1
0
mirror of https://github.com/samba-team/samba.git synced 2025-02-28 01:58:17 +03:00

s4: smb2 : torture: Add new dynamic_share leases test.

Depends on new share "dynamic_share" being set up containing an %R
in the path= statement.

Shows we will break leases and fail to grant new ones
if we get a lease_key+client guid pair match on files
with different fileid's, as can happen on dynamic shares.

Signed-off-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Stefan Metzmacher <metze@samba.org>
This commit is contained in:
Jeremy Allison 2014-11-17 14:17:34 -08:00 committed by Stefan Metzmacher
parent f76c7c7404
commit 62c6c79011
2 changed files with 200 additions and 0 deletions

View File

@ -879,6 +879,12 @@ sub provision($$$$$$)
my $badnames_shrdir="$shrdir/badnames";
push(@dirs,$badnames_shrdir);
my $lease1_shrdir="$shrdir/SMB2_10";
push(@dirs,$lease1_shrdir);
my $lease2_shrdir="$shrdir/SMB3_00";
push(@dirs,$lease2_shrdir);
# this gets autocreated by winbindd
my $wbsockdir="$prefix_abs/winbindd";
my $wbsockprivdir="$lockdir/winbindd_privileged";
@ -1223,6 +1229,10 @@ sub provision($$$$$$)
[badname-tmp]
path = $badnames_shrdir
guest ok = yes
[dynamic_share]
path = $shrdir/%R
guest ok = yes
";
close(CONF);

