1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-23 17:34:34 +03:00
samba-mirror/selftest/selftest.pl

1018 lines
26 KiB
Perl
Raw Normal View History

#!/usr/bin/perl
# Bootstrap Samba and run a number of tests against it.
# Copyright (C) 2005-2010 Jelmer Vernooij <jelmer@samba.org>
2009-02-04 13:20:14 +03:00
# Copyright (C) 2007-2009 Stefan Metzmacher <metze@samba.org>
2009-03-25 17:40:39 +03:00
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or
# (at your option) any later version.
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
use strict;
use warnings;
use FindBin qw($RealBin $Script);
use File::Spec;
use File::Temp qw(tempfile);
use File::Path qw(remove_tree);
use Getopt::Long;
use POSIX;
use Cwd qw(abs_path);
use lib "$RealBin";
use Subunit;
use SocketWrapper;
use target::Samba;
use Time::HiRes qw(time);
eval {
require Time::HiRes;
Time::HiRes->import("time");
};
if ($@) {
print "You don't have Time::Hires installed !\n";
}
my $opt_help = 0;
my $opt_target = "samba";
my $opt_quick = 0;
my $opt_socket_wrapper = 0;
my $opt_socket_wrapper_pcap = undef;
my $opt_socket_wrapper_keep_pcap = undef;
2012-10-27 03:53:57 +04:00
my $opt_random_order = 0;
my $opt_one = 0;
my @opt_exclude = ();
my @opt_include = ();
my @opt_exclude_env = ();
my @opt_include_env = ();
my $opt_testenv = 0;
2010-12-09 16:46:09 +03:00
my $opt_list = 0;
my $opt_mitkrb5 = 0;
my $opt_resetup_env = undef;
2010-04-08 18:16:15 +04:00
my $opt_load_list = undef;
my $opt_libnss_wrapper_so_path = "";
my $opt_libresolv_wrapper_so_path = "";
my $opt_libsocket_wrapper_so_path = "";
my $opt_libuid_wrapper_so_path = "";
my $opt_libasan_so_path = "";
my $opt_use_dns_faking = 0;
my @testlists = ();
my $srcdir = ".";
my $bindir = "./bin";
my $prefix = "./st";
my @includes = ();
my @excludes = ();
sub find_in_list($$)
{
my ($list, $fullname) = @_;
foreach (@$list) {
if ($fullname =~ /$$_[0]/) {
return ($$_[1]) if ($$_[1]);
return "";
}
}
return undef;
}
sub skip
{
my ($name, $envname) = @_;
my ($env_basename, $env_localpart) = split(/:/, $envname);
if ($opt_target eq "samba3" && $Samba::ENV_NEEDS_AD_DC{$env_basename}) {
return "environment $envname is disabled as this build does not include an AD DC";
}
if (@opt_include_env && !(grep {$_ eq $env_basename} @opt_include_env)) {
return "environment $envname is disabled (via --include-env command line option) in this test run - skipping";
} elsif (@opt_exclude_env && grep {$_ eq $env_basename} @opt_exclude_env) {
return "environment $envname is disabled (via --exclude-env command line option) in this test run - skipping";
}
return find_in_list(\@excludes, $name);
}
sub getlog_env($);
# expand strings from %ENV
sub expand_environment_strings($)
{
my $s = shift;
# we use a reverse sort so we do the longer ones first
foreach my $k (sort { $b cmp $a } keys %ENV) {
$s =~ s/\$$k/$ENV{$k}/g;
}
return $s;
}
my $target;
sub run_testsuite($$$$$)
{
my ($envname, $name, $cmd, $i, $totalsuites) = @_;
my $pcap_file = $target->setup_pcap($name);
Subunit::start_testsuite($name);
Subunit::progress_push();
Subunit::report_time();
system($cmd);
Subunit::report_time();
Subunit::progress_pop();
if ($? == -1) {
print "command: $cmd\n";
printf "expanded command: %s\n", expand_environment_strings($cmd);
Subunit::end_testsuite($name, "error", "Unable to run $cmd: $!");
exit(1);
} elsif ($? & 127) {
print "command: $cmd\n";
printf "expanded command: %s\n", expand_environment_strings($cmd);
Subunit::end_testsuite($name, "error",
sprintf("%s died with signal %d, %s coredump\n", $cmd, ($? & 127), ($? & 128) ? 'with' : 'without'));
exit(1);
}
my $exitcode = $? >> 8;
my $envlog = getlog_env($envname);
if ($envlog ne "") {
2009-06-04 19:30:23 +04:00
print "envlog: $envlog\n";
}
2009-06-04 19:30:23 +04:00
print "command: $cmd\n";
printf "expanded command: %s\n", expand_environment_strings($cmd);
if ($exitcode == 0) {
Subunit::end_testsuite($name, "success");
} else {
Subunit::end_testsuite($name, "failure", "Exit code was $exitcode");
}
$target->cleanup_pcap($pcap_file, $exitcode);
if (not $opt_socket_wrapper_keep_pcap and defined($pcap_file)) {
print "PCAP FILE: $pcap_file\n";
}
if ($exitcode != 0) {
exit(1) if ($opt_one);
}
return $exitcode;
}
sub ShowHelp()
{
print "Samba test runner
Copyright (C) Jelmer Vernooij <jelmer\@samba.org>
2009-02-04 13:20:14 +03:00
Copyright (C) Stefan Metzmacher <metze\@samba.org>
Usage: $Script [OPTIONS] TESTNAME-REGEX [TESTNAME-REGEX...]
