The branch, master has been updated
       via  b6b3822... s4-torture: Improved the winreg symlink test.
       via  74d0fc1... s4-torture: Disable the security descriptor tests.
       via  225bd02... s4-torture: Try to fix the winreg tests.
      from  5fe476b... s4:ldb: add --controls support to ldbedit

http://gitweb.samba.org/?p=samba.git;a=shortlog;h=master


- Log -----------------------------------------------------------------
commit b6b38222894014de029131eb5b6d573294af314e
Author: Andreas Schneider <a...@samba.org>
Date:   Thu May 20 14:00:57 2010 +0200

    s4-torture: Improved the winreg symlink test.
    
    This test is still disabled as we don't know how to remove a symbolic
    link. It looks like there only DeleteKey functions which can work on a
    handle are able to delete a symbolic link.
    
    Pair-Programmed-With: Michael Adam <ob...@samba.org>

commit 74d0fc10fd646e493a98a00e524f17e9c4f3df3f
Author: Andreas Schneider <a...@samba.org>
Date:   Fri May 21 12:49:23 2010 +0200

    s4-torture: Disable the security descriptor tests.

commit 225bd02dab1a0656461d3d5e30ad03034e8c64f1
Author: Andreas Schneider <a...@samba.org>
Date:   Fri May 21 12:42:55 2010 +0200

    s4-torture: Try to fix the winreg tests.

-----------------------------------------------------------------------

Summary of changes:
 source4/torture/rpc/winreg.c |  219 +++++++++++++++++++++++++++++++----------
 1 files changed, 165 insertions(+), 54 deletions(-)


Changeset truncated at 500 lines:

diff --git a/source4/torture/rpc/winreg.c b/source4/torture/rpc/winreg.c
index 370bd67..67afce2 100644
--- a/source4/torture/rpc/winreg.c
+++ b/source4/torture/rpc/winreg.c
@@ -28,18 +28,19 @@
 #include "param/param.h"
 #include "lib/registry/registry.h"
 
-#define TEST_KEY_BASE "smbtorture test"
-#define TEST_KEY1 TEST_KEY_BASE "\\spottyfoot"
-#define TEST_KEY2 TEST_KEY_BASE "\\with a SD (#1)"
-#define TEST_KEY3 TEST_KEY_BASE "\\with a subkey"
-#define TEST_KEY4 TEST_KEY_BASE "\\sd_tests"
-#define TEST_SUBKEY TEST_KEY3 "\\subkey"
-#define TEST_SUBKEY_SD  TEST_KEY4 "\\subkey_sd"
-#define TEST_SUBSUBKEY_SD TEST_KEY4 "\\subkey_sd\\subsubkey_sd"
+#define TEST_KEY_BASE "winreg_torture_test"
+#define TEST_KEY1 "spottyfoot"
+#define TEST_KEY2 "with a SD (#1)"
+#define TEST_KEY3 "with a subkey"
+#define TEST_KEY4 "sd_tests"
+#define TEST_SUBKEY "subkey"
+#define TEST_SUBKEY_SD  "subkey_sd"
+#define TEST_SUBSUBKEY_SD "subkey_sd\\subsubkey_sd"
 #define TEST_VALUE "torture_value_name"
 #define TEST_KEY_VOLATILE "torture_volatile_key"
 #define TEST_SUBKEY_VOLATILE "torture_volatile_subkey"
 #define TEST_KEY_SYMLINK "torture_symlink_key"
+#define TEST_KEY_SYMLINK_DEST "torture_symlink_dest"
 
 #define TEST_SID "S-1-5-21-1234567890-1234567890-1234567890-500"
 
@@ -832,6 +833,8 @@ static bool test_SecurityDescriptorInheritance(struct 
dcerpc_pipe *p,
        struct policy_handle new_handle;
        bool ret = true;
        struct dcerpc_binding_handle *b = p->binding_handle;
+       const char *test_subkey_sd;
+       const char *test_subsubkey_sd;
 
        torture_comment(tctx, "SecurityDescriptor inheritance\n");
 
@@ -874,12 +877,14 @@ static bool test_SecurityDescriptorInheritance(struct 
dcerpc_pipe *p,
                return false;
        }
 
