1
0
mirror of https://github.com/samba-team/samba.git synced 2025-02-23 09:57:40 +03:00

selftest/Samba4: split provision() into provision_raw_prepare() and provision_raw_run()

This functions will be reused soon for a Samba34.pm used by
a 'make selftest34'

metze
This commit is contained in:
Stefan Metzmacher 2009-02-04 11:18:32 +01:00
parent f0e75ff363
commit da12481df6

View File

@ -506,191 +506,229 @@ EOF
close(ADMINCERTFILE);
}
sub provision($$$$$$)
#
# provision_raw_prepare() is also used by Samba34.pm!
#
sub provision_raw_prepare($$$$$$)
{
my ($self, $prefix, $server_role, $netbiosname, $netbiosalias, $swiface, $password) = @_;
my $ctx;
my $server_loglevel = 1;
my $username = "administrator";
my $domain = "SAMBADOMAIN";
my $realm = "SAMBA.EXAMPLE.COM";
my $dnsname = "samba.example.com";
my $basedn = "dc=samba,dc=example,dc=com";
my $unix_name = ($ENV{USER} or $ENV{LOGNAME} or `whoami`);
chomp $unix_name;
my $unix_uid = $>;
my $unix_gids_str = $);
my @unix_gids = split(" ", $unix_gids_str);
-d $prefix or mkdir($prefix, 0777) or die("Unable to create $prefix");
my $prefix_abs = abs_path($prefix);
my $tmpdir = "$prefix_abs/tmp";
my $etcdir = "$prefix_abs/etc";
my $piddir = "$prefix_abs/pid";
my $conffile = "$etcdir/smb.conf";
my $krb5_config = "$etcdir/krb5.conf";
my $privatedir = "$prefix_abs/private";
my $ncalrpcdir = "$prefix_abs/ncalrpc";
my $lockdir = "$prefix_abs/lockdir";
my $winbindd_socket_dir = "$prefix_abs/winbindd_socket";
my $winbindd_privileged_socket_dir = "$prefix_abs/winbindd_privileged_socket";
my $ntp_signd_socket_dir = "$prefix_abs/ntp_signd_socket";
my $nsswrap_passwd = "$etcdir/passwd";
my $nsswrap_group = "$etcdir/group";
my $configuration = "--configfile=$conffile";
my $ldapdir = "$privatedir/ldap";
die ("prefix=''") if $prefix_abs eq "";
die ("prefix='/'") if $prefix_abs eq "/";
my $tlsdir = "$privatedir/tls";
(system("rm -rf $prefix_abs/*") == 0) or die("Unable to clean up");
my $ifaceipv4 = "127.0.0.$swiface";
my $interfaces = "$ifaceipv4/8";
$ctx->{prefix} = $prefix;
$ctx->{prefix_abs} = $prefix_abs;
$ctx->{server_role} = $server_role;
$ctx->{netbiosname} = $netbiosname;
$ctx->{netbiosalias} = $netbiosalias;
$ctx->{swiface} = $swiface;
$ctx->{password} = $password;
(system("rm -rf $prefix/*") == 0) or die("Unable to clean up");
mkdir($_, 0777) foreach ($privatedir, $etcdir, $piddir, $ncalrpcdir, $lockdir,
$tmpdir, "$tmpdir/test1", "$tmpdir/test2");
$ctx->{server_loglevel} = 1;
$ctx->{username} = "administrator";
$ctx->{domain} = "SAMBADOMAIN";
$ctx->{realm} = "SAMBA.EXAMPLE.COM";
$ctx->{dnsname} = "samba.example.com";
$ctx->{basedn} = "dc=samba,dc=example,dc=com";
my $unix_name = ($ENV{USER} or $ENV{LOGNAME} or `whoami`);
chomp $unix_name;
$ctx->{unix_name} = $unix_name;
$ctx->{unix_uid} = $>;
$ctx->{unix_gids_str} = $);
@{$ctx->{unix_gids}} = split(" ", $ctx->{unix_gids_str});
my $localbasedn = $basedn;
$localbasedn = "CN=$netbiosname" if $server_role eq "member server";
$ctx->{tmpdir} = "$prefix_abs/tmp";
$ctx->{etcdir} = "$prefix_abs/etc";
$ctx->{piddir} = "$prefix_abs/pid";
$ctx->{smb_conf} = "$ctx->{etcdir}/smb.conf";
$ctx->{krb5_conf} = "$ctx->{etcdir}/krb5.conf";
$ctx->{privatedir} = "$prefix_abs/private";
$ctx->{ncalrpcdir} = "$prefix_abs/ncalrpc";
$ctx->{lockdir} = "$prefix_abs/lockdir";
$ctx->{winbindd_socket_dir} = "$prefix_abs/winbindd_socket";
$ctx->{winbindd_privileged_socket_dir} = "$prefix_abs/winbindd_privileged_socket";
$ctx->{ntp_signd_socket_dir} = "$prefix_abs/ntp_signd_socket";
