bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -Utestallowed@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"])
332 t
.cmd_contains("bin/samba-tool drs kcc ${HOSTNAME}.${LCREALM} -Uadministrator@${LCREALM}%${PASSWORD1}", ['Consistency check', 'successful'])
333 t
.cmd_contains("bin/samba-tool drs kcc ${WIN_HOSTNAME}.${LCREALM} -Uadministrator@${LCREALM}%${PASSWORD1}", ['Consistency check', 'successful'])
335 t
.kinit("administrator@${REALM}", "${PASSWORD1}")
337 # the first replication will transfer the dnsHostname attribute
338 t
.cmd_contains("bin/samba-tool drs replicate ${HOSTNAME}.${LCREALM} ${WIN_HOSTNAME} CN=Configuration,${BASEDN} -k yes", ["was successful"])
340 for nc
in [ '${BASEDN}', 'CN=Configuration,${BASEDN}', 'CN=Schema,CN=Configuration,${BASEDN}' ]:
341 t
.cmd_contains("bin/samba-tool drs replicate ${HOSTNAME}.${LCREALM} ${WIN_HOSTNAME}.${LCREALM} %s -k yes" % nc
, ["was successful"])
342 t
.cmd_contains("bin/samba-tool drs replicate ${WIN_HOSTNAME}.${LCREALM} ${HOSTNAME}.${LCREALM} %s -k yes" % nc
, ["was successful"])
344 t
.cmd_contains("bin/samba-tool drs showrepl ${HOSTNAME}.${LCREALM} -k yes",
345 [ "INBOUND NEIGHBORS",
347 "Last attempt .* was successful",
348 "CN=Configuration,${BASEDN}",
349 "Last attempt .* was successful",
350 "CN=Configuration,${BASEDN}", # cope with either order
351 "Last attempt .* was successful",
352 "OUTBOUND NEIGHBORS",
355 "CN=Configuration,${BASEDN}",
357 "CN=Configuration,${BASEDN}",
362 t
.cmd_contains("bin/samba-tool drs showrepl ${WIN_HOSTNAME}.${LCREALM} -k yes",
363 [ "INBOUND NEIGHBORS",
365 "Last attempt .* was successful",
366 "CN=Configuration,${BASEDN}",
367 "Last attempt .* was successful",
368 "CN=Configuration,${BASEDN}",
369 "Last attempt .* was successful",
370 "OUTBOUND NEIGHBORS",
373 "CN=Configuration,${BASEDN}",
375 "CN=Configuration,${BASEDN}",
380 child
= t
.open_telnet("${WIN_HOSTNAME}", "${DOMAIN}\\administrator", "${PASSWORD1}", set_time
=True)
381 child
.sendline("net use t: \\\\${HOSTNAME}.${LCREALM}\\test")
382 child
.expect("The command completed successfully")
384 t
.run_net_time(child
)
386 t
.info("Checking if showrepl is happy")
387 child
.sendline("repadmin /showrepl")
388 child
.expect("${BASEDN}")
389 child
.expect("was successful")
390 child
.expect("CN=Configuration,${BASEDN}")
391 child
.expect("was successful")
392 child
.expect("CN=Schema,CN=Configuration,${BASEDN}")
393 child
.expect("was successful")
395 t
.info("Checking if new users propogate to windows")
396 t
.run_cmd('bin/samba-tool newuser test2 ${PASSWORD2}')
397 t
.retry_cmd("bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -Utest2%${PASSWORD2} -k no", ['Sharename', 'Remote IPC'])
398 t
.retry_cmd("bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -Utest2%${PASSWORD2} -k yes", ['Sharename', 'Remote IPC'])
400 t
.info("Checking if new users on windows propogate to samba")
401 child
.sendline("net user test3 ${PASSWORD3} /add")
403 i
= child
.expect(["The command completed successfully",
404 "The directory service was unable to allocate a relative identifier"])