-       if (!test_CreateKey(b, tctx, handle, TEST_SUBKEY_SD, NULL)) {
+       test_subkey_sd = talloc_asprintf(tctx, "%s\\%s", key, TEST_SUBKEY_SD);
+
+       if (!test_CreateKey(b, tctx, handle, test_subkey_sd, NULL)) {
                ret = false;
                goto out;
        }
 
-       if (!test_OpenKey(b, tctx, handle, TEST_SUBKEY_SD, &new_handle)) {
+       if (!test_OpenKey(b, tctx, handle, test_subkey_sd, &new_handle)) {
                ret = false;
                goto out;
        }
@@ -890,13 +895,15 @@ static bool test_SecurityDescriptorInheritance(struct 
dcerpc_pipe *p,
                goto out;
        }
 
+       test_subsubkey_sd = talloc_asprintf(tctx, "%s\\%s", key, 
TEST_SUBSUBKEY_SD);
+
        test_CloseKey(b, tctx, &new_handle);
-       if (!test_CreateKey(b, tctx, handle, TEST_SUBSUBKEY_SD, NULL)) {
+       if (!test_CreateKey(b, tctx, handle, test_subsubkey_sd, NULL)) {
                ret = false;
                goto out;
        }
 
-       if (!test_OpenKey(b, tctx, handle, TEST_SUBSUBKEY_SD, &new_handle)) {
+       if (!test_OpenKey(b, tctx, handle, test_subsubkey_sd, &new_handle)) {
                ret = false;
                goto out;
        }
@@ -909,10 +916,10 @@ static bool test_SecurityDescriptorInheritance(struct 
dcerpc_pipe *p,
 
  out:
        test_CloseKey(b, tctx, &new_handle);
-       test_Cleanup(b, tctx, handle, TEST_SUBKEY_SD);
+       test_Cleanup(b, tctx, handle, test_subkey_sd);
        test_RestoreSecurity(p, tctx, handle, key, sd_orig);
 
-       return true;
+       return ret;
 }
 
 static bool test_SecurityDescriptorBlockInheritance(struct dcerpc_pipe *p,
@@ -941,6 +948,8 @@ static bool test_SecurityDescriptorBlockInheritance(struct 
dcerpc_pipe *p,
        bool ret = true;
        uint8_t ace_flags = 0x0;
        struct dcerpc_binding_handle *b = p->binding_handle;
+       const char *test_subkey_sd;
+       const char *test_subsubkey_sd;
 
        torture_comment(tctx, "SecurityDescriptor inheritance block\n");
 
@@ -980,11 +989,14 @@ static bool 
test_SecurityDescriptorBlockInheritance(struct dcerpc_pipe *p,
                return false;
        }
 
-       if (!test_CreateKey(b, tctx, handle, TEST_SUBSUBKEY_SD, NULL)) {
+       test_subkey_sd = talloc_asprintf(tctx, "%s\\%s", key, TEST_SUBKEY_SD);
+       test_subsubkey_sd = talloc_asprintf(tctx, "%s\\%s", key, 
TEST_SUBSUBKEY_SD);
+
+       if (!test_CreateKey(b, tctx, handle, test_subsubkey_sd, NULL)) {
                return false;
        }
 
-       if (!test_OpenKey(b, tctx, handle, TEST_SUBSUBKEY_SD, &new_handle)) {
+       if (!test_OpenKey(b, tctx, handle, test_subsubkey_sd, &new_handle)) {
                ret = false;
                goto out;
        }
@@ -1008,7 +1020,7 @@ static bool 
test_SecurityDescriptorBlockInheritance(struct dcerpc_pipe *p,
 
        test_CloseKey(b, tctx, &new_handle);
 