$ctx->{nsswrap_passwd} = "$ctx->{etcdir}/passwd";
$ctx->{nsswrap_group} = "$ctx->{etcdir}/group";
open(CONFFILE, ">$conffile");
$ctx->{ldapdir} = "$ctx->{privatedir}/ldap";
$ctx->{tlsdir} = "$ctx->{privatedir}/tls";
$ctx->{ipv4} = "127.0.0.$swiface";
$ctx->{interfaces} = "$ctx->{ipv4}/8";
$ctx->{localbasedn} = $ctx->{basedn};
$ctx->{localbasedn} = "CN=$netbiosname" if $server_role eq "member server";
push(@{$ctx->{directories}}, $ctx->{privatedir});
push(@{$ctx->{directories}}, $ctx->{etcdir});
push(@{$ctx->{directories}}, $ctx->{piddir});
push(@{$ctx->{directories}}, $ctx->{ncalrpcdir});
push(@{$ctx->{directories}}, $ctx->{lockdir});
push(@{$ctx->{directories}}, $ctx->{tmpdir});
push(@{$ctx->{directories}}, "$ctx->{tmpdir}/test1");
push(@{$ctx->{directories}}, "$ctx->{tmpdir}/test2");
return $ctx;
}
#
# provision_raw_run() is also used by Samba34.pm!
#
sub provision_raw_run($$)
{
my ($self, $ctx) = @_;
mkdir($_, 0777) foreach (@{$ctx->{directories}});
open(CONFFILE, ">$ctx->{smb_conf}")
or die("can't open $ctx->{smb_conf}$?");
print CONFFILE "
[global]
netbios name = $netbiosname
netbios aliases = $netbiosalias
workgroup = $domain
realm = $realm
private dir = $privatedir
pid directory = $piddir
ncalrpc dir = $ncalrpcdir
lock dir = $lockdir
netbios name = $ctx->{netbiosname}
netbios aliases = $ctx->{netbiosalias}
workgroup = $ctx->{domain}
realm = $ctx->{realm}
private dir = $ctx->{privatedir}
pid directory = $ctx->{piddir}
ncalrpc dir = $ctx->{ncalrpcdir}
lock dir = $ctx->{lockdir}
setup directory = $self->{setupdir}
modules dir = $self->{bindir}/modules
winbindd socket directory = $winbindd_socket_dir
winbindd privileged socket directory = $winbindd_privileged_socket_dir
ntp signd socket directory = $ntp_signd_socket_dir
winbind separator = /
winbindd socket directory = $ctx->{winbindd_socket_dir}
winbindd privileged socket directory = $ctx->{winbindd_privileged_socket_dir}
ntp signd socket directory = $ctx->{ntp_signd_socket_dir}
winbind separator = /
name resolve order = bcast
interfaces = $interfaces
tls dh params file = $tlsdir/dhparms.pem
interfaces = $ctx->{interfaces}
tls dh params file = $ctx->{tlsdir}/dhparms.pem
panic action = $RealBin/gdb_backtrace \%PID% \%PROG%
wins support = yes
server role = $server_role
server role = $ctx->{server_role}
max xmit = 32K
server max protocol = SMB2
notify:inotify = false
ldb:nosync = true
#We don't want to pass our self-tests if the PAC code is wrong
gensec:require_pac = true
log level = $server_loglevel
log level = $ctx->{server_loglevel}
lanman auth = Yes
[tmp]
path = $tmpdir
path = $ctx->{tmpdir}
read only = no
ntvfs handler = posix
posix:sharedelay = 100000
posix:eadb = $lockdir/eadb.tdb
posix:eadb = $ctx->{lockdir}/eadb.tdb
posix:oplocktimeout = 3
posix:writetimeupdatedelay = 500000
[test1]
path = $tmpdir/test1
path = $ctx->{tmpdir}/test1
read only = no
ntvfs handler = posix
posix:sharedelay = 100000
posix:eadb = $lockdir/eadb.tdb
posix:eadb = $ctx->{lockdir}/eadb.tdb
posix:oplocktimeout = 3
posix:writetimeupdatedelay = 500000
[test2]
path = $tmpdir/test2
path = $ctx->{tmpdir}/test2
read only = no
ntvfs handler = posix
posix:sharedelay = 100000
posix:eadb = $lockdir/eadb.tdb
posix:eadb = $ctx->{lockdir}/eadb.tdb
posix:oplocktimeout = 3
posix:writetimeupdatedelay = 500000
[cifs]
read only = no
ntvfs handler = cifs
cifs:server = $netbiosname
cifs:server = $ctx->{netbiosname}
cifs:share = tmp
#There is no username specified here, instead the client is expected
#to log in with kerberos, and the serverwill use delegated credentials.
