mirror of
https://github.com/samba-team/samba.git
synced 2024-12-25 23:21:54 +03:00
62d4136755
Signed-off-by: Adrian Cochrane <adrianc@catalyst.net.nz> Reviewed-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Michael Adam <obnox@samba.org>
526 lines
16 KiB
Python
Executable File
526 lines
16 KiB
Python
Executable File
#!/usr/bin/python -u
|
|
# Bootstrap Samba and run a number of tests against it.
|
|
# Copyright (C) 2005-2012 Jelmer Vernooij <jelmer@samba.org>
|
|
# Copyright (C) 2007-2009 Stefan Metzmacher <metze@samba.org>
|
|
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation; either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
import atexit
|
|
from cStringIO import StringIO
|
|
import os
|
|
import sys
|
|
import signal
|
|
import subprocess
|
|
from samba import subunit
|
|
import traceback
|
|
import warnings
|
|
|
|
import optparse
|
|
|
|
sys.path.insert(0, os.path.dirname(os.path.dirname(__file__)))
|
|
|
|
from selftest import (
|
|
socket_wrapper,
|
|
subunithelper,
|
|
testlist,
|
|
)
|
|
from selftest.client import write_clientconf
|
|
from selftest.run import (
|
|
expand_command_list,
|
|
expand_command_run,
|
|
exported_envvars_str,
|
|
now,
|
|
run_testsuite_command,
|
|
)
|
|
from selftest.target import (
|
|
EnvironmentManager,
|
|
NoneTarget,
|
|
UnsupportedEnvironment,
|
|
)
|
|
|
|
includes = ()
|
|
excludes = ()
|
|
|
|
def read_excludes(fn):
|
|
excludes.extend(testlist.read_test_regexes(fn))
|
|
|
|
def read_includes(fn):
|
|
includes.extend(testlist.read_test_regexes(fn))
|
|
|
|
parser = optparse.OptionParser("TEST-REGEXES")
|
|
parser.add_option("--target", type="choice", choices=["samba", "samba3", "none"], default="samba", help="Samba version to target")
|
|
parser.add_option("--quick", help="run quick overall test", action="store_true", default=False)
|
|
parser.add_option("--list", help="list available tests", action="store_true", default=False)
|
|
parser.add_option("--socket-wrapper", help="enable socket wrapper", action="store_true", default=False)
|
|
parser.add_option("--socket-wrapper-pcap", help="save traffic to pcap directories", type="str")
|
|
parser.add_option("--socket-wrapper-keep-pcap", help="keep all pcap files, not just those for tests that failed", action="store_true", default=False)
|
|
parser.add_option("--one", help="abort when the first test fails", action="store_true", default=False)
|
|
parser.add_option("--exclude", action="callback", help="Add file to exclude files", callback=read_excludes)
|
|
parser.add_option("--include", action="callback", help="Add file to include files", callback=read_includes)
|
|
parser.add_option("--testenv", help="run a shell in the requested test environment", action="store_true", default=False)
|
|
parser.add_option("--resetup-environment", help="Re-setup environment", action="store_true", default=False)
|
|
parser.add_option("--load-list", help="Load list of tests to load from a file", type=str)
|
|
parser.add_option("--prefix", help="prefix to run tests in", type=str, default="./st")
|
|
parser.add_option("--srcdir", type=str, default=".", help="source directory")
|
|
parser.add_option("--bindir", type=str, default="./bin", help="binaries directory")
|
|
parser.add_option("--testlist", type=str, action="append", help="file to read available tests from")
|
|
parser.add_option("--ldap", help="back samba onto specified ldap server", choices=["openldap", "fedora-ds"], type="choice")
|
|
|
|
opts, args = parser.parse_args()
|
|
|
|
subunit_ops = subunithelper.SubunitOps(sys.stdout)
|
|
|
|
def handle_signal(sig, frame):
|
|
sys.stderr.write("Exiting early because of signal %s.\n" % sig)
|
|
sys.exit(1)
|
|
|
|
for sig in (signal.SIGINT, signal.SIGQUIT, signal.SIGTERM, signal.SIGPIPE):
|
|
signal.signal(sig, handle_signal)
|
|
|
|
def skip(name):
|
|
return testlist.find_in_list(excludes, name)
|
|
|
|
def setup_pcap(name):
|
|
if (not opts.socket_wrapper_pcap or
|
|
not os.environ.get("SOCKET_WRAPPER_PCAP_DIR")):
|
|
return
|
|
|
|
fname = "".join([x for x in name if x.isalnum() or x == '-'])
|
|
|
|
pcap_file = os.path.join(
|
|
os.environ["SOCKET_WRAPPER_PCAP_DIR"], "%s.pcap" % fname)
|
|
|
|
socket_wrapper.setup_pcap(pcap_file)
|
|
return pcap_file
|
|
|
|
|
|
def cleanup_pcap(pcap_file, exit_code):
|
|
if not opts.socket_wrapper_pcap:
|
|
return
|
|
if opts.socket_wrapper_keep_pcap:
|
|
return
|
|
if exitcode == 0:
|
|
return
|
|
if pcap_file is None:
|
|
return
|
|
|
|
os.unlink(pcap_file)
|
|
|
|
|
|
def run_testsuite(name, cmd, subunit_ops, env=None):
|
|
"""Run a single testsuite.