409 t
.retry_cmd("bin/smbclient -L ${HOSTNAME}.${LCREALM} -Utest3%${PASSWORD3} -k no", ['Sharename', 'IPC'])
410 t
.retry_cmd("bin/smbclient -L ${HOSTNAME}.${LCREALM} -Utest3%${PASSWORD3} -k yes", ['Sharename', 'IPC'])
412 t
.info("Checking propogation of user deletion")
413 t
.run_cmd('bin/samba-tool user delete test2 -Uadministrator@${LCREALM}%${PASSWORD1}')
414 child
.sendline("net user test3 /del")
415 child
.expect("The command completed successfully")
417 t
.retry_cmd("bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -Utest2%${PASSWORD2} -k no", ['LOGON_FAILURE'])
418 t
.retry_cmd("bin/smbclient -L ${HOSTNAME}.${LCREALM} -Utest3%${PASSWORD3} -k no", ['LOGON_FAILURE'])
419 t
.retry_cmd("bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -Utest2%${PASSWORD2} -k yes", ['LOGON_FAILURE'])
420 t
.retry_cmd("bin/smbclient -L ${HOSTNAME}.${LCREALM} -Utest3%${PASSWORD3} -k yes", ['LOGON_FAILURE'])
421 t
.vm_poweroff("${WIN_VM}")
424 def run_dcpromo_rodc(t
, vm
):
425 '''run a RODC dcpromo to join a windows DC to the samba domain'''
427 t
.info("Joining a w2k8 box to the domain as a RODC")
428 t
.vm_poweroff("${WIN_VM}", checkfail
=False)
429 t
.vm_restore("${WIN_VM}", "${WIN_SNAPSHOT}")
430 child
= t
.open_telnet("${WIN_HOSTNAME}", "administrator", "${WIN_PASS}", set_ip
=True)
431 child
.sendline("copy /Y con answers.txt")
434 ReplicaOrNewDomain=ReadOnlyReplica
435 ReplicaDomainDNSName=${LCREALM}
436 PasswordReplicationDenied="BUILTIN\Administrators"
437 PasswordReplicationDenied="BUILTIN\Server Operators"
438 PasswordReplicationDenied="BUILTIN\Backup Operators"
439 PasswordReplicationDenied="BUILTIN\Account Operators"
440 PasswordReplicationDenied="${DOMAIN}\Denied RODC Password Replication Group"
441 PasswordReplicationAllowed="${DOMAIN}\Allowed RODC Password Replication Group"
442 DelegatedAdmin="${DOMAIN}\\Administrator"
443 SiteName=Default-First-Site-Name
446 CreateDNSDelegation=No
447 UserDomain=${LCREALM}
448 UserName=${LCREALM}\\administrator
449 Password=${PASSWORD1}
450 DatabasePath="C:\Windows\NTDS"
451 LogPath="C:\Windows\NTDS"
452 SYSVOLPath="C:\Windows\SYSVOL"
453 SafeModeAdminPassword=${PASSWORD1}
454 RebootOnCompletion=No
457 child
.expect("copied.")
458 child
.sendline("dcpromo /answer:answers.txt")
459 i
= child
.expect(["You must restart this computer", "failed"], timeout
=120)
461 raise Exception("dcpromo failed")
462 child
.sendline("shutdown -r -t 0")
467 def test_dcpromo_rodc(t
, vm
):
468 '''test the RODC dcpromo worked'''
469 t
.info("Checking the w2k8 RODC join is OK")
471 t
.port_wait("${WIN_IP}", 139)
472 t
.retry_cmd('bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -Uadministrator@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"])
473 t
.cmd_contains("host -t A ${WIN_HOSTNAME}.${LCREALM}.", ['has address'])
474 t
.cmd_contains('bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -Utestallowed@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"])
475 child
= t
.open_telnet("${WIN_HOSTNAME}", "${DOMAIN}\\administrator", "${PASSWORD1}", set_time
