The branch, master has been updated
       via  b972bd5 s4-torture: Add a user creation check.
       via  4186ef9 s4-torture: Add a samr privilege check.
       via  b411b81 s4-torture: Add torture_delete_testuser().
       via  80e942a s4-torture: Add domain_handle to test_join struct.
       via  beb42c3 s3-build: Add .clang_complete.
      from  790c6b4 s3:rpc_client: remove references to auth_ntlmssp_state

http://gitweb.samba.org/?p=samba.git;a=shortlog;h=master


- Log -----------------------------------------------------------------
commit b972bd53d736bbf2720585bc8f1ed316a647a5d6
Author: Andreas Schneider <[email protected]>
Date:   Mon Sep 26 17:48:01 2011 +0200

    s4-torture: Add a user creation check.
    
    This adds a patch which creates a non-privileged user and then tries to
    create a new user as the non-privileged user.
    
    Pretty simple test but it found #8509.
    
    Autobuild-User: Andreas Schneider <[email protected]>
    Autobuild-Date: Thu Oct 27 18:51:14 CEST 2011 on sn-devel-104

commit 4186ef9560804375fedca7c43faa80e57f868339
Author: Andreas Schneider <[email protected]>
Date:   Thu Sep 15 08:54:44 2011 +0200

    s4-torture: Add a samr privilege check.
    
    This is the first part which checks if a deleted user is propagated
    correctly to all daemons and caches with user information are emtpy.

commit b411b81642a6317f11cfb67c04fc1313ff009bea
Author: Andreas Schneider <[email protected]>
Date:   Fri Sep 23 16:57:25 2011 +0200

    s4-torture: Add torture_delete_testuser().

commit 80e942aec955af86b197893b6ca661e3e521066d
Author: Andreas Schneider <[email protected]>
Date:   Fri Sep 23 16:56:59 2011 +0200

    s4-torture: Add domain_handle to test_join struct.

commit beb42c3774d170f2b52627409aa7ae383337a090
Author: Andreas Schneider <[email protected]>
Date:   Thu Sep 15 17:26:18 2011 +0200

    s3-build: Add .clang_complete.

-----------------------------------------------------------------------

Summary of changes:
 source3/selftest/tests.py       |    1 +
 source4/.clang_complete         |   10 +
 source4/torture/rpc/rpc.c       |    1 +
 source4/torture/rpc/samr_priv.c |  615 +++++++++++++++++++++++++++++++++++++++
 source4/torture/rpc/testjoin.c  |   22 ++-
 source4/torture/wscript_build   |    2 +-
 6 files changed, 646 insertions(+), 5 deletions(-)
 create mode 100644 source4/.clang_complete
 create mode 100644 source4/torture/rpc/samr_priv.c


Changeset truncated at 500 lines:

diff --git a/source3/selftest/tests.py b/source3/selftest/tests.py
index b4c41fd..546ca12 100755
--- a/source3/selftest/tests.py
+++ b/source3/selftest/tests.py
@@ -191,6 +191,7 @@ rpc = ["rpc.authcontext", "rpc.samba3.bind", 
"rpc.samba3.srvsvc", "rpc.samba3.sh
        "rpc.lsa.privileges", "rpc.lsa.secrets",
        "rpc.samr", "rpc.samr.users", "rpc.samr.users.privileges", 
"rpc.samr.passwords",
        "rpc.samr.passwords.pwdlastset", "rpc.samr.large-dc", 
"rpc.samr.machine.auth",
+       "rpc.samr.priv",
        "rpc.netlogon.admin",
        "rpc.schannel", "rpc.schannel2", "rpc.bench-schannel1", "rpc.join", 
"rpc.bind"]
 