|
|
|
|
:param env: Environment to run in
|
|
:param name: Name of the testsuite
|
|
:param cmd: Name of the (fully expanded) command to run
|
|
:return: exitcode of the command
|
|
"""
|
|
pcap_file = setup_pcap(name)
|
|
|
|
exitcode = run_testsuite_command(name, cmd, subunit_ops, env)
|
|
if exitcode is None:
|
|
sys.exit(1)
|
|
|
|
cleanup_pcap(pcap_file, exitcode)
|
|
|
|
if not opts.socket_wrapper_keep_pcap and pcap_file is not None:
|
|
sys.stdout.write("PCAP FILE: %s\n" % pcap_file)
|
|
|
|
if exitcode != 0 and opts.one:
|
|
sys.exit(1)
|
|
|
|
return exitcode
|
|
|
|
|
|
if opts.list and opts.testenv:
|
|
sys.stderr.write("--list and --testenv are mutually exclusive\n")
|
|
sys.exit(1)
|
|
|
|
tests = args
|
|
|
|
# quick hack to disable rpc validation when using valgrind - it is way too slow
|
|
if not os.environ.get("VALGRIND"):
|
|
os.environ["VALIDATE"] = "validate"
|
|
os.environ["MALLOC_CHECK_"] = "3"
|
|
|
|
# make all our python scripts unbuffered
|
|
os.environ["PYTHONUNBUFFERED"] = "1"
|
|
|
|
bindir_abs = os.path.abspath(opts.bindir)
|
|
|
|
# Backwards compatibility:
|
|
if os.environ.get("TEST_LDAP") == "yes":
|
|
if os.environ.get("FEDORA_DS_ROOT"):
|
|
ldap = "fedora-ds"
|
|
else:
|
|
ldap = "openldap"
|
|
|
|
torture_maxtime = int(os.getenv("TORTURE_MAXTIME", "1200"))
|
|
if opts.ldap:
|
|
# LDAP is slow
|
|
torture_maxtime *= 2
|
|
|
|
prefix = os.path.normpath(opts.prefix)