-       if (!test_OpenKey(b, tctx, handle, TEST_SUBKEY_SD, &new_handle)) {
+       if (!test_OpenKey(b, tctx, handle, test_subkey_sd, &new_handle)) {
                ret = false;
                goto out;
        }
@@ -1028,7 +1040,7 @@ static bool 
test_SecurityDescriptorBlockInheritance(struct dcerpc_pipe *p,
 
  out:
        test_CloseKey(b, tctx, &new_handle);
-       test_Cleanup(b, tctx, handle, TEST_SUBKEY_SD);
+       test_Cleanup(b, tctx, handle, test_subkey_sd);
        test_RestoreSecurity(p, tctx, handle, key, sd_orig);
 
        return ret;
@@ -2285,23 +2297,55 @@ static const char *kernel_mode_registry_path(struct 
torture_context *tctx,
 static bool test_symlink_keys(struct torture_context *tctx,
                              struct dcerpc_binding_handle *b,
                              struct policy_handle *handle,
+                             const char *key,
                              int hkey)
 {
        struct policy_handle new_handle;
        enum winreg_CreateAction action_taken;
        DATA_BLOB blob;
-       /* symlink destination needs to be a kernel mode registry path */
-       const char *dest = "\\Registry\\MACHINE\\SOFTWARE\\foo";
+       uint32_t value = 42;
+       const char *test_key_symlink_dest;
+       const char *test_key_symlink;
+       const char *kernel_mode_path;
 
-       /* disable until we know how to *not* screw up a windows registry */
+       /* disable until we know how to delete a symbolic link */
        torture_skip(tctx, "symlink test disabled");
 
        torture_comment(tctx, "Testing REG_OPTION_CREATE_LINK key\n");
 
-       test_DeleteKey(b, tctx, handle, TEST_KEY_SYMLINK);
+       /* create destination key with testvalue */
+       test_key_symlink = talloc_asprintf(tctx, "%s\\%s",
+                       key, TEST_KEY_SYMLINK);
+       test_key_symlink_dest = talloc_asprintf(tctx, "%s\\%s",
+                       key, TEST_KEY_SYMLINK_DEST);
+
+       test_DeleteKey(b, tctx, handle, test_key_symlink);
+
+       torture_assert(tctx,
+               test_CreateKey_opts(tctx, b, handle, test_key_symlink_dest, 
NULL,
+                                   0,
+                                   SEC_FLAG_MAXIMUM_ALLOWED,
+                                   NULL,
+                                   WERR_OK,
+                                   &action_taken,
+                                   &new_handle),
+               "failed to create symlink destination");
+
+       blob = data_blob_talloc_zero(tctx, 4);
+       SIVAL(blob.data, 0, value);
 
        torture_assert(tctx,
-               test_CreateKey_opts(tctx, b, handle, TEST_KEY_SYMLINK, NULL,
+               test_SetValue(b, tctx, &new_handle, "TestValue", REG_DWORD, 
blob.data, blob.length),
+               "failed to create TestValue");
+
+       torture_assert(tctx,
+               test_CloseKey(b, tctx, &new_handle),
+               "failed to close");
+
+       /* create symlink */
+
+       torture_assert(tctx,
+               test_CreateKey_opts(tctx, b, handle, test_key_symlink, NULL,
                                    REG_OPTION_CREATE_LINK | 
REG_OPTION_VOLATILE,
                                    SEC_FLAG_MAXIMUM_ALLOWED,
                                    NULL,
@@ -2312,9 +2356,12 @@ static bool test_symlink_keys(struct torture_context 
*tctx,
 
        torture_assert_int_equal(tctx, action_taken, REG_CREATED_NEW_KEY, 
"unexpected action");
 
+       kernel_mode_path = kernel_mode_registry_path(tctx, hkey, NULL, 
test_key_symlink_dest);
+
        torture_assert(tctx,
                convert_string_talloc(tctx, CH_UNIX, CH_UTF16,
-                                     dest, strlen(dest), /* not NULL 
terminated */
+                                     kernel_mode_path,
+                                     strlen(kernel_mode_path), /* not NULL 
terminated */
                                      &blob.data, &blob.length,
                                      false),
                "failed to convert");
@@ -2327,8 +2374,28 @@ static bool test_symlink_keys(struct torture_context 
*tctx,
                test_CloseKey(b, tctx, &new_handle),
                "failed to close");
 