diff --git a/source4/.clang_complete b/source4/.clang_complete
new file mode 100644
index 0000000..bfaf852
--- /dev/null
+++ b/source4/.clang_complete
@@ -0,0 +1,10 @@
+-I../bin/default
+-I../bin/default/include
+-I../bin/default/include/public/
+-I../bin/default/source4
+-I../lib
+-I../lib/popt
+-I../lib/replace
+-I..
+-I./include
+-I.
diff --git a/source4/torture/rpc/rpc.c b/source4/torture/rpc/rpc.c
index 01ce93f..41668e0 100644
--- a/source4/torture/rpc/rpc.c
+++ b/source4/torture/rpc/rpc.c
@@ -503,6 +503,7 @@ NTSTATUS torture_rpc_init(void)
        torture_suite_add_suite(suite, 
torture_rpc_samr_passwords_lockout(suite));
        torture_suite_add_suite(suite, torture_rpc_samr_user_privileges(suite));
        torture_suite_add_suite(suite, torture_rpc_samr_large_dc(suite));
+       torture_suite_add_suite(suite, torture_rpc_samr_priv(suite));
        torture_suite_add_suite(suite, torture_rpc_epmapper(suite));
        torture_suite_add_suite(suite, torture_rpc_initshutdown(suite));
        torture_suite_add_suite(suite, torture_rpc_oxidresolve(suite));
diff --git a/source4/torture/rpc/samr_priv.c b/source4/torture/rpc/samr_priv.c
new file mode 100644
index 0000000..20d9640
--- /dev/null
+++ b/source4/torture/rpc/samr_priv.c
@@ -0,0 +1,615 @@
+/*
+ * Unix SMB/CIFS implementation.
+ * test suite for samr rpc operations
+ *
+ * Copyright (c) 2011      Andreas Schneider
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program.  If not, see <http://www.gnu.org/licenses/>.
+ */
+
+#include "includes.h"
+#include "param/param.h"
+#include "torture/torture.h"
+#include "librpc/gen_ndr/ndr_samr_c.h"
+#include "librpc/rpc/dcerpc_proto.h"
+#include "libcli/security/security.h"
+#include "torture/rpc/torture_rpc.h"
+
+#define TEST_ACCOUNT_NAME "guru"
+
+struct torture_user {
+       const char *username;
+       const char *password;
+       const char *domain;
+       uint32_t *builtin_memberships;
+       uint32_t num_builtin_memberships;
+       bool admin_rights;
+};
+
+struct torture_access_context {
+       struct dcerpc_pipe *pipe;
+       struct torture_user user;
+       struct test_join *join;
+};
+
+static void init_lsa_String(struct lsa_String *name, const char *s)
+{
+       name->string = s;
+}
+
+static bool test_samr_queryUserInfo(struct torture_context *tctx,
+                                   struct dcerpc_binding_handle *b,
+                                   struct policy_handle *user_handle)
+{
+       struct samr_QueryUserInfo r;
+       union samr_UserInfo *info;
+       NTSTATUS status;
+
+       r.in.level = UserGeneralInformation;
+       r.in.user_handle = user_handle;
+       r.out.info = &info;
+
+       status = dcerpc_samr_QueryUserInfo_r(b,
+                                            tctx,
+                                            &r);
+       torture_assert_ntstatus_ok(tctx, status, "queryUserInfo failed");
+       if (!NT_STATUS_EQUAL(r.out.result, NT_STATUS_OK)) {
+               torture_comment(tctx, "queryUserInfo failed");
+               return false;
+       }
+
+       return true;
+}
+
+static bool test_LookupName(struct dcerpc_binding_handle *b,
+                           struct torture_context *tctx,
+                           struct policy_handle *domain_handle,
+                           const char *name,
+                           uint32_t *rid)
+{
+       NTSTATUS status;
+       struct samr_LookupNames n;
+       struct lsa_String sname[1];
+       struct samr_Ids rids, types;
+
+       init_lsa_String(&sname[0], name);
+
+       n.in.domain_handle = domain_handle;
+       n.in.num_names = 1;
+       n.in.names = sname;
+       n.out.rids = &rids;
+       n.out.types = &types;
+
+       status = dcerpc_samr_LookupNames_r(b, tctx, &n);
+       if (!NT_STATUS_IS_OK(status)) {
+               return false;
+       }
+       if (!NT_STATUS_IS_OK(n.out.result)) {
+               return false;
+       }
+
+       *rid = n.out.rids->ids[0];
+       return true;
+}
+
+static bool test_samr_CreateUser(struct torture_context *tctx,
+                                struct dcerpc_binding_handle *b,
+                                struct policy_handle *domain_handle,
+                                const char *name,