Generic options:
--help this help page
--target=samba[3]|win Samba version to target
--testlist=FILE file to read available tests from
--exclude=FILE Exclude tests listed in the file
--include=FILE Include tests listed in the file
--exclude-env=ENV Exclude tests for the specified environment
--include-env=ENV Include tests for the specified environment
Paths:
--prefix=DIR prefix to run tests in [st]
--srcdir=DIR source directory [.]
--bindir=DIR binaries directory [./bin]
Preload cwrap:
--nss_wrapper_so_path=FILE the nss_wrapper library to preload
--resolv_wrapper_so_path=FILE the resolv_wrapper library to preload
--socket_wrapper_so_path=FILE the socket_wrapper library to preload
--uid_wrapper_so_path=FILE the uid_wrapper library to preload
--asan_so_path=FILE the asan library to preload
DNS:
--use-dns-faking Fake DNS entries rather than talking to our
DNS implementation.
Target Specific:
--socket-wrapper-pcap save traffic to pcap directories
--socket-wrapper-keep-pcap keep all pcap files, not just those for tests that
failed
--socket-wrapper enable socket wrapper
Behaviour:
--quick run quick overall test
--one abort when the first test fails
--testenv run a shell in the requested test environment
2010-12-09 16:46:09 +03:00
--list list available tests
";
exit(0);
}
my $result = GetOptions (
'help|h|?' => \$opt_help,
'target=s' => \$opt_target,
'prefix=s' => \$prefix,
'socket-wrapper' => \$opt_socket_wrapper,
'socket-wrapper-pcap' => \$opt_socket_wrapper_pcap,
'socket-wrapper-keep-pcap' => \$opt_socket_wrapper_keep_pcap,
'quick' => \$opt_quick,
'one' => \$opt_one,
'exclude=s' => \@opt_exclude,
'include=s' => \@opt_include,
'exclude-env=s' => \@opt_exclude_env,
'include-env=s' => \@opt_include_env,
'srcdir=s' => \$srcdir,
'bindir=s' => \$bindir,
'testenv' => \$opt_testenv,
2010-12-09 16:46:09 +03:00
'list' => \$opt_list,
'mitkrb5' => \$opt_mitkrb5,
'resetup-environment' => \$opt_resetup_env,
2010-04-08 18:16:15 +04:00
'testlist=s' => \@testlists,
2012-10-27 03:53:57 +04:00
'random-order' => \$opt_random_order,
2010-04-08 18:16:15 +04:00
'load-list=s' => \$opt_load_list,
'nss_wrapper_so_path=s' => \$opt_libnss_wrapper_so_path,
'resolv_wrapper_so_path=s' => \$opt_libresolv_wrapper_so_path,
'socket_wrapper_so_path=s' => \$opt_libsocket_wrapper_so_path,
'uid_wrapper_so_path=s' => \$opt_libuid_wrapper_so_path,
'asan_so_path=s' => \$opt_libasan_so_path,
'use-dns-faking' => \$opt_use_dns_faking
);
exit(1) if (not $result);
ShowHelp() if ($opt_help);
2010-12-09 16:46:09 +03:00
die("--list and --testenv are mutually exclusive") if ($opt_list and $opt_testenv);
# we want unbuffered output
$| = 1;
my @tests = @ARGV;
# quick hack to disable rpc validation when using valgrind - its way too slow
unless (defined($ENV{VALGRIND})) {
$ENV{VALIDATE} = "validate";
$ENV{MALLOC_CHECK_} = 3;
}
# make all our python scripts unbuffered
$ENV{PYTHONUNBUFFERED} = 1;
# do not depend on the users setup
# see also bootstrap/config.py
$ENV{TZ} = "UTC";
$ENV{LC_ALL} = $ENV{LANG} = "en_US.utf8";
my $bindir_abs = abs_path($bindir);
my $torture_maxtime = ($ENV{TORTURE_MAXTIME} or 1200);
$prefix =~ s+//+/+;
$prefix =~ s+/\./+/+;
$prefix =~ s+/$++;
die("using an empty prefix isn't allowed") unless $prefix ne "";