[simple]
path = $tmpdir
path = $ctx->{tmpdir}
read only = no
ntvfs handler = simple
[sysvol]
path = $lockdir/sysvol
path = $ctx->{lockdir}/sysvol
read only = yes
[netlogon]
path = $lockdir/sysvol/$dnsname/scripts
path = $ctx->{lockdir}/sysvol/$ctx->{dnsname}/scripts
read only = no
[cifsposix]
copy = simple
ntvfs handler = cifsposix
ntvfs handler = cifsposix
";
close(CONFFILE);
$self->mk_keyblobs($tlsdir);
$self->mk_keyblobs($ctx->{tlsdir});
open(KRB5CONF, ">$krb5_config");
open(KRB5CONF, ">$ctx->{krb5_conf}")
or die("can't open $ctx->{krb5_conf}$?");
print KRB5CONF "
#Generated krb5.conf for $realm
#Generated krb5.conf for $ctx->{realm}
[libdefaults]
default_realm = $realm
default_realm = $ctx->{realm}
dns_lookup_realm = false
dns_lookup_kdc = false
ticket_lifetime = 24h
forwardable = yes
[realms]
$realm = {
$ctx->{realm} = {
kdc = 127.0.0.1:88
admin_server = 127.0.0.1:88
default_domain = $dnsname
default_domain = $ctx->{dnsname}
}
$dnsname = {
$ctx->{dnsname} = {
kdc = 127.0.0.1:88
admin_server = 127.0.0.1:88
default_domain = $dnsname
default_domain = $ctx->{dnsname}
}
$domain = {
$ctx->{domain} = {
kdc = 127.0.0.1:88
admin_server = 127.0.0.1:88
default_domain = $dnsname
default_domain = $ctx->{dnsname}
}
[appdefaults]
pkinit_anchors = FILE:$tlsdir/ca.pem
pkinit_anchors = FILE:$ctx->{tlsdir}/ca.pem
[kdc]
enable-pkinit = true
pkinit_identity = FILE:$tlsdir/kdc.pem,$tlsdir/key.pem
pkinit_anchors = FILE:$tlsdir/ca.pem
pkinit_identity = FILE:$ctx->{tlsdir}/kdc.pem,$ctx->{tlsdir}/key.pem
pkinit_anchors = FILE:$ctx->{tlsdir}/ca.pem
[domain_realm]
.$dnsname = $realm
.$ctx->{dnsname} = $ctx->{realm}
";
close(KRB5CONF);
open(PWD, ">$nsswrap_passwd");
open(PWD, ">$ctx->{nsswrap_passwd}");
print PWD "
root:x:0:0:root gecos:$prefix_abs:/bin/false
$unix_name:x:$unix_uid:$unix_gids[0]:$unix_name gecos:$prefix_abs:/bin/false
nobody:x:65534:65533:nobody gecos:$prefix_abs:/bin/false
root:x:0:0:root gecos:$ctx->{prefix_abs}:/bin/false
$ctx->{unix_name}:x:$ctx->{unix_uid}:@{$ctx->{unix_gids}}[0]:$ctx->{unix_name} gecos:$ctx->{prefix_abs}:/bin/false
nobody:x:65534:65533:nobody gecos:$ctx->{prefix_abs}:/bin/false
";
close(PWD);
open(GRP, ">$nsswrap_group");
open(GRP, ">$ctx->{nsswrap_group}");
print GRP "
root:x:0:
wheel:x:10:
@ -700,6 +738,8 @@ nogroup:x:65534:nobody
";
close(GRP);
my $configuration = "--configfile=$ctx->{smb_conf}";
#Ensure the config file is valid before we start
my $testparm = $self->bindir_path("testparm");
if (system("$testparm $configuration -v --suppress-prompt >/dev/null 2>&1") != 0) {
@ -707,11 +747,11 @@ nogroup:x:65534:nobody
die("Failed to create a valid smb.conf configuration $testparm!");
}
(system("($testparm $configuration -v --suppress-prompt --parameter-name=\"netbios name\" --section-name=global 2> /dev/null | grep -i \"^$netbiosname\" ) >/dev/null 2>&1") == 0) or die("Failed to create a valid smb.conf configuration! $self->{bindir}/testparm $configuration -v --suppress-prompt --parameter-name=\"netbios name\" --section-name=global");