+                                struct policy_handle *user_handle)
+{
+       struct lsa_String username;
+       struct samr_CreateUser r;
+       uint32_t rid = 0;
+       NTSTATUS status;
+
+       init_lsa_String(&username, name);
+
+       r.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
+       r.in.domain_handle = domain_handle;
+       r.in.account_name = &username;
+       r.out.user_handle = user_handle;
+       r.out.rid = &rid;
+
+       status = dcerpc_samr_CreateUser_r(b, tctx, &r);
+       torture_assert_ntstatus_ok(tctx, status, "CreateUser failed");
+       if (!NT_STATUS_IS_OK(r.out.result)) {
+               torture_comment(tctx, "CreateUser failed");
+               return false;
+       }
+
+       return true;
+}
+
+static bool test_samr_OpenUser(struct torture_context *tctx,
+                              struct dcerpc_binding_handle *b,
+                              struct policy_handle *domain_handle,
+                              const char *name,
+                              struct policy_handle *user_handle,
+                              bool expected)
+{
+       struct samr_OpenUser r;
+       uint32_t rid = 0;
+       NTSTATUS status;
+       bool ok;
+
+       ok = test_LookupName(b, tctx, domain_handle, name, &rid);
+       if (!ok && expected) {
+               torture_comment(tctx, " - lookup name for %s failed\n", name);
+               return true;
+       } else if (!ok) {
+               return false;
+       }
+
+       r.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
+       r.in.domain_handle = domain_handle;
+       r.in.rid = rid;
+       r.out.user_handle = user_handle;
+
+       status = dcerpc_samr_OpenUser_r(b, tctx, &r);
+       torture_assert_ntstatus_ok(tctx, status, "CreateUser failed");
+       if (!NT_STATUS_IS_OK(r.out.result)) {
+               torture_comment(tctx, "CreateUser failed");
+               return false;
+       }
+
+       return true;
+}
+
+static bool test_samr_openDomain(struct torture_context *tctx,
+                                struct dcerpc_binding_handle *b,
+                                struct policy_handle *connect_handle,
+                                const char *domain,
+                                struct policy_handle *domain_handle)
+{
+       struct samr_LookupDomain r;
+       struct samr_OpenDomain r2;
+       struct lsa_String n;
+       struct dom_sid *sid;
+       NTSTATUS status;
+
+       r.in.connect_handle = connect_handle;
+       init_lsa_String(&n, domain);
+       r.in.domain_name = &n;
+       r.out.sid = &sid;
+
+       status = dcerpc_samr_LookupDomain_r(b, tctx, &r);
+       torture_assert_ntstatus_ok(tctx, status, "LookupDomain failed");
+       if (!NT_STATUS_IS_OK(r.out.result)) {
+               torture_comment(tctx, "LookupDomain failed - %s\n", 
nt_errstr(r.out.result));
+               return false;
+       }
+
+       r2.in.connect_handle = connect_handle;
+       r2.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
+       r2.in.sid = sid;
+       r2.out.domain_handle = domain_handle;
+
+       status = dcerpc_samr_OpenDomain_r(b, tctx, &r2);
+       torture_assert_ntstatus_ok(tctx, status, "OpenDomain failed");
+       if (!NT_STATUS_IS_OK(r2.out.result)) {
+               torture_comment(tctx, "OpenDomain failed - %s\n", 
nt_errstr(r.out.result));
+               return false;
+       }
+
+       return true;
+}
+
+static bool test_samr_Connect(struct torture_context *tctx,
+                             struct dcerpc_binding_handle *b,
+                             struct policy_handle *connect_handle)
+{
+       struct samr_Connect r;
+       NTSTATUS status;
+
+       r.in.system_name = 0;
+       r.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
+       r.out.connect_handle = connect_handle;
+
+       status = dcerpc_samr_Connect_r(b, tctx, &r);
+       torture_assert_ntstatus_ok(tctx, status, "SAMR connect failed");
+       if (!NT_STATUS_IS_OK(r.out.result)) {
+               torture_comment(tctx, "Connect failed - %s\n", 
nt_errstr(r.out.result));
+               return false;
+       }
+
+       return true;
+}
+
+static bool test_samr_create_user(struct torture_context *tctx,
+                                 struct torture_access_context *t,