# Ensure we have the test prefix around.
#
# We need restrictive
# permissions on this as some subdirectories in this tree will have
# wider permissions (ie 0777) and this would allow other users on the
# host to subvert the test process.
umask 0077;
mkdir($prefix, 0700) unless -d $prefix;
chmod 0700, $prefix;
# We need to have no umask limitations for the tests.
umask 0000;
my $prefix_abs = abs_path($prefix);
my $tmpdir_abs = abs_path("$prefix/tmp");
mkdir($tmpdir_abs, 0777) unless -d $tmpdir_abs;
my $srcdir_abs = abs_path($srcdir);
die("using an empty absolute prefix isn't allowed") unless $prefix_abs ne "";
die("using '/' as absolute prefix isn't allowed") unless $prefix_abs ne "/";
$ENV{SAMBA_SELFTEST} = "1";
$ENV{PREFIX} = $prefix;
$ENV{PREFIX_ABS} = $prefix_abs;
$ENV{SRCDIR} = $srcdir;
$ENV{SRCDIR_ABS} = $srcdir_abs;
$ENV{BINDIR} = $bindir_abs;
my $tls_enabled = not $opt_quick;
$ENV{TLS_ENABLED} = ($tls_enabled?"yes":"no");
sub prefix_pathvar($$)
{
my ($name, $newpath) = @_;
if (defined($ENV{$name})) {
$ENV{$name} = "$newpath:$ENV{$name}";
} else {
$ENV{$name} = $newpath;
}
}
prefix_pathvar("PKG_CONFIG_PATH", "$bindir_abs/pkgconfig");
prefix_pathvar("PYTHONPATH", "$bindir_abs/python");
if ($opt_socket_wrapper_keep_pcap) {
# Socket wrapper keep pcap implies socket wrapper pcap
$opt_socket_wrapper_pcap = 1;
}
if ($opt_socket_wrapper_pcap) {
# Socket wrapper pcap implies socket wrapper
$opt_socket_wrapper = 1;
}
my $ld_preload = $ENV{LD_PRELOAD};
if ($opt_libasan_so_path) {
if ($ld_preload) {
$ld_preload = "$opt_libasan_so_path:$ld_preload";
} else {
$ld_preload = "$opt_libasan_so_path";
}
}
if ($opt_libnss_wrapper_so_path) {
if ($ld_preload) {
$ld_preload = "$ld_preload:$opt_libnss_wrapper_so_path";
} else {
$ld_preload = "$opt_libnss_wrapper_so_path";
}
}
if ($opt_libresolv_wrapper_so_path) {
if ($ld_preload) {
$ld_preload = "$ld_preload:$opt_libresolv_wrapper_so_path";
} else {
$ld_preload = "$opt_libresolv_wrapper_so_path";
}
}
if ($opt_libsocket_wrapper_so_path) {
if ($ld_preload) {
$ld_preload = "$ld_preload:$opt_libsocket_wrapper_so_path";
} else {
$ld_preload = "$opt_libsocket_wrapper_so_path";
}
}
if ($opt_libuid_wrapper_so_path) {
if ($ld_preload) {
$ld_preload = "$ld_preload:$opt_libuid_wrapper_so_path";
} else {
$ld_preload = "$opt_libuid_wrapper_so_path";
}
}
if (defined($ENV{USE_NAMESPACES})) {
print "Using linux containerization for selftest testenv(s)...\n";
# Create a common bridge to connect up the testenv namespaces. We give
# it the client's IP address, as this is where the tests will run from
my $ipv4_addr = Samba::get_ipv4_addr("client");
my $ipv6_addr = Samba::get_ipv6_addr("client");
system "$ENV{SRCDIR_ABS}/selftest/ns/create_bridge.sh selftest0 $ipv4_addr $ipv6_addr";
}
$ENV{LD_PRELOAD} = $ld_preload;
print "LD_PRELOAD=$ENV{LD_PRELOAD}\n";
# Enable uid_wrapper globally
$ENV{UID_WRAPPER} = 1;
# We are already hitting the limit, so double it.
$ENV{NSS_WRAPPER_MAX_HOSTENTS} = 200;