+       /* test follow symlink */
+
        torture_assert(tctx,
-               test_OpenKey_opts(tctx, b, handle, TEST_KEY_SYMLINK,
+               test_OpenKey_opts(tctx, b, handle, test_key_symlink,
+                                 0,
+                                 SEC_FLAG_MAXIMUM_ALLOWED,
+                                 &new_handle,
+                                 WERR_OK),
+               "failed to follow symlink key");
+
+       torture_assert(tctx,
+               test_QueryValue(b, tctx, &new_handle, "TestValue"),
+               "failed to query value");
+
+       torture_assert(tctx,
+               test_CloseKey(b, tctx, &new_handle),
+               "failed to close");
+
+       /* delete link */
+
+       torture_assert(tctx,
+               test_OpenKey_opts(tctx, b, handle, test_key_symlink,
                                  REG_OPTION_OPEN_LINK | REG_OPTION_VOLATILE,
                                  SEC_FLAG_MAXIMUM_ALLOWED,
                                  &new_handle,
@@ -2336,7 +2403,21 @@ static bool test_symlink_keys(struct torture_context 
*tctx,
                "failed to open symlink key");
 
        torture_assert(tctx,
-               test_DeleteKey(b, tctx, handle, TEST_KEY_SYMLINK),
+               test_DeleteValue(b, tctx, &new_handle, "SymbolicLinkValue"),
+               "failed to delete value SymbolicLinkValue");
+
+       torture_assert(tctx,
+               test_CloseKey(b, tctx, &new_handle),
+               "failed to close");
+
+       torture_assert(tctx,
+               test_DeleteKey(b, tctx, handle, test_key_symlink),
+               "failed to delete key");
+
+       /* delete destination */
+
+       torture_assert(tctx,
+               test_DeleteKey(b, tctx, handle, test_key_symlink_dest),
                "failed to delete key");
 
        return true;
@@ -2345,6 +2426,7 @@ static bool test_symlink_keys(struct torture_context 
*tctx,
 static bool test_CreateKey_keytypes(struct torture_context *tctx,
                                    struct dcerpc_binding_handle *b,
                                    struct policy_handle *handle,
+                                   const char *key,
                                    int hkey)
 {
 
@@ -2358,7 +2440,7 @@ static bool test_CreateKey_keytypes(struct 
torture_context *tctx,
                "failed to test volatile keys");
 
        torture_assert(tctx,
-               test_symlink_keys(tctx, b, handle, hkey),
+               test_symlink_keys(tctx, b, handle, key, hkey),
                "failed to test symlink keys");
 
        return true;
@@ -2367,20 +2449,26 @@ static bool test_CreateKey_keytypes(struct 
torture_context *tctx,
 static bool test_key_base(struct torture_context *tctx,
                          struct dcerpc_binding_handle *b,
                          struct policy_handle *handle,
+                         const char *base_key,
                          int hkey)
 {
        struct policy_handle newhandle;
        bool ret = true, created = false, deleted = false;
        bool created3 = false;
+       const char *test_key1;
+       const char *test_key3;
+       const char *test_subkey;
 
-       test_Cleanup(b, tctx, handle, TEST_KEY_BASE);
+       test_Cleanup(b, tctx, handle, base_key);
 
-       if (!test_CreateKey(b, tctx, handle, TEST_KEY_BASE, NULL)) {
+       if (!test_CreateKey(b, tctx, handle, base_key, NULL)) {
                torture_comment(tctx,
-                               "CreateKey (TEST_KEY_BASE) failed\n");
+                               "CreateKey(%s) failed\n", base_key);
        }
 
-       if (!test_CreateKey(b, tctx, handle, TEST_KEY1, NULL)) {
+       test_key1 = talloc_asprintf(tctx, "%s\\%s", base_key, TEST_KEY1);
+
+       if (!test_CreateKey(b, tctx, handle, test_key1, NULL)) {
                torture_comment(tctx,
                                "CreateKey failed - not considering a 
failure\n");
        } else {
@@ -2393,7 +2481,7 @@ static bool test_key_base(struct torture_context *tctx,
                        ret = false;
                }
 
-               if (!test_OpenKey(b, tctx, handle, TEST_KEY1, &newhandle)) {
+               if (!test_OpenKey(b, tctx, handle, test_key1, &newhandle)) {
                        torture_fail(tctx,
                                     "CreateKey failed (OpenKey after Create 
didn't work)\n");
                }
@@ -2403,7 +2491,8 @@ static bool test_key_base(struct torture_context *tctx,
                                "simple SetValue test failed");
                        torture_assert(tctx, test_SetValue_extended(b, tctx, 
&newhandle),
                                "extended SetValue test failed");
-                       torture_assert(tctx, test_CreateKey_keytypes(tctx, b, 
&newhandle, hkey),
+               } else {
+                       torture_assert(tctx, test_CreateKey_keytypes(tctx, b, 
&newhandle, test_key1, hkey),
                                "keytype test failed");
                }
 