+                                 const char *name)
+{
+       struct dcerpc_binding_handle *b = t->pipe->binding_handle;
+       struct policy_handle connect_handle;
+       struct policy_handle domain_handle;
+       struct policy_handle user_handle;
+       bool ok = false;
+
+       torture_comment(tctx, "Connecting to SAMR\n");
+       ZERO_STRUCT(connect_handle);
+       ok = test_samr_Connect(tctx, b, &connect_handle);
+       torture_assert(tctx, ok, "Unable to connect to domain");
+
+       torture_comment(tctx, "Opening domain %s\n", t->user.domain);
+       ZERO_STRUCT(domain_handle);
+       ok = test_samr_openDomain(tctx,
+                                 b,
+                                 &connect_handle,
+                                 t->user.domain,
+                                 &domain_handle);
+       torture_assert(tctx, ok, "Unable to open to domain");
+
+       torture_comment(tctx, "Creating account %s\n", name);
+       ZERO_STRUCT(user_handle);
+       ok = test_samr_CreateUser(tctx,
+                                 b,
+                                 &domain_handle,
+                                 name,
+                                 &user_handle);
+
+       test_samr_handle_Close(b, tctx, &domain_handle);
+       test_samr_handle_Close(b, tctx, &connect_handle);
+
+       return ok;
+}
+
+static bool test_samr_userinfo_getinfo(struct torture_context *tctx,
+                                      struct dcerpc_pipe *p,
+                                      bool expected)
+{
+       const char *name;
+       struct dcerpc_pipe *p2 = NULL;
+       struct dcerpc_binding_handle *b;
+       struct policy_handle connect_handle;
+       struct policy_handle domain_handle;
+       struct policy_handle user_handle;
+       NTSTATUS status;
+       uint32_t i = 0;
+       bool ok;
+
+       status = torture_rpc_connection(tctx, &p2, &ndr_table_samr);
+       torture_assert_ntstatus_ok(tctx, status,
+                       "Creating secondary connection failed");
+       b = p2->binding_handle;
+
+       torture_comment(tctx, " - 2nd connect\n");
+       /* connect */
+       ZERO_STRUCT(connect_handle);
+       ok = test_samr_Connect(tctx, b, &connect_handle);
+       torture_assert(tctx, ok, "Unable to connect to domain");
+
+       torture_comment(tctx, " - 2nd open domain\n");
+       /* open domain */
+       ZERO_STRUCT(domain_handle);
+       ok = test_samr_openDomain(tctx,
+                                 b,
+                                 &connect_handle,
+                                 torture_setting_string(tctx, "workgroup",
+                                                        
lpcfg_workgroup(tctx->lp_ctx)),
+                                 &domain_handle);
+       torture_assert(tctx, ok, "Unable to open to domain");
+
+       /* create user */
+       name = talloc_asprintf(tctx,
+                              "%s%04d",
+                              TEST_ACCOUNT_NAME,
+                              i);
+
+       torture_comment(tctx, " - 2nd open user\n");
+       ZERO_STRUCT(user_handle);
+       ok = test_samr_OpenUser(tctx,
+                               b,
+                               &domain_handle,
+                               name,
+                               &user_handle,
+                               expected);
+       torture_assert(tctx, ok, "Unable to open user");
+
+       if (!expected) {
+               torture_comment(tctx, " - 2nd query user\n");
+               ok = test_samr_queryUserInfo(tctx, b, &user_handle);
+               torture_assert(tctx, ok, "Unable to query user");
+
+               test_samr_handle_Close(b, tctx, &user_handle);
+       }
+
+       test_samr_handle_Close(b, tctx, &domain_handle);
+       test_samr_handle_Close(b, tctx, &connect_handle);
+
+       talloc_free(p2);
+
+       return true;
+}
+
+#define NUM_RUNS 20
+static bool torture_rpc_samr_caching(struct torture_context *tctx,
+                                    struct dcerpc_pipe *p)
+{
+       struct test_join *join;
+       const char *password = NULL;
+       const char *name;
+       NTSTATUS status;
+       uint32_t i = 0;
+       bool ok;
+
+       torture_comment(tctx, ">>> Testing User Info Caching\n");
+
+       /* create user */