# Disable RTLD_DEEPBIND hack for Samba bind dlz module
#
# This is needed in order to allow the ldb_*ldap module
# to work with a preloaded socket wrapper.
$ENV{LDB_MODULES_DISABLE_DEEPBIND} = 1;
my $socket_wrapper_dir;
if ($opt_socket_wrapper) {
$socket_wrapper_dir = SocketWrapper::setup_dir("$prefix_abs/w", $opt_socket_wrapper_pcap);
print "SOCKET_WRAPPER_DIR=$socket_wrapper_dir\n";
} elsif (not $opt_list) {
unless ($< == 0) {
warn("not using socket wrapper, but also not running as root. Will not be able to listen on proper ports");
2008-10-20 14:09:36 +04:00
}
}
if ($opt_use_dns_faking) {
print "DNS: Faking nameserver\n";
$ENV{SAMBA_DNS_FAKING} = 1;
}
my $testenv_default = "none";
if ($opt_mitkrb5 == 1) {
$ENV{MITKRB5} = $opt_mitkrb5;
$ENV{KRB5RCACHETYPE} = "none";
}
# After this many seconds, the server will self-terminate. All tests
# must terminate in this time, and testenv will only stay alive this
# long
my $server_maxtime;
if ($opt_testenv) {
# 1 year should be enough :-)
$server_maxtime = 365 * 24 * 60 * 60;
} else {
# make test should run under 5 hours
$server_maxtime = 5 * 60 * 60;
}
if (defined($ENV{SMBD_MAXTIME}) and $ENV{SMBD_MAXTIME} ne "") {
$server_maxtime = $ENV{SMBD_MAXTIME};
}
$target = new Samba($bindir, $srcdir, $server_maxtime,
$opt_socket_wrapper_pcap,
$opt_socket_wrapper_keep_pcap);
unless ($opt_list) {
if ($opt_target eq "samba") {
$testenv_default = "ad_dc";
} elsif ($opt_target eq "samba3") {
$testenv_default = "nt4_member";
}
}
sub read_test_regexes($)
{
my ($name) = @_;
my @ret = ();
open(LF, "<$name") or die("unable to read $name: $!");
while (<LF>) {
chomp;
next if (/^#/);
if (/^(.*?)([ \t]+)\#([\t ]*)(.*?)$/) {
push (@ret, [$1, $4]);
} else {
s/^(.*?)([ \t]+)\#([\t ]*)(.*?)$//;
push (@ret, [$_, undef]);
}
}
close(LF);
return @ret;
}
foreach (@opt_exclude) {
push (@excludes, read_test_regexes($_));
}
foreach (@opt_include) {
push (@includes, read_test_regexes($_));
}
# We give the selftest client 6 different IPv4 addresses to use. Most tests
# only use the first (.11) IP. Note that winsreplication.c is one test that
# uses the other IPs (search for iface_list_count()).
$ENV{SOCKET_WRAPPER_IPV4_NETWORK} = "10.53.57.0";
my $interfaces = Samba::get_interfaces_config("client", 6);
2010-09-23 12:42:57 +04:00
my $clientdir = "$prefix_abs/client";
my $conffile = "$clientdir/client.conf";
$ENV{SMB_CONF_PATH} = $conffile;
2010-09-23 12:42:57 +04:00
sub write_clientconf($$$)
{
2010-09-23 12:42:57 +04:00
my ($conffile, $clientdir, $vars) = @_;
2010-09-23 12:42:57 +04:00
mkdir("$clientdir", 0777) unless -d "$clientdir";
my @subdirs = (
{ name => "private", mask => 0777 },
{ name => "bind-dns", mask => 0777 },
{ name => "lockdir", mask => 0777 },
{ name => "statedir", mask => 0777 },
{ name => "cachedir", mask => 0777 },
{ name => "pkinit", mask => 0700 },
{ name => "pid", mask => 0777 },
# the ncalrpcdir needs exactly 0755 otherwise tests fail.
{ name => "ncalrpcdir", mask => 0755, umask => 0022 },
);
foreach my $sub (@subdirs) {
my $dir = "$clientdir/$sub->{name}";
remove_tree($dir);
my $mask = umask;
if (defined($sub->{umask})) {
umask $sub->{umask};
}
mkdir($dir, $sub->{mask});
umask $mask;
}
my $cadir = "$ENV{SRCDIR_ABS}/selftest/manage-ca/CA-samba.example.com";
my $cacert = "$cadir/Public/CA-samba.example.com-cert.pem";
my $cacrl_pem = "$cadir/Public/CA-samba.example.com-crl.pem";
my $ca_users_dir = "$cadir/Users";
my $client_loglevel = $ENV{CLIENT_LOG_LEVEL} || 1;