=True)
476 child
.sendline("net use t: \\\\${HOSTNAME}.${LCREALM}\\test")
477 child
.expect("The command completed successfully")
479 t
.info("Checking if showrepl is happy")
480 child
.sendline("repadmin /showrepl")
481 child
.expect("${BASEDN}")
482 child
.expect("was successful")
483 child
.expect("CN=Configuration,${BASEDN}")
484 child
.expect("was successful")
485 child
.expect("CN=Configuration,${BASEDN}")
486 child
.expect("was successful")
488 t
.info("Checking if new users are available on windows")
489 t
.run_cmd('bin/samba-tool newuser test2 ${PASSWORD2}')
490 t
.retry_cmd("bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -Utest2%${PASSWORD2} -k yes", ['Sharename', 'Remote IPC'])
491 t
.retry_cmd("bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -Utest2%${PASSWORD2} -k no", ['LOGON_FAILURE'])
492 t
.retry_cmd("bin/samba-tool drs replicate ${WIN_HOSTNAME}.${LCREALM} ${HOSTNAME}.${LCREALM} ${BASEDN} -k yes", ["was successful"])
493 t
.retry_cmd("bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -Utest2%${PASSWORD2} -k no", ['Sharename', 'Remote IPC'])
494 t
.run_cmd('bin/samba-tool user delete test2 -Uadministrator@${LCREALM}%${PASSWORD1}')
495 t
.retry_cmd("bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -Utest2%${PASSWORD2} -k yes", ['LOGON_FAILURE'])
496 t
.retry_cmd("bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -Utest2%${PASSWORD2} -k no", ['LOGON_FAILURE'])
497 t
.vm_poweroff("${WIN_VM}")
500 def join_as_dc(t
, vm
):
501 '''join a windows domain as a DC'''
503 t
.info("Joining ${WIN_VM} as a second DC using samba-tool join DC")
505 t
.run_cmd('killall -9 -q samba smbd nmbd winbindd', checkfail
=False)
506 t
.vm_poweroff("${WIN_VM}", checkfail
=False)
507 t
.vm_restore("${WIN_VM}", "${WIN_SNAPSHOT}")
509 t
.run_cmd("rm -rf etc/smb.conf private")
510 child
= t
.open_telnet("${WIN_HOSTNAME}", "${WIN_DOMAIN}\\administrator", "${WIN_PASS}", set_time
=True)
511 t
.get_ipconfig(child
)
512 t
.retry_cmd("bin/samba-tool drs showrepl ${WIN_HOSTNAME}.${WIN_REALM} -Uadministrator%${WIN_PASS}", ['INBOUND NEIGHBORS'] )
513 t
.run_cmd('bin/samba-tool join ${WIN_REALM} DC -Uadministrator%${WIN_PASS} -d${DEBUGLEVEL} --option=interfaces=${INTERFACE}')
514 t
.run_cmd('bin/samba-tool drs kcc ${WIN_HOSTNAME}.${WIN_REALM} -Uadministrator@${WIN_REALM}%${WIN_PASS}')
517 def test_join_as_dc(t
, vm
):
518 '''test the join of a windows domain as a DC'''
519 t
.info("Checking the DC join is OK")
521 t
.retry_cmd('bin/smbclient -L ${HOSTNAME}.${WIN_REALM} -Uadministrator@${WIN_REALM}%${WIN_PASS}', ["C$", "IPC$", "Sharename"])
522 t
.cmd_contains("host -t A ${HOSTNAME}.${WIN_REALM}.", ['has address'])
523 child
= t
.open_telnet("${WIN_HOSTNAME}", "${WIN_DOMAIN}\\administrator", "${WIN_PASS}", set_time
=True)
525 t
.info("Forcing kcc runs, and replication")
526 t
.run_cmd('bin/samba-tool drs kcc ${WIN_HOSTNAME}.${WIN_REALM} -Uadministrator@${WIN_REALM}%${WIN_PASS}')
527 t
.run_cmd('bin/samba-tool drs kcc ${HOSTNAME}.${WIN_REALM} -Uadministrator@${WIN_REALM}%${WIN_PASS}')