+       name = talloc_asprintf(tctx,
+                              "%s%04d",
+                              TEST_ACCOUNT_NAME,
+                              i);
+
+       torture_comment(tctx, "- Creating user %s\n", name);
+
+       join = torture_create_testuser(tctx,
+                                      name,
+                                      torture_setting_string(tctx, "workgroup",
+                                                             
lpcfg_workgroup(tctx->lp_ctx)),
+                                      ACB_NORMAL,
+                                      &password);
+       if (join == NULL) {
+               return false;
+       }
+
+       torture_comment(tctx, "- Query user information\n");
+       for (i = 0; i < NUM_RUNS; i++) {
+               ok = test_samr_userinfo_getinfo(tctx, p, false);
+               torture_assert(tctx, ok, "test_samr_userinfo_getinfo failed");
+       }
+
+       torture_comment(tctx, "- Delete user\n");
+       status = torture_delete_testuser(tctx,
+                                        join,
+                                        name);
+       if (!NT_STATUS_IS_OK(status)) {
+               torture_comment(tctx, "DeleteUser failed - %s\n",
+                                     nt_errstr(status));
+               return false;
+       }
+
+       torture_comment(tctx, "- Try to query user information again (should 
fail)\n");
+       for (i = 0; i < NUM_RUNS; i++) {
+               ok = test_samr_userinfo_getinfo(tctx,
+                                               p,
+                                               true);
+               torture_assert(tctx, ok, "test_samr_userinfo_getinfo failed");
+       }
+
+       return true;
+}
+#undef NUM_RUNS
+
+static bool torture_rpc_samr_access_setup_membership(struct torture_context 
*tctx,
+                                                    struct dcerpc_pipe *p,
+                                                    uint32_t num_members,
+                                                    uint32_t *members,
+                                                    struct dom_sid *user_sid)
+{
+       struct dcerpc_binding_handle *b = p->binding_handle;
+       struct policy_handle connect_handle, domain_handle;
+       int i;
+
+       torture_comment(tctx,
+               "Setting up BUILTIN membership for %s\n",
+               dom_sid_string(tctx, user_sid));
+
+       for (i=0; i < num_members; i++) {
+               torture_comment(tctx, "adding user to S-1-5-32-%d\n", 
members[i]);
+       }
+
+       /* connect */
+       {
+               struct samr_Connect2 r;
+               r.in.system_name = "";
+               r.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
+               ZERO_STRUCT(connect_handle);
+               r.out.connect_handle = &connect_handle;
+
+               torture_assert_ntstatus_ok(tctx,
+                       dcerpc_samr_Connect2_r(b, tctx, &r),
+                       "samr_Connect2 failed");
+               torture_assert_ntstatus_ok(tctx, r.out.result,
+                       "samr_Connect2 failed");
+       }
+
+       /* open domain */
+       {
+               struct samr_OpenDomain r;
+               r.in.connect_handle = &connect_handle;
+               r.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
+               r.in.sid = dom_sid_parse_talloc(tctx, "S-1-5-32");
+               ZERO_STRUCT(domain_handle);
+               r.out.domain_handle = &domain_handle;
+
+               torture_assert_ntstatus_ok(tctx,
+                       dcerpc_samr_OpenDomain_r(b, tctx, &r),
+                       "samr_OpenDomain failed");
+               torture_assert_ntstatus_ok(tctx, r.out.result,
+                       "samr_OpenDomain failed");
+       }
+
+       for (i = 0; i < num_members; i++) {
+
+               struct policy_handle alias_handle;
+
+               /* open alias */
+               {
+                       struct samr_OpenAlias r;
+                       r.in.domain_handle = &domain_handle;
+                       r.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
+                       r.in.rid = members[i];
+                       ZERO_STRUCT(alias_handle);


-- 
Samba Shared Repository

Reply via email to