# each user has a USER-${USER_PRINCIPAL_NAME}-cert.pem and
# USER-${USER_PRINCIPAL_NAME}-private-key.pem symlink
# We make a copy here and make the certificated easily
# accessable in the client environment.
my $mask = umask;
umask 0077;
opendir USERS, "${ca_users_dir}" or die "Could not open dir '${ca_users_dir}': $!";
for my $d (readdir USERS) {
my $user_dir = "${ca_users_dir}/${d}";
next if ${d} =~ /^\./;
next if (! -d "${user_dir}");
opendir USER, "${user_dir}" or die "Could not open dir '${user_dir}': $!";
for my $l (readdir USER) {
my $user_link = "${user_dir}/${l}";
next if ${l} =~ /^\./;
next if (! -l "${user_link}");
my $dest = "${clientdir}/pkinit/${l}";
Samba::copy_file_content(${user_link}, ${dest});
}
closedir USER;
}
closedir USERS;
umask $mask;
open(CF, ">$conffile");
print CF "[global]\n";
print CF "\tnetbios name = client\n";
if (defined($vars->{DOMAIN})) {
print CF "\tworkgroup = $vars->{DOMAIN}\n";
}
if (defined($vars->{REALM})) {
print CF "\trealm = $vars->{REALM}\n";
}
if ($opt_socket_wrapper) {
print CF "\tinterfaces = $interfaces\n";
}
print CF "
2010-09-23 12:42:57 +04:00
private dir = $clientdir/private
binddns dir = $clientdir/bind-dns
2010-09-23 12:42:57 +04:00
lock dir = $clientdir/lockdir
state directory = $clientdir/statedir
cache directory = $clientdir/cachedir
2010-09-23 12:42:57 +04:00
ncalrpc dir = $clientdir/ncalrpcdir
pid directory = $clientdir/pid
panic action = $RealBin/gdb_backtrace \%d
max xmit = 32K
notify:inotify = false
ldb:nosync = true
system:anonymous = true
client lanman auth = Yes
client min protocol = CORE
log level = $client_loglevel
2010-09-23 12:42:57 +04:00
torture:basedir = $clientdir
#We don't want to pass our self-tests if the PAC code is wrong
gensec:require_pac = true
#We don't want to run 'speed' tests for very long
torture:timelimit = 1
winbind separator = /
tls cafile = ${cacert}
tls crlfile = ${cacrl_pem}
tls verify peer = no_check
include system krb5 conf = no
elasticsearch:mappings = $srcdir_abs/source3/rpc_server/mdssvc/elasticsearch_mappings.json
";
close(CF);
}
my @todo = ();
sub should_run_test($)
{
my $name = shift;
if ($#tests == -1) {
return 1;
}
for (my $i=0; $i <= $#tests; $i++) {
if ($name =~ /$tests[$i]/i) {
return 1;
}
}
return 0;
}
sub read_testlist($)
{
my ($filename) = @_;
my @ret = ();
open(IN, $filename) or die("Unable to open $filename: $!");
while (<IN>) {
if (/-- TEST(-LOADLIST|) --\n/) {
2010-04-12 18:11:31 +04:00
my $supports_loadlist = (defined($1) and $1 eq "-LOADLIST");
my $name = <IN>;
$name =~ s/\n//g;
my $env = <IN>;
$env =~ s/\n//g;
my $loadlist;
if ($supports_loadlist) {
$loadlist = <IN>;
$loadlist =~ s/\n//g;
}
my $cmdline = <IN>;
$cmdline =~ s/\n//g;
if (should_run_test($name) == 1) {
push (@ret, [$name, $env, $cmdline, $loadlist]);
}
} else {
print;
}
}
close(IN) or die("Error creating recipe from $filename");
return @ret;
}
if ($#testlists == -1) {
die("No testlists specified");
}
$ENV{SELFTEST_PREFIX} = "$prefix_abs";
$ENV{SELFTEST_TMPDIR} = "$tmpdir_abs";
$ENV{TMPDIR} = "$tmpdir_abs";
$ENV{TEST_DATA_PREFIX} = "$tmpdir_abs";
if ($opt_quick) {
$ENV{SELFTEST_QUICK} = "1";
} else {
$ENV{SELFTEST_QUICK} = "";
}
$ENV{SELFTEST_MAXTIME} = $torture_maxtime;
my $selftest_resolv_conf_path = "$tmpdir_abs/selftest.resolv.conf";
$ENV{RESOLV_CONF} = "${selftest_resolv_conf_path}.global";
my $selftest_krbt_ccache_path = "$tmpdir_abs/selftest.krb5_ccache";
$ENV{KRB5CCNAME} = "FILE:${selftest_krbt_ccache_path}.global";
my $selftest_gnupghome_path = "$tmpdir_abs/selftest.no.gnupg";
$ENV{GNUPGHOME} = "${selftest_gnupghome_path}.global";
my @available = ();
foreach my $fn (@testlists) {
foreach (read_testlist($fn)) {
my $name = $$_[0];
next if (@includes and not defined(find_in_list(\@includes, $name)));
push (@available, $_);
}
}
2010-04-08 18:16:15 +04:00
my $restricted = undef;
my $restricted_used = {};
2010-04-08 18:16:15 +04:00
if ($opt_load_list) {
$restricted = [];
open(LOAD_LIST, "<$opt_load_list") or die("Unable to open $opt_load_list");
while (<LOAD_LIST>) {
chomp;
2010-04-08 18:16:15 +04:00
push (@$restricted, $_);
}