529 t
.kinit("administrator@${WIN_REALM}", "${WIN_PASS}")
530 for nc
in [ '${WIN_BASEDN}', 'CN=Configuration,${WIN_BASEDN}', 'CN=Schema,CN=Configuration,${WIN_BASEDN}' ]:
531 t
.cmd_contains("bin/samba-tool drs replicate ${HOSTNAME}.${WIN_REALM} ${WIN_HOSTNAME}.${WIN_REALM} %s -k yes" % nc
, ["was successful"])
532 t
.cmd_contains("bin/samba-tool drs replicate ${WIN_HOSTNAME}.${WIN_REALM} ${HOSTNAME}.${WIN_REALM} %s -k yes" % nc
, ["was successful"])
534 child
.sendline("net use t: \\\\${HOSTNAME}.${WIN_REALM}\\test")
535 child
.expect("The command completed successfully")
537 t
.info("Checking if showrepl is happy")
538 child
.sendline("repadmin /showrepl")
539 child
.expect("${WIN_BASEDN}")
540 child
.expect("was successful")
541 child
.expect("CN=Configuration,${WIN_BASEDN}")
542 child
.expect("was successful")
543 child
.expect("CN=Configuration,${WIN_BASEDN}")
544 child
.expect("was successful")
546 t
.info("Checking if new users propogate to windows")
547 t
.run_cmd('bin/samba-tool newuser test2 ${PASSWORD2}')
548 t
.retry_cmd("bin/smbclient -L ${WIN_HOSTNAME}.${WIN_REALM} -Utest2%${PASSWORD2} -k no", ['Sharename', 'Remote IPC'])
549 t
.retry_cmd("bin/smbclient -L ${WIN_HOSTNAME}.${WIN_REALM} -Utest2%${PASSWORD2} -k yes", ['Sharename', 'Remote IPC'])
551 t
.info("Checking if new users on windows propogate to samba")
552 child
.sendline("net user test3 ${PASSWORD3} /add")
553 child
.expect("The command completed successfully")
554 t
.retry_cmd("bin/smbclient -L ${HOSTNAME}.${WIN_REALM} -Utest3%${PASSWORD3} -k no", ['Sharename', 'IPC'])
555 t
.retry_cmd("bin/smbclient -L ${HOSTNAME}.${WIN_REALM} -Utest3%${PASSWORD3} -k yes", ['Sharename', 'IPC'])
557 t
.info("Checking propogation of user deletion")
558 t
.run_cmd('bin/samba-tool user delete test2 -Uadministrator@${WIN_REALM}%${WIN_PASS}')
559 child
.sendline("net user test3 /del")
560 child
.expect("The command completed successfully")
562 t
.retry_cmd("bin/smbclient -L ${WIN_HOSTNAME}.${WIN_REALM} -Utest2%${PASSWORD2} -k no", ['LOGON_FAILURE'])
563 t
.retry_cmd("bin/smbclient -L ${HOSTNAME}.${WIN_REALM} -Utest3%${PASSWORD3} -k no", ['LOGON_FAILURE'])
564 t
.retry_cmd("bin/smbclient -L ${WIN_HOSTNAME}.${WIN_REALM} -Utest2%${PASSWORD2} -k yes", ['LOGON_FAILURE'])
565 t
.retry_cmd("bin/smbclient -L ${HOSTNAME}.${WIN_REALM} -Utest3%${PASSWORD3} -k yes", ['LOGON_FAILURE'])
566 t
.vm_poweroff("${WIN_VM}")
569 def join_as_rodc(t
, vm
):
570 '''join a windows domain as a RODC'''
572 t
.info("Joining ${WIN_VM} as a RODC using samba-tool join DC")
574 t
.run_cmd('killall -9 -q samba smbd nmbd winbindd', checkfail
=False)
575 t
.vm_poweroff("${WIN_VM}", checkfail
=False)
576 t
.vm_restore("${WIN_VM}", "${WIN_SNAPSHOT}")
578 t
.run_cmd("rm -rf etc/smb.conf private")
579 child
= t
.open_telnet("${WIN_HOSTNAME}", "${WIN_DOMAIN}\\administrator", "${WIN_PASS}", set_time
=True)
580 t
.get_ipconfig(child
)
581 t
.retry_cmd("bin/samba-tool drs showrepl ${WIN_HOSTNAME}.${WIN_REALM} -Uadministrator%${WIN_PASS}", ['INBOUND NEIGHBORS'] )
582 t