@@ -2412,7 +2501,7 @@ static bool test_key_base(struct torture_context *tctx,
                                     "CreateKey failed (CloseKey after Open 
didn't work)\n");
                }
 
-               if (!test_DeleteKey(b, tctx, handle, TEST_KEY1)) {
+               if (!test_DeleteKey(b, tctx, handle, test_key1)) {
                        torture_comment(tctx, "DeleteKey failed\n");
                        ret = false;
                } else {
@@ -2425,7 +2514,7 @@ static bool test_key_base(struct torture_context *tctx,
                }
 
                if (deleted) {
-                       if (!test_OpenKey_opts(tctx, b, handle, TEST_KEY1,
+                       if (!test_OpenKey_opts(tctx, b, handle, test_key1,
                                               REG_OPTION_NON_VOLATILE,
                                               SEC_FLAG_MAXIMUM_ALLOWED,
                                               &newhandle,
@@ -2437,51 +2526,62 @@ static bool test_key_base(struct torture_context *tctx,
                        }
                }
 
-               if (test_CreateKey(b, tctx, handle, TEST_KEY3, NULL)) {
+               test_key3 = talloc_asprintf(tctx, "%s\\%s", base_key, 
TEST_KEY3);
+
+               if (test_CreateKey(b, tctx, handle, test_key3, NULL)) {
                        created3 = true;
                }
 
+               test_subkey = talloc_asprintf(tctx, "%s\\%s", test_key3, 
TEST_SUBKEY);
+
                if (created3) {
-                       if (test_CreateKey(b, tctx, handle, TEST_SUBKEY, NULL)) 
{
-                               if (!test_DeleteKey(b, tctx, handle, 
TEST_SUBKEY)) {
+                       if (test_CreateKey(b, tctx, handle, test_subkey, NULL)) 
{
+                               if (!test_DeleteKey(b, tctx, handle, 
test_subkey)) {
                                        torture_comment(tctx, "DeleteKey 
failed\n");
                                        ret = false;
                                }
                        }
 
-                       if (!test_DeleteKey(b, tctx, handle, TEST_KEY3)) {
+                       if (!test_DeleteKey(b, tctx, handle, test_key3)) {
                                torture_comment(tctx, "DeleteKey failed\n");
                                ret = false;
                        }
                }
        }
 
-       test_Cleanup(b, tctx, handle, TEST_KEY_BASE);
+       test_Cleanup(b, tctx, handle, base_key);
 
        return ret;
 }
 
 static bool test_key_base_sd(struct torture_context *tctx,
                             struct dcerpc_pipe *p,
-                            struct policy_handle *handle)
+                            struct policy_handle *handle,
+                            const char *base_key)
 {
        struct policy_handle newhandle;
        bool ret = true, created2 = false, created4 = false;
        struct dcerpc_binding_handle *b = p->binding_handle;
+       const char *test_key2;
+       const char *test_key4;
+
+       torture_skip(tctx, "security descriptor test disabled\n");
 
        if (torture_setting_bool(tctx, "samba3", false) ||
            torture_setting_bool(tctx, "samba4", false)) {
                torture_skip(tctx, "skipping security descriptor tests against 
Samba");
        }
 
-       test_Cleanup(b, tctx, handle, TEST_KEY_BASE);
+       test_Cleanup(b, tctx, handle, base_key);
 
-       if (!test_CreateKey(b, tctx, handle, TEST_KEY_BASE, NULL)) {
+       if (!test_CreateKey(b, tctx, handle, base_key, NULL)) {
                torture_comment(tctx,
-                               "CreateKey (TEST_KEY_BASE) failed\n");
+                               "CreateKey(%s) failed\n", base_key);
        }
 