close(LOAD_LIST);
}
my $individual_tests = undef;
$individual_tests = {};
foreach my $testsuite (@available) {
my $name = $$testsuite[0];
my $skipreason = skip(@$testsuite);
if (defined($restricted)) {
2010-04-08 18:16:15 +04:00
# Find the testsuite for this test
my $match = undef;
2010-04-08 18:16:15 +04:00
foreach my $r (@$restricted) {
if ($r eq $name) {
$individual_tests->{$name} = [];
$match = $r;
$restricted_used->{$r} = 1;
} elsif (substr($r, 0, length($name)+1) eq "$name.") {
2010-09-23 06:21:58 +04:00
push(@{$individual_tests->{$name}}, $r);
$match = $r;
$restricted_used->{$r} = 1;
2010-04-08 18:16:15 +04:00
}
}
if ($match) {
if (defined($skipreason)) {
if (not $opt_list) {
Subunit::skip_testsuite($name, $skipreason);
}
} else {
push(@todo, $testsuite);
}
}
} elsif (defined($skipreason)) {
if (not $opt_list) {
Subunit::skip_testsuite($name, $skipreason);
}
} else {
push(@todo, $testsuite);
}
}
if (defined($restricted)) {
foreach (@$restricted) {
unless (defined($restricted_used->{$_})) {
print "No test or testsuite found matching $_\n";
}
}
} elsif ($#todo == -1) {
print STDERR "No tests to run\n";
exit(1);
}
my $suitestotal = $#todo + 1;
unless ($opt_list) {
Subunit::progress($suitestotal);
Subunit::report_time();
}
my $i = 0;
$| = 1;
my %running_envs = ();
sub get_running_env($)
{
my ($name) = @_;
my $envname = $name;
$envname =~ s/:.*//;
return $running_envs{$envname};
}
sub sighandler($)
{
my $signame = shift;
$SIG{INT} = $SIG{QUIT} = $SIG{TERM} = 'DEFAULT';
$SIG{PIPE} = 'IGNORE';
open(STDOUT, ">&STDERR") or die "can't dup STDOUT to STDERR: $!";
print "$0: PID[$$]: Got SIG${signame} teardown environments.\n";
teardown_env($_) foreach(keys %running_envs);
system("pstree -p $$");
print "$0: PID[$$]: Exiting...\n";
exit(1);
};
$SIG{INT} = $SIG{QUIT} = $SIG{TERM} = $SIG{PIPE} = \&sighandler;
sub setup_env($$)
{
my ($name, $prefix) = @_;
my $testenv_vars = undef;
my $envname = $name;
my $option = $name;
$envname =~ s/:.*//;
$option =~ s/^[^:]*//;
$option =~ s/^://;
$option = "client" if $option eq "";
selftest: Clear environment before provision Currently, if an environment is being provisioned after a test which used ad_member_rfc2307, the provisioning process has all of the following in its environment: { 'DC_NETBIOSNAME' => 'LOCALDC', 'DC_PASSWORD' => 'locDCpass1', 'DC_SERVER_IP' => '127.0.0.21', 'DC_SERVER_IPV6' => 'fd00:0000:0000:0000:0000:0000:5357:5f15', 'DC_SERVER' => 'localdc', 'DC_USERNAME' => 'Administrator', 'DOMAIN' => 'SAMBADOMAIN', 'LOCAL_PATH' => '/.../st/ad_member_rfc2307/share', 'LOCK_DIR' => '/.../st/ad_member_rfc2307/lockdir', 'NETBIOSNAME' => 'RFC2307MEMBER', 'NMBD_SOCKET_DIR' => '/.../st/ad_member_rfc2307/nmbd', 'NSS_WRAPPER_GROUP' => '/.../st/ad_member_rfc2307/private/group', 'NSS_WRAPPER_HOSTNAME' => 'rfc2307member.samba.example.com', 'NSS_WRAPPER_HOSTS' => '/.../st/hosts', 'NSS_WRAPPER_MODULE_FN_PREFIX' => 'winbind', 'NSS_WRAPPER_MODULE_SO_PATH' => '/.../bin/default/nsswitch/libnss-wrapper-winbind.so', 'NSS_WRAPPER_PASSWD' => '/.../st/ad_member_rfc2307/private/passwd', 'PASSWORD' => 'loCalMemberPass', 'REALM' => 'SAMBA.EXAMPLE.COM', 'RESOLV_WRAPPER_HOSTS' => '/.../st/dns_host_file', 'SELFTEST_WINBINDD_SOCKET_DIR' => '/.../st/ad_member_rfc2307/winbindd', 'SERVER_IP' => '127.0.0.34', 'SERVER_IPV6' => 'fd00:0000:0000:0000:0000:0000:5357:5f22', 'SERVER' => 'RFC2307MEMBER', 'USERID' => '55668', 'USERNAME' => 'jamiemcclymont', } Unsurprisingly, some of these can cause issues for the provisioning process, if a reduced subset of tests is being run which causes the provision to encounter never-before-seen pairs of adjacent environments. For example, a run with only TESTS='--include-env=vampire_dc --include-env=ad_member_rfc2307' would fail to start up the vampire_dc with: Could not find machine account in secrets database: Failed to fetch machine account password from secrets.ldb: Could not find entry to match filter: '(&(flatname=SAMBADOMAIN)(objectclass=primaryDomain))' base: 'cn=Primary Domains': No such object: dsdb_search at ../source4/dsdb/common/util.c:4641 Signed-off-by: Jamie McClymont <jamiemcclymont@catalyst.net.nz> Reviewed-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Andreas Schneider <asn@samba.org>