.run_cmd('bin/samba-tool join ${WIN_REALM} RODC -Uadministrator%${WIN_PASS} -d${DEBUGLEVEL} --option=interfaces=${INTERFACE}')
583 t
.run_cmd('bin/samba-tool drs kcc ${WIN_HOSTNAME}.${WIN_REALM} -Uadministrator@${WIN_REALM}%${WIN_PASS}')
586 def test_join_as_rodc(t
, vm
):
587 '''test a windows domain RODC join'''
588 t
.info("Checking the RODC join is OK")
590 t
.retry_cmd('bin/smbclient -L ${HOSTNAME}.${WIN_REALM} -Uadministrator@${WIN_REALM}%${WIN_PASS}', ["C$", "IPC$", "Sharename"])
591 t
.cmd_contains("host -t A ${HOSTNAME}.${WIN_REALM}.", ['has address'])
592 child
= t
.open_telnet("${WIN_HOSTNAME}", "${WIN_DOMAIN}\\administrator", "${WIN_PASS}", set_time
=True)
594 t
.info("Forcing kcc runs, and replication")
595 t
.run_cmd('bin/samba-tool drs kcc ${HOSTNAME}.${WIN_REALM} -Uadministrator@${WIN_REALM}%${WIN_PASS}')
596 t
.run_cmd('bin/samba-tool drs kcc ${WIN_HOSTNAME}.${WIN_REALM} -Uadministrator@${WIN_REALM}%${WIN_PASS}')
598 t
.kinit("administrator@${WIN_REALM}", "${WIN_PASS}")
599 for nc
in [ '${WIN_BASEDN}', 'CN=Configuration,${WIN_BASEDN}', 'CN=Schema,CN=Configuration,${WIN_BASEDN}' ]:
600 t
.cmd_contains("bin/samba-tool drs replicate ${HOSTNAME}.${WIN_REALM} ${WIN_HOSTNAME}.${WIN_REALM} %s -k yes" % nc
, ["was successful"])
602 child
.sendline("net use t: \\\\${HOSTNAME}.${WIN_REALM}\\test")
603 child
.expect("The command completed successfully")
605 t
.info("Checking if showrepl is happy")
606 child
.sendline("repadmin /showrepl")
607 child
.expect("DSA invocationID")
609 t
.cmd_contains("bin/samba-tool drs showrepl ${WIN_HOSTNAME}.${WIN_REALM} -k yes",
610 [ "INBOUND NEIGHBORS",
611 "OUTBOUND NEIGHBORS",
613 "Last attempt .* was successful",
614 "CN=Configuration,${WIN_BASEDN}",
615 "Last attempt .* was successful",
616 "CN=Configuration,${WIN_BASEDN}",
617 "Last attempt .* was successful" ],
621 t
.info("Checking if new users on windows propogate to samba")
622 child
.sendline("net user test3 ${PASSWORD3} /add")
623 child
.expect("The command completed successfully")
624 t
.retry_cmd("bin/smbclient -L ${HOSTNAME}.${WIN_REALM} -Utest3%${PASSWORD3} -k no", ['Sharename', 'IPC'])
625 t
.retry_cmd("bin/smbclient -L ${HOSTNAME}.${WIN_REALM} -Utest3%${PASSWORD3} -k yes", ['Sharename', 'IPC'])
628 t
.info("Checking if new users propogate to windows")
629 t
.cmd_contains('bin/samba-tool newuser test2 ${PASSWORD2}', ['No RID Set DN'])
631 t
.info("Checking propogation of user deletion")
632 child
.sendline("net user test3 /del")
633 child
.expect("The command completed successfully")
635 t
.retry_cmd("bin/smbclient -L ${HOSTNAME}.${WIN_REALM} -Utest3%${PASSWORD3} -k no", ['LOGON_FAILURE'])
636 t
.retry_cmd("bin/smbclient -L ${HOSTNAME}.${WIN_REALM} -Utest3%${PASSWORD3} -k yes", ['LOGON_FAILURE'])
637 t
.vm_poweroff("${WIN_VM}")
641 '''test the Samba4 howto'''
643 check_prerequesites(t
)
645 # we don't need fsync safety in these tests
646 t
.putenv('TDB_NO_FSYNC', '1')
648 if not t
.skip("build"):
651 if not t
.skip("provision"):
654 if not t
.skip("create-shares"):
657 if not t
.skip("starts4"):
659 if not t
.skip("smbclient"):