-       if (test_CreateKey_sd(b, tctx, handle, TEST_KEY2,
+       test_key2 = talloc_asprintf(tctx, "%s\\%s", base_key, TEST_KEY2);
+
+       if (test_CreateKey_sd(b, tctx, handle, test_key2,
                              NULL, &newhandle)) {
                created2 = true;
        }
@@ -2491,7 +2591,9 @@ static bool test_key_base_sd(struct torture_context *tctx,
                ret = false;
        }
 
-       if (test_CreateKey_sd(b, tctx, handle, TEST_KEY4, NULL, &newhandle)) {
+       test_key4 = talloc_asprintf(tctx, "%s\\%s", base_key, TEST_KEY4);
+
+       if (test_CreateKey_sd(b, tctx, handle, test_key4, NULL, &newhandle)) {
                created4 = true;
        }
 
@@ -2500,21 +2602,21 @@ static bool test_key_base_sd(struct torture_context 
*tctx,
                ret = false;
        }
 
-       if (created4 && !test_SecurityDescriptors(p, tctx, handle, TEST_KEY4)) {
+       if (created4 && !test_SecurityDescriptors(p, tctx, handle, test_key4)) {
                ret = false;
        }
 
-       if (created4 && !test_DeleteKey(b, tctx, handle, TEST_KEY4)) {
+       if (created4 && !test_DeleteKey(b, tctx, handle, test_key4)) {
                torture_comment(tctx, "DeleteKey failed\n");
                ret = false;
        }
 
-       if (created2 && !test_DeleteKey(b, tctx, handle, TEST_KEY2)) {
+       if (created2 && !test_DeleteKey(b, tctx, handle, test_key4)) {
                torture_comment(tctx, "DeleteKey failed\n");
                ret = false;
        }
 
-       test_Cleanup(b, tctx, handle, TEST_KEY_BASE);
+       test_Cleanup(b, tctx, handle, base_key);
 
        return ret;
 }
@@ -2526,6 +2628,7 @@ static bool test_Open(struct torture_context *tctx, 
struct dcerpc_pipe *p,
        bool ret = true;
        struct winreg_OpenHKLM r;
        struct dcerpc_binding_handle *b = p->binding_handle;
+       const char *torture_base_key;
        int hkey = 0;
 
        winreg_open_fn open_fn = (winreg_open_fn)userdata;
@@ -2544,12 +2647,16 @@ static bool test_Open(struct torture_context *tctx, 
struct dcerpc_pipe *p,
 
        if (open_fn == (winreg_open_fn)dcerpc_winreg_OpenHKLM_r) {
                hkey = HKEY_LOCAL_MACHINE;
+               torture_base_key = "SOFTWARE\\Samba\\" TEST_KEY_BASE;
        } else if (open_fn == (winreg_open_fn)dcerpc_winreg_OpenHKU_r) {
                hkey = HKEY_USERS;
+               torture_base_key = TEST_KEY_BASE;
        } else if (open_fn == (winreg_open_fn)dcerpc_winreg_OpenHKCR_r) {
                hkey = HKEY_CLASSES_ROOT;
+               torture_base_key = TEST_KEY_BASE;
        } else if (open_fn == (winreg_open_fn)dcerpc_winreg_OpenHKCU_r) {
                hkey = HKEY_CURRENT_USER;
+               torture_base_key = TEST_KEY_BASE;
        } else {
                torture_fail(tctx, "unsupported hkey");
        }
@@ -2560,13 +2667,15 @@ static bool test_Open(struct torture_context *tctx, 
struct dcerpc_pipe *p,
                        "failed to test HKLM wellknown keys");
        }
 
-       if (!test_key_base(tctx, b, &handle, hkey)) {
-               torture_warning(tctx, "failed to test TEST_KEY_BASE");
+       if (!test_key_base(tctx, b, &handle, torture_base_key, hkey)) {
+               torture_warning(tctx, "failed to test TEST_KEY_BASE(%s)",
+                               torture_base_key);
                ret = false;
        }
 
-       if (!test_key_base_sd(tctx, p, &handle)) {
-               torture_warning(tctx, "failed to test TEST_KEY_BASE sd");
+       if (!test_key_base_sd(tctx, p, &handle, torture_base_key)) {
+               torture_warning(tctx, "failed to test TEST_KEY_BASE(%s) sd",
+                               torture_base_key);
                ret = false;
        }


-- 
Samba Shared Repository

Reply via email to