(system("($testparm $configuration -v --suppress-prompt --parameter-name=\"netbios name\" --section-name=global 2> /dev/null | grep -i \"^$ctx->{netbiosname}\" ) >/dev/null 2>&1") == 0) or die("Failed to create a valid smb.conf configuration! $self->{bindir}/testparm $configuration -v --suppress-prompt --parameter-name=\"netbios name\" --section-name=global");
my @provision_options = ();
push (@provision_options, "NSS_WRAPPER_PASSWD=\"$nsswrap_passwd\"");
push (@provision_options, "NSS_WRAPPER_GROUP=\"$nsswrap_group\"");
push (@provision_options, "NSS_WRAPPER_PASSWD=\"$ctx->{nsswrap_passwd}\"");
push (@provision_options, "NSS_WRAPPER_GROUP=\"$ctx->{nsswrap_group}\"");
if (defined($ENV{GDB_PROVISION})) {
push (@provision_options, "gdb --args python");
}
@ -723,66 +763,66 @@ nogroup:x:65534:nobody
}
push (@provision_options, "$self->{setupdir}/provision");
push (@provision_options, split(' ', $configuration));
push (@provision_options, "--host-name=$netbiosname");
push (@provision_options, "--host-ip=$ifaceipv4");
push (@provision_options, "--host-name=$ctx->{netbiosname}");
push (@provision_options, "--host-ip=$ctx->{ipv4}");
push (@provision_options, "--quiet");
push (@provision_options, "--domain=$domain");
push (@provision_options, "--realm=$realm");
push (@provision_options, "--adminpass=$password");
push (@provision_options, "--krbtgtpass=krbtgt$password");
push (@provision_options, "--machinepass=machine$password");
push (@provision_options, "--root=$unix_name");
push (@provision_options, "--domain=$ctx->{domain}");
push (@provision_options, "--realm=$ctx->{realm}");
push (@provision_options, "--adminpass=$ctx->{password}");
push (@provision_options, "--krbtgtpass=krbtgt$ctx->{password}");
push (@provision_options, "--machinepass=machine$ctx->{password}");
push (@provision_options, "--root=$ctx->{unix_name}");
push (@provision_options, "--server-role=\"$server_role\"");
push (@provision_options, "--server-role=\"$ctx->{server_role}\"");
my $ldap_uri= "$ldapdir/ldapi";
my $ldap_uri= "$ctx->{ldapdir}/ldapi";
$ldap_uri =~ s|/|%2F|g;
$ldap_uri = "ldapi://$ldap_uri";
my $ret = {
KRB5_CONFIG => $krb5_config,
PIDDIR => $piddir,
SERVER => $netbiosname,
SERVER_IP => $ifaceipv4,
NETBIOSNAME => $netbiosname,
NETBIOSALIAS => $netbiosalias,
KRB5_CONFIG => $ctx->{krb5_conf},
PIDDIR => $ctx->{piddir},
SERVER => $ctx->{netbiosname},
SERVER_IP => $ctx->{ipv4},
NETBIOSNAME => $ctx->{netbiosname},
NETBIOSALIAS => $ctx->{netbiosalias},
LDAP_URI => $ldap_uri,
DOMAIN => $domain,
USERNAME => $username,
REALM => $realm,
PASSWORD => $password,
LDAPDIR => $ldapdir,
WINBINDD_SOCKET_DIR => $winbindd_socket_dir,
NCALRPCDIR => $ncalrpcdir,
LOCKDIR => $lockdir,
SERVERCONFFILE => $conffile,
DOMAIN => $ctx->{domain},
USERNAME => $ctx->{username},
REALM => $ctx->{realm},
PASSWORD => $ctx->{password},
LDAPDIR => $ctx->{ldapdir},
WINBINDD_SOCKET_DIR => $ctx->{winbindd_socket_dir},
NCALRPCDIR => $ctx->{ncalrpcdir},
LOCKDIR => $ctx->{lockdir},
SERVERCONFFILE => $ctx->{smb_conf},
CONFIGURATION => $configuration,
SOCKET_WRAPPER_DEFAULT_IFACE => $swiface,
NSS_WRAPPER_PASSWD => $nsswrap_passwd,