View File

@ -27,6 +27,7 @@
#include "torture/smb2/proto.h"
#include "torture/util.h"
#include "libcli/smb/smbXcli_base.h"
#include "lib/param/param.h"
#define CHECK_VAL(v, correct) do { \
if ((v) != (correct)) { \
@ -2994,6 +2995,194 @@ static bool test_lease_timeout(struct torture_context *tctx,
return ret;
}
static bool test_lease_dynamic_share(struct torture_context *tctx,
struct smb2_tree *tree1a)
{
TALLOC_CTX *mem_ctx = talloc_new(tctx);
struct smb2_create io;
struct smb2_lease ls1;
struct smb2_handle h, h1, h2;
struct smb2_write w;
NTSTATUS status;
const char *fname = "dynamic_path.dat";
bool ret = true;
uint32_t caps;
struct smb2_tree *tree_2_1 = NULL;
struct smb2_tree *tree_3_0 = NULL;
struct smbcli_options options2_1;
struct smbcli_options options3_0;
const char *orig_share = NULL;
if (!TARGET_IS_SAMBA3(tctx)) {
torture_skip(tctx, "dynamic shares are not supported");
return true;
}
options2_1 = tree1a->session->transport->options;
options3_0 = tree1a->session->transport->options;
caps = smb2cli_conn_server_capabilities(tree1a->session->transport->conn);
if (!(caps & SMB2_CAP_LEASING)) {
torture_skip(tctx, "leases are not supported");
}
/*
* Save off original share name and change it to dynamic_share.
* This must have been pre-created with a dynamic path containing
* %R.
*/
orig_share = lpcfg_parm_string(tctx->lp_ctx, NULL, "torture", "share");
orig_share = talloc_strdup(tctx->lp_ctx, orig_share);
if (orig_share == NULL) {
torture_result(tctx, TORTURE_FAIL, __location__ "no memory\n");
ret = false;
goto done;
}
lpcfg_set_cmdline(tctx->lp_ctx, "torture:share", "dynamic_share");
/* Set max protocol to SMB2.1 */
options2_1.max_protocol = PROTOCOL_SMB2_10;
/* create a new connection (same client_guid) */
if (!torture_smb2_connection_ext(tctx, 0, &options2_1, &tree_2_1)) {
torture_warning(tctx, "couldn't reconnect max protocol 2.1, bailing\n");
ret = false;
goto done;
}
tree_2_1->session->transport->lease.handler = torture_lease_handler;
tree_2_1->session->transport->lease.private_data = tree_2_1;
tree_2_1->session->transport->oplock.handler = torture_oplock_handler;
tree_2_1->session->transport->oplock.private_data = tree_2_1;
smb2_util_unlink(tree_2_1, fname);
/* Set max protocol to SMB3.0 */
options3_0.max_protocol = PROTOCOL_SMB3_00;
/* create a new connection (same client_guid) */
if (!torture_smb2_connection_ext(tctx, 0, &options3_0, &tree_3_0)) {
torture_warning(tctx, "couldn't reconnect max protocol 3.0, bailing\n");
ret = false;
goto done;
}
tree_3_0->session->transport->lease.handler = torture_lease_handler;
tree_3_0->session->transport->lease.private_data = tree_3_0;
tree_3_0->session->transport->oplock.handler = torture_oplock_handler;
tree_3_0->session->transport->oplock.private_data = tree_3_0;
smb2_util_unlink(tree_3_0, fname);
ZERO_STRUCT(break_info);
/* Get RWH lease over connection 2_1 */
smb2_lease_create(&io, &ls1, false, fname, LEASE1, smb2_util_lease_state("RWH"));
status = smb2_create(tree_2_1, mem_ctx, &io);
CHECK_STATUS(status, NT_STATUS_OK);
CHECK_CREATED(&io, CREATED, FILE_ATTRIBUTE_ARCHIVE);
CHECK_LEASE(&io, "RWH", true, LEASE1, 0);
h = io.out.file.handle;
/* Write some data into it. */
w.in.file.handle = h;
w.in.offset = 0;
w.in.data = data_blob_talloc(mem_ctx, NULL, 4096);
memset(w.in.data.data, '1', w.in.data.length);
status = smb2_write(tree_2_1, &w);
CHECK_STATUS(status, NT_STATUS_OK);
/* Open the same name over connection 3_0. */
smb2_lease_create(&io, &ls1, false, fname, LEASE1, smb2_util_lease_state("RWH"));
status = smb2_create(tree_3_0, mem_ctx, &io);
CHECK_STATUS(status, NT_STATUS_OK);
h1 = io.out.file.handle;
CHECK_CREATED(&io, CREATED, FILE_ATTRIBUTE_ARCHIVE);
/* h1 should have replied with NONE. */
CHECK_LEASE(&io, "", true, LEASE1, 0);
/* We should have broken h to NONE. */
CHECK_BREAK_INFO("RWH", "", LEASE1);
/* Try to upgrade to RWH over connection 2_1 */
smb2_lease_create(&io, &ls1, false, fname, LEASE1, smb2_util_lease_state("RWH"));
status = smb2_create(tree_2_1, mem_ctx, &io);
CHECK_STATUS(status, NT_STATUS_OK);
h2 = io.out.file.handle;
CHECK_VAL(io.out.create_action, NTCREATEX_ACTION_EXISTED);
CHECK_VAL(io.out.size, 4096);
CHECK_VAL(io.out.file_attr, FILE_ATTRIBUTE_ARCHIVE);
/* Should have been denied. */
CHECK_LEASE(&io, "", true, LEASE1, 0);
smb2_util_close(tree_2_1, h2);
/* Try to upgrade to RWH over connection 3_0 */
smb2_lease_create(&io, &ls1, false, fname, LEASE1, smb2_util_lease_state("RWH"));
status = smb2_create(tree_3_0, mem_ctx, &io);
CHECK_STATUS(status, NT_STATUS_OK);
h2 = io.out.file.handle;
CHECK_VAL(io.out.create_action, NTCREATEX_ACTION_EXISTED);
CHECK_VAL(io.out.size, 0);
CHECK_VAL(io.out.file_attr, FILE_ATTRIBUTE_ARCHIVE);
/* Should have been denied. */
CHECK_LEASE(&io, "", true, LEASE1, 0);
smb2_util_close(tree_3_0, h2);
/* Write some data into it. */
w.in.file.handle = h1;
w.in.offset = 0;
w.in.data = data_blob_talloc(mem_ctx, NULL, 1024);
memset(w.in.data.data, '2', w.in.data.length);
status = smb2_write(tree_3_0, &w);
CHECK_STATUS(status, NT_STATUS_OK);
/* Close everything.. */
smb2_util_close(tree_2_1, h);
smb2_util_close(tree_3_0, h1);
/* And ensure we can get a lease ! */
smb2_lease_create(&io, &ls1, false, fname, LEASE1, smb2_util_lease_state("RWH"));
status = smb2_create(tree_2_1, mem_ctx, &io);
CHECK_STATUS(status, NT_STATUS_OK);
CHECK_VAL(io.out.create_action, NTCREATEX_ACTION_EXISTED);
CHECK_VAL(io.out.file_attr, FILE_ATTRIBUTE_ARCHIVE);
CHECK_LEASE(&io, "RWH", true, LEASE1, 0);
h = io.out.file.handle;
/* And the file is the right size. */
CHECK_VAL(io.out.size, 4096); \
/* Close it. */
smb2_util_close(tree_2_1, h);
/* And ensure we can get a lease ! */
smb2_lease_create(&io, &ls1, false, fname, LEASE1, smb2_util_lease_state("RWH"));
status = smb2_create(tree_3_0, mem_ctx, &io);
CHECK_STATUS(status, NT_STATUS_OK);
CHECK_VAL(io.out.create_action, NTCREATEX_ACTION_EXISTED);
CHECK_VAL(io.out.file_attr, FILE_ATTRIBUTE_ARCHIVE);
CHECK_LEASE(&io, "RWH", true, LEASE1, 0);
h = io.out.file.handle;
/* And the file is the right size. */
CHECK_VAL(io.out.size, 1024); \
/* Close it. */
smb2_util_close(tree_3_0, h);
done:
smb2_util_close(tree_2_1, h);
smb2_util_close(tree_3_0, h1);
smb2_util_close(tree_3_0, h2);
smb2_util_unlink(tree_2_1, fname);
smb2_util_unlink(tree_3_0, fname);
/* Set sharename back. */
lpcfg_set_cmdline(tctx->lp_ctx, "torture:share", orig_share);
talloc_free(mem_ctx);
return ret;
}
struct torture_suite *torture_smb2_lease_init(void)
{
@ -3025,6 +3214,7 @@ struct torture_suite *torture_smb2_lease_init(void)
torture_suite_add_1smb2_test(suite, "v2_epoch2", test_lease_v2_epoch2);
torture_suite_add_1smb2_test(suite, "v2_epoch3", test_lease_v2_epoch3);
torture_suite_add_1smb2_test(suite, "v2_complex1", test_lease_v2_complex1);
torture_suite_add_1smb2_test(suite, "dynamic_share", test_lease_dynamic_share);
torture_suite_add_1smb2_test(suite, "timeout", test_lease_timeout);
suite->description = talloc_strdup(suite, "SMB2-LEASE tests");