661 if not t
.skip("startbind"):
663 if not t
.skip("dns"):
665 if not t
.skip("kerberos"):
667 if not t
.skip("dyndns"):
670 if t
.have_var('WINDOWS7_VM') and not t
.skip("windows7"):
671 run_winjoin(t
, "WINDOWS7")
672 test_winjoin(t
, "WINDOWS7")
674 if t
.have_var('WINXP_VM') and not t
.skip("winxp"):
675 run_winjoin(t
, "WINXP")
676 test_winjoin(t
, "WINXP")
678 if t
.have_var('W2K8R2C_VM') and not t
.skip("dcpromo_rodc"):
679 t
.info("Testing w2k8r2 RODC dcpromo")
680 run_dcpromo_rodc(t
, "W2K8R2C")
681 test_dcpromo_rodc(t
, "W2K8R2C")
683 if t
.have_var('W2K8R2B_VM') and not t
.skip("dcpromo_w2k8r2"):
684 t
.info("Testing w2k8r2 dcpromo")
685 run_dcpromo(t
, "W2K8R2B")
686 test_dcpromo(t
, "W2K8R2B")
688 if t
.have_var('W2K8B_VM') and not t
.skip("dcpromo_w2k8"):
689 t
.info("Testing w2k8 dcpromo")
690 run_dcpromo(t
, "W2K8B")
691 test_dcpromo(t
, "W2K8B")
693 if t
.have_var('W2K3B_VM') and not t
.skip("dcpromo_w2k3"):
694 t
.info("Testing w2k3 dcpromo")
695 t
.info("Changing to 2003 functional level")
696 provision_s4(t
, func_level
='2003')
704 run_dcpromo(t
, "W2K3B")
705 test_dcpromo(t
, "W2K3B")
707 if t
.have_var('W2K8R2A_VM') and not t
.skip("join_w2k8r2"):
708 join_as_dc(t
, "W2K8R2A")
712 test_join_as_dc(t
, "W2K8R2A")
714 if t
.have_var('W2K8R2A_VM') and not t
.skip("join_rodc"):
715 join_as_rodc(t
, "W2K8R2A")
719 test_join_as_rodc(t
, "W2K8R2A")
721 if t
.have_var('W2K3A_VM') and not t
.skip("join_w2k3"):
722 join_as_dc(t
, "W2K3A")
726 test_join_as_dc(t
, "W2K3A")
728 t
.info("Howto test: All OK")
732 '''cleanup after tests'''
733 t
.info("Cleaning up ...")
734 restore_resolv_conf(t
)
735 if getattr(t
, 'bind_child', False):
739 if __name__
== '__main__':
740 parser
= optparse
.OptionParser("test-howto.py")
741 parser
.add_option("--conf", type='string', default
='', help='config file')
742 parser
.add_option("--skip", type='string', default
='', help='list of steps to skip (comma separated)')
743 parser
.add_option("--list", action
='store_true', default
=False, help='list the available steps')
744 parser
.add_option("--rebase", action
='store_true', default
=False, help='do a git pull --rebase')
745 parser
.add_option("--clean", action
='store_true', default
=False, help='clean the tree')
746 parser
.add_option("--prefix", type='string', default
=None, help='override install prefix')
747 parser
.add_option("--sourcetree", type='string', default
=None, help='override sourcetree location')
748 parser
.add_option("--nocleanup", action
='store_true', default
=False, help='disable cleanup code')
750 opts
, args
= parser
.parse_args()
753 print("Please specify a config file with --conf")
756 t
= wintest
.wintest()
757 t
.load_config(opts
.conf
)
758 t
.set_skip(opts
.skip
)
764 t
.setvar('PREFIX', opts
.prefix
)
767 t
.setvar('SOURCETREE', opts
.sourcetree
)
771 t
.chdir('${SOURCETREE}')
772 t
.run_cmd('git pull --rebase')
776 t
.chdir('${SOURCETREE}/source4')
777 t
.run_cmd('rm -rf bin')
782 if not opts
.nocleanup
:
786 if not opts
.nocleanup
:
788 t
.info("S4 howto test: All OK")