NSS_WRAPPER_GROUP => $nsswrap_group,
SAMBA_TEST_FIFO => "$prefix/samba_test.fifo",
SAMBA_TEST_LOG => "$prefix/samba_test.log",
SOCKET_WRAPPER_DEFAULT_IFACE => $ctx->{swiface},
NSS_WRAPPER_PASSWD => $ctx->{nsswrap_passwd},
NSS_WRAPPER_GROUP => $ctx->{nsswrap_group},
SAMBA_TEST_FIFO => "$ctx->{prefix}/samba_test.fifo",
SAMBA_TEST_LOG => "$ctx->{prefix}/samba_test.log",
SAMBA_TEST_LOG_POS => 0,
};
if (defined($self->{ldap})) {
push (@provision_options, "--ldap-backend=$ldap_uri");
system("$self->{setupdir}/provision-backend $configuration --ldap-admin-pass=$password --root=$unix_name --realm=$realm --domain=$domain --host-name=$netbiosname --ldap-backend-type=$self->{ldap}>&2") == 0 or die("backend provision failed");
push (@provision_options, "--ldap-backend=$ldap_uri");
system("$self->{setupdir}/provision-backend $configuration --ldap-admin-pass=$ctx->{password} --root=$ctx->{unix_name} --realm=$ctx->{realm} --domain=$ctx->{domain} --host-name=$ctx->{netbiosname} --ldap-backend-type=$self->{ldap}>&2") == 0 or die("backend provision failed");
push (@provision_options, "--password=$password");
push (@provision_options, "--password=$ctx->{password}");
if ($self->{ldap} eq "openldap") {
push (@provision_options, "--username=samba-admin");
($ret->{SLAPD_CONF}, $ret->{OPENLDAP_PIDFILE}) = $self->mk_openldap($ldapdir, $configuration) or die("Unable to create openldap directories");
push (@provision_options, "--ldap-backend-type=openldap");
} elsif ($self->{ldap} eq "fedora-ds") {
push (@provision_options, "--simple-bind-dn=cn=Manager,$localbasedn");
($ret->{FEDORA_DS_DIR}, $ret->{FEDORA_DS_PIDFILE}) = $self->mk_fedora_ds($ldapdir, $configuration) or die("Unable to create fedora ds directories");
push (@provision_options, "--ldap-backend-type=fedora-ds");
}
if ($self->{ldap} eq "openldap") {
push (@provision_options, "--username=samba-admin");
($ret->{SLAPD_CONF}, $ret->{OPENLDAP_PIDFILE}) = $self->mk_openldap($ctx->{ldapdir}, $configuration) or die("Unable to create openldap directories");
push (@provision_options, "--ldap-backend-type=openldap");
} elsif ($self->{ldap} eq "fedora-ds") {
push (@provision_options, "--simple-bind-dn=cn=Manager,$ctx->{localbasedn}");
($ret->{FEDORA_DS_DIR}, $ret->{FEDORA_DS_PIDFILE}) = $self->mk_fedora_ds($ctx->{ldapdir}, $configuration) or die("Unable to create fedora ds directories");
push (@provision_options, "--ldap-backend-type=fedora-ds");
}
$self->slapd_start($ret) or
$self->slapd_start($ret) or
die("couldn't start slapd");
}
@ -790,11 +830,24 @@ nogroup:x:65534:nobody
(system($provision_cmd) == 0) or die("Unable to provision: \n$provision_cmd\n");
if (defined($self->{ldap})) {
$self->slapd_stop($ret) or
$self->slapd_stop($ret) or
die("couldn't stop slapd");
}
}
return $ret;
return $ret;
}
sub provision($$$$$$)
{
my ($self, $prefix, $server_role, $netbiosname, $netbiosalias, $swiface, $password) = @_;
my $ctx = $self->provision_raw_prepare($prefix, $server_role,
$netbiosname, $netbiosalias,
$swiface, $password);
my $ret = $self->provision_raw_run($ctx);
return $ret;
}
sub provision_member($$$)