2018-01-29 08:59:34 +03:00
# Initially clear out the environment for the provision, so previous envs'
# variables don't leak in. Provisioning steps must explicitly set their
# necessary variables when calling out to other executables
Samba::clear_exported_envvars();
selftest: Clear environment before provision Currently, if an environment is being provisioned after a test which used ad_member_rfc2307, the provisioning process has all of the following in its environment: { 'DC_NETBIOSNAME' => 'LOCALDC', 'DC_PASSWORD' => 'locDCpass1', 'DC_SERVER_IP' => '127.0.0.21', 'DC_SERVER_IPV6' => 'fd00:0000:0000:0000:0000:0000:5357:5f15', 'DC_SERVER' => 'localdc', 'DC_USERNAME' => 'Administrator', 'DOMAIN' => 'SAMBADOMAIN', 'LOCAL_PATH' => '/.../st/ad_member_rfc2307/share', 'LOCK_DIR' => '/.../st/ad_member_rfc2307/lockdir', 'NETBIOSNAME' => 'RFC2307MEMBER', 'NMBD_SOCKET_DIR' => '/.../st/ad_member_rfc2307/nmbd', 'NSS_WRAPPER_GROUP' => '/.../st/ad_member_rfc2307/private/group', 'NSS_WRAPPER_HOSTNAME' => 'rfc2307member.samba.example.com', 'NSS_WRAPPER_HOSTS' => '/.../st/hosts', 'NSS_WRAPPER_MODULE_FN_PREFIX' => 'winbind', 'NSS_WRAPPER_MODULE_SO_PATH' => '/.../bin/default/nsswitch/libnss-wrapper-winbind.so', 'NSS_WRAPPER_PASSWD' => '/.../st/ad_member_rfc2307/private/passwd', 'PASSWORD' => 'loCalMemberPass', 'REALM' => 'SAMBA.EXAMPLE.COM', 'RESOLV_WRAPPER_HOSTS' => '/.../st/dns_host_file', 'SELFTEST_WINBINDD_SOCKET_DIR' => '/.../st/ad_member_rfc2307/winbindd', 'SERVER_IP' => '127.0.0.34', 'SERVER_IPV6' => 'fd00:0000:0000:0000:0000:0000:5357:5f22', 'SERVER' => 'RFC2307MEMBER', 'USERID' => '55668', 'USERNAME' => 'jamiemcclymont', } Unsurprisingly, some of these can cause issues for the provisioning process, if a reduced subset of tests is being run which causes the provision to encounter never-before-seen pairs of adjacent environments. For example, a run with only TESTS='--include-env=vampire_dc --include-env=ad_member_rfc2307' would fail to start up the vampire_dc with: Could not find machine account in secrets database: Failed to fetch machine account password from secrets.ldb: Could not find entry to match filter: '(&(flatname=SAMBADOMAIN)(objectclass=primaryDomain))' base: 'cn=Primary Domains': No such object: dsdb_search at ../source4/dsdb/common/util.c:4641 Signed-off-by: Jamie McClymont <jamiemcclymont@catalyst.net.nz> Reviewed-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Andreas Schneider <asn@samba.org>
2018-01-29 08:59:34 +03:00
delete $ENV{SOCKET_WRAPPER_DEFAULT_IFACE};
delete $ENV{SMB_CONF_PATH};
$ENV{RESOLV_CONF} = "${selftest_resolv_conf_path}.${envname}/ignore";
$ENV{KRB5CCNAME} = "FILE:${selftest_krbt_ccache_path}.${envname}/ignore";
$ENV{GNUPGHOME} = "${selftest_gnupghome_path}.${envname}/ignore";
if (defined(get_running_env($envname))) {
$testenv_vars = get_running_env($envname);
if (not $testenv_vars->{target}->check_env($testenv_vars)) {
print $testenv_vars->{target}->getlog_env($testenv_vars);
$testenv_vars = undef;
}
} else {
$testenv_vars = $target->setup_env($envname, $prefix);
if (not defined($testenv_vars)) {
my $msg = "$opt_target can't start up known environment '$envname'";
if ($opt_one) {
die($msg);
}
warn $msg;
return;
}
if (ref $testenv_vars ne "HASH") {
return $testenv_vars;
}
if (defined($testenv_vars->{target})) {
$testenv_vars->{target} = $target;
}
}
return undef unless defined($testenv_vars);
$running_envs{$envname} = $testenv_vars;
if ($option eq "local") {
SocketWrapper::set_default_iface($testenv_vars->{SOCKET_WRAPPER_DEFAULT_IFACE});
$ENV{SMB_CONF_PATH} = $testenv_vars->{SERVERCONFFILE};
} elsif ($option eq "client") {
SocketWrapper::set_default_iface(11);
2010-09-23 12:42:57 +04:00
write_clientconf($conffile, $clientdir, $testenv_vars);
$ENV{SMB_CONF_PATH} = $conffile;
} else {
die("Unknown option[$option] for envname[$envname]");
}
# export the environment variables for the testenv (SERVER, SERVER_IP, etc)
Samba::export_envvars($testenv_vars);