|
|
|
|
# Ensure we have the test prefix around.
|
|
#
|
|
# We need restrictive permissions on this as some subdirectories in this tree
|
|
# will have wider permissions (ie 0777) and this would allow other users on the
|
|
# host to subvert the test process.
|
|
if not os.path.isdir(prefix):
|
|
os.mkdir(prefix, 0700)
|
|
else:
|
|
os.chmod(prefix, 0700)
|
|
|
|
prefix_abs = os.path.abspath(prefix)
|
|
tmpdir_abs = os.path.abspath(os.path.join(prefix_abs, "tmp"))
|
|
if not os.path.isdir(tmpdir_abs):
|
|
os.mkdir(tmpdir_abs, 0777)
|
|
|
|
srcdir_abs = os.path.abspath(opts.srcdir)
|
|
|
|
if prefix_abs == "/":
|
|
raise Exception("using '/' as absolute prefix is a bad idea")
|
|
|
|
os.environ["PREFIX"] = prefix
|
|
os.environ["KRB5CCNAME"] = os.path.join(prefix, "krb5ticket")
|
|
os.environ["PREFIX_ABS"] = prefix_abs
|
|
os.environ["SRCDIR"] = opts.srcdir
|
|
os.environ["SRCDIR_ABS"] = srcdir_abs
|
|
os.environ["BINDIR"] = bindir_abs
|
|
|
|
tls_enabled = not opts.quick
|
|
if tls_enabled:
|
|
os.environ["TLS_ENABLED"] = "yes"
|
|
else:
|
|
os.environ["TLS_ENABLED"] = "no"
|
|
|
|
def prefix_pathvar(name, newpath):
|
|
if name in os.environ:
|
|
os.environ[name] = "%s:%s" % (newpath, os.environ[name])
|
|
else:
|
|
os.environ[name] = newpath
|
|
prefix_pathvar("PKG_CONFIG_PATH", os.path.join(bindir_abs, "pkgconfig"))
|
|
prefix_pathvar("PYTHONPATH", os.path.join(bindir_abs, "python"))
|
|
|
|
if opts.socket_wrapper_keep_pcap:
|
|
# Socket wrapper keep pcap implies socket wrapper pcap
|
|
opts.socket_wrapper_pcap = True
|
|
|
|
if opts.socket_wrapper_pcap:
|
|
# Socket wrapper pcap implies socket wrapper
|
|
opts.socket_wrapper = True
|
|
|
|
if opts.socket_wrapper:
|
|
socket_wrapper_dir = socket_wrapper.setup_dir(os.path.join(prefix_abs, "w"), opts.socket_wrapper_pcap)
|
|
sys.stdout.write("SOCKET_WRAPPER_DIR=%s\n" % socket_wrapper_dir)
|
|
elif not opts.list:
|
|
if os.getuid() != 0:
|
|
warnings.warn("not using socket wrapper, but also not running as root. Will not be able to listen on proper ports")
|
|
|
|
testenv_default = "none"
|
|
|
|
# After this many seconds, the server will self-terminate. All tests
|
|
# must terminate in this time, and testenv will only stay alive this
|
|
# long
|
|
|
|
if os.environ.get("SMBD_MAXTIME", ""):
|
|
server_maxtime = int(os.environ["SMBD_MAXTIME"])
|
|
else:
|
|
server_maxtime = 7500
|
|
|
|
|
|
def has_socket_wrapper(bindir):
|
|
"""Check if Samba has been built with socket wrapper support.
|
|
"""
|
|
f = StringIO()
|
|
subprocess.check_call([os.path.join(bindir, "smbd"), "-b"], stdout=f)
|
|
for l in f.readlines():
|
|
if "SOCKET_WRAPPER" in l:
|
|
return True
|
|
return False
|
|
|
|
|
|
if not opts.list:
|
|
if opts.target == "samba":
|
|
if opts.socket_wrapper and not has_socket_wrapper(opts.bindir):
|
|
sys.stderr.write("You must include --enable-socket-wrapper when compiling Samba in order to execute 'make test'. Exiting....\n")
|
|
sys.exit(1)
|
|
testenv_default = "ad_dc_ntvfs"
|
|
from selftest.target.samba import Samba
|
|
target = Samba(opts.bindir, ldap, opts.srcdir, server_maxtime)
|
|
elif opts.target == "samba3":
|
|
if opts.socket_wrapper and not has_socket_wrapper(opts.bindir):
|
|
sys.stderr.write("You must include --enable-socket-wrapper when compiling Samba in order to execute 'make test'. Exiting....\n")
|
|
sys.exit(1)
|
|
testenv_default = "member"
|
|
from selftest.target.samba3 import Samba3
|
|
target = Samba3(opts.bindir, srcdir_abs, server_maxtime)
|
|
elif opts.target == "none":
|
|
testenv_default = "none"
|
|
target = NoneTarget()
|
|
|
|
env_manager = EnvironmentManager(target)
|
|
atexit.register(env_manager.teardown_all)
|
|
|
|
interfaces = ",".join([
|
|
"127.0.0.11/8",
|
|
"127.0.0.12/8",
|
|
"127.0.0.13/8",
|
|
"127.0.0.14/8",
|
|
"127.0.0.15/8",
|
|
"127.0.0.16/8"])
|
|
|
|
clientdir = os.path.join(prefix_abs, "client")
|
|
|
|
conffile = os.path.join(clientdir, "client.conf")
|
|
os.environ["SMB_CONF_PATH"] = conffile
|
|
|
|
todo = []
|
|
|
|
if not opts.testlist:
|
|
sys.stderr.write("No testlists specified\n")
|
|
sys.exit(1)
|
|
|
|
os.environ["SELFTEST_PREFIX"] = prefix_abs
|
|
os.environ["SELFTEST_TMPDIR"] = tmpdir_abs
|
|
os.environ["TEST_DATA_PREFIX"] = tmpdir_abs
|
|
if opts.socket_wrapper:
|
|
os.environ["SELFTEST_INTERFACES"] = interfaces
|
|
else:
|
|
os.environ["SELFTEST_INTERFACES"] = ""
|
|
if opts.quick:
|
|
os.environ["SELFTEST_QUICK"] = "1"
|
|
else:
|
|
os.environ["SELFTEST_QUICK"] = ""
|
|
os.environ["SELFTEST_MAXTIME"] = str(torture_maxtime)
|
|
|
|
|
|
available = []
|
|
for fn in opts.testlist:
|
|
for testsuite in testlist.read_testlist_file(fn):
|
|
if not testlist.should_run_test(tests, testsuite):
|
|
continue
|
|
name = testsuite[0]
|
|
if (includes is not None and
|
|
testlist.find_in_list(includes, name) is not None):
|
|
continue
|
|
available.append(testsuite)
|
|
|
|
if opts.load_list:
|
|
restricted_mgr = testlist.RestrictedTestManager.from_path(opts.load_list)
|
|
else:
|
|
restricted_mgr = None
|
|
|
|
for testsuite in available:
|
|
name = testsuite[0]
|
|
skipreason = skip(name)
|
|
if restricted_mgr is not None:
|
|
match = restricted_mgr.should_run_testsuite(name)
|
|
if match == []:
|
|
continue
|
|
else:
|
|
match = None
|
|
if skipreason is not None:
|
|
if not opts.list:
|
|
subunit_ops.skip_testsuite(name, skipreason)
|
|
else:
|
|
todo.append(testsuite + (match,))
|
|
|
|
if restricted_mgr is not None:
|
|
for name in restricted_mgr.iter_unused():
|
|
sys.stdout.write("No test or testsuite found matching %s\n" % name)
|
|
if todo == []:
|
|
sys.stderr.write("No tests to run\n")
|
|
sys.exit(1)
|
|
|
|
suitestotal = len(todo)
|
|
|
|
if not opts.list:
|
|
subunit_ops.progress(suitestotal, subunit.PROGRESS_SET)
|
|
subunit_ops.time(now())
|
|
|
|
exported_envvars = [
|
|
# domain stuff
|
|
"DOMAIN",
|
|
"REALM",
|
|
|
|
# domain controller stuff
|
|
"DC_SERVER",
|
|
"DC_SERVER_IP",
|
|
"DC_NETBIOSNAME",
|
|
"DC_NETBIOSALIAS",
|
|
|
|
# domain member
|
|
"MEMBER_SERVER",
|
|
"MEMBER_SERVER_IP",
|
|
"MEMBER_NETBIOSNAME",
|
|
"MEMBER_NETBIOSALIAS",
|
|
|
|
# rpc proxy controller stuff
|
|
"RPC_PROXY_SERVER",
|
|
"RPC_PROXY_SERVER_IP",
|
|
"RPC_PROXY_NETBIOSNAME",
|
|
"RPC_PROXY_NETBIOSALIAS",
|
|
|
|
# domain controller stuff for Vampired DC
|
|
"VAMPIRE_DC_SERVER",
|
|
"VAMPIRE_DC_SERVER_IP",
|
|
"VAMPIRE_DC_NETBIOSNAME",
|
|
"VAMPIRE_DC_NETBIOSALIAS",
|
|
|
|
# domain controller stuff for Vampired DC
|
|
"PROMOTED_DC_SERVER",
|
|
"PROMOTED_DC_SERVER_IP",
|
|
"PROMOTED_DC_NETBIOSNAME",
|
|
"PROMOTED_DC_NETBIOSALIAS",
|
|
|
|
# server stuff
|
|
"SERVER",
|
|
"SERVER_IP",
|
|
"NETBIOSNAME",
|
|
"NETBIOSALIAS",
|
|
|
|
# user stuff
|
|
"USERNAME",
|
|
"USERID",
|
|
"PASSWORD",
|
|
"DC_USERNAME",
|
|
"DC_PASSWORD",
|
|
|
|
# misc stuff
|
|
"KRB5_CONFIG",
|
|
"WINBINDD_SOCKET_DIR",
|
|
"WINBINDD_PRIV_PIPE_DIR",
|
|
"NMBD_SOCKET_DIR",
|
|
"LOCAL_PATH"
|
|
]
|
|
|
|
def switch_env(name, prefix):
|
|
if ":" in name:
|
|
(envname, option) = name.split(":", 1)
|
|
else:
|
|
envname = name
|
|
option = "client"
|
|
|
|
env = env_manager.setup_env(envname, prefix)
|
|
|
|
testenv_vars = env.get_vars()
|
|
|
|
if option == "local":
|
|
socket_wrapper.set_default_iface(testenv_vars["SOCKET_WRAPPER_DEFAULT_IFACE"])
|
|
os.environ["SMB_CONF_PATH"] = testenv_vars["SERVERCONFFILE"]
|
|
elif option == "client":
|
|
socket_wrapper.set_default_iface(11)
|
|
write_clientconf(conffile, clientdir, testenv_vars)
|
|
os.environ["SMB_CONF_PATH"] = conffile
|
|
else:
|
|
raise Exception("Unknown option[%s] for envname[%s]" % (option,
|
|
envname))
|
|
|
|
for name in exported_envvars:
|
|
if name in testenv_vars:
|
|
os.environ[name] = testenv_vars[name]
|
|
elif name in os.environ:
|
|
del os.environ[name]
|
|
|
|
return env
|
|
|
|
# This 'global' file needs to be empty when we start
|
|
dns_host_file_path = os.path.join(prefix_abs, "dns_host_file")
|
|
if os.path.exists(dns_host_file_path):
|
|
os.unlink(dns_host_file_path)
|
|
|
|
if opts.testenv:
|
|
testenv_name = os.environ.get("SELFTEST_TESTENV", testenv_default)
|
|
|
|
env = switch_env(testenv_name, prefix)
|
|
testenv_vars = env.get_vars()
|
|
|
|
os.environ["PIDDIR"] = testenv_vars["PIDDIR"]
|
|
os.environ["ENVNAME"] = testenv_name
|
|
|
|
envvarstr = exported_envvars_str(testenv_vars, exported_envvars)
|
|
|
|
term = os.environ.get("TERMINAL", "xterm -e")
|
|
cmd = """'echo -e "
|
|
Welcome to the Samba4 Test environment '%(testenv_name)'
|
|
|
|
This matches the client environment used in make test
|
|
server is pid `cat \$PIDDIR/samba.pid`
|
|
|
|
Some useful environment variables:
|
|
TORTURE_OPTIONS=\$TORTURE_OPTIONS
|
|
SMB_CONF_PATH=\$SMB_CONF_PATH
|
|
|
|
$envvarstr
|
|
\" && LD_LIBRARY_PATH=%(LD_LIBRARY_PATH)s $(SHELL)'""" % {
|
|
"testenv_name": testenv_name,
|
|
"LD_LIBRARY_PATH": os.environ["LD_LIBRARY_PATH"]}
|
|
subprocess.call(term + ' ' + cmd, shell=True)
|
|
env_manager.teardown_env(testenv_name)
|
|
elif opts.list:
|
|
for (name, envname, cmd, supports_loadfile, supports_idlist, subtests) in todo:
|
|
cmd = expand_command_list(cmd)
|
|
if cmd is None:
|
|
warnings.warn("Unable to list tests in %s" % name)
|
|
continue
|
|
|
|
exitcode = subprocess.call(cmd, shell=True)