my $krb5_ccache_path = "${selftest_krbt_ccache_path}.${envname}.${option}";
unlink($krb5_ccache_path);
$ENV{KRB5CCNAME} = "FILE:${krb5_ccache_path}";
return $testenv_vars;
}
sub getlog_env($)
{
my ($envname) = @_;
return "" if ($envname eq "none");
my $env = get_running_env($envname);
return $env->{target}->getlog_env($env);
}
sub check_env($)
{
my ($envname) = @_;
my $env = get_running_env($envname);
return $env->{target}->check_env($env);
}
sub teardown_env($)
{
my ($envname) = @_;
return if ($envname eq "none");
print STDERR "teardown_env($envname)\n";
my $env = get_running_env($envname);
$env->{target}->teardown_env($env);
delete $running_envs{$envname};
}
# This 'global' file needs to be empty when we start
unlink("$prefix_abs/dns_host_file");
unlink("$prefix_abs/hosts");
2012-10-27 03:53:57 +04:00
if ($opt_random_order) {
require List::Util;
my @newtodo = List::Util::shuffle(@todo);
@todo = @newtodo;
}
if ($opt_testenv) {
my $testenv_name = $ENV{SELFTEST_TESTENV};
$testenv_name = $testenv_default unless defined($testenv_name);
my $testenv_vars = setup_env($testenv_name, $prefix);
if (not $testenv_vars or $testenv_vars eq "UNKNOWN") {
die("Unable to setup environment $testenv_name");
}
$ENV{PIDDIR} = $testenv_vars->{PIDDIR};
$ENV{ENVNAME} = $testenv_name;
my $envvarstr = Samba::exported_envvars_str($testenv_vars);
my @term_args = ("echo -e \"
Welcome to the Samba4 Test environment '$testenv_name'
This matches the client environment used in make test
server is pid `cat \$PIDDIR/samba.pid`
Some useful environment variables:
TORTURE_OPTIONS=\$TORTURE_OPTIONS
SMB_CONF_PATH=\$SMB_CONF_PATH
$envvarstr
\" && LD_LIBRARY_PATH=$ENV{LD_LIBRARY_PATH} bash");
my @term = ();
if ($ENV{TERMINAL}) {
@term = ($ENV{TERMINAL});
# override the default terminal args (if specified)
if (defined($ENV{TERMINAL_ARGS})) {
@term_args = split(/ /, $ENV{TERMINAL_ARGS});
}
} else {
@term = ("xterm", "-e");
unshift(@term_args, ("bash", "-c"));
}
system(@term, @term_args);
teardown_env($testenv_name);
2010-12-09 16:46:09 +03:00
} elsif ($opt_list) {
foreach (@todo) {
my $name = $$_[0];
my $envname = $$_[1];
my $cmd = $$_[2];
my $listcmd = $$_[3];
2010-12-09 16:46:09 +03:00
unless (defined($listcmd)) {
2010-12-09 16:46:09 +03:00
warn("Unable to list tests in $name");
# Rather than ignoring this testsuite altogether, just pretend the entire testsuite is
# a single "test".
print "$name\n";
2010-12-09 16:46:09 +03:00
next;
}
system($listcmd);
if ($? == -1) {
die("Unable to run $listcmd: $!");
} elsif ($? & 127) {
die(sprintf("%s died with signal %d, %s coredump\n", $listcmd, ($? & 127), ($? & 128) ? 'with' : 'without'));
}
my $exitcode = $? >> 8;
if ($exitcode != 0) {
die("$cmd exited with exit code $exitcode");
}
2010-12-09 16:46:09 +03:00
}
} else {
foreach (@todo) {
$i++;
my $cmd = $$_[2];
my $name = $$_[0];
my $envname = $$_[1];
my $envvars = setup_env($envname, $prefix);
if (not defined($envvars)) {
Subunit::start_testsuite($name);
Subunit::end_testsuite($name, "error",
"unable to set up environment $envname - exiting");
next;
} elsif ($envvars eq "UNKNOWN") {
Subunit::start_testsuite($name);
Subunit::end_testsuite($name, "error",
"environment $envname is unknown - exiting");
next;
}
# Generate a file with the individual tests to run, if the
# test runner for this test suite supports it.
if ($individual_tests and $individual_tests->{$name}) {
if ($$_[3]) {
my ($fh, $listid_file) = tempfile(UNLINK => 0);
foreach my $test (@{$individual_tests->{$name}}) {
2010-09-23 06:21:58 +04:00
print $fh substr($test, length($name)+1) . "\n";
}
2010-09-23 06:08:37 +04:00
$cmd =~ s/\$LOADLIST/--load-list=$listid_file/g;
} else {
warn("Unable to run individual tests in $name, it does not support --loadlist.");
}
}
run_testsuite($envname, $name, $cmd, $i, $suitestotal);
teardown_env($envname) if ($opt_resetup_env);
}
}
print "\n";
teardown_env($_) foreach (keys %running_envs);
my $failed = 0;
# if there were any valgrind failures, show them
foreach (<$prefix/valgrind.log*>) {
next unless (-s $_);
print "VALGRIND FAILURE\n";
$failed++;
system("cat $_");
}
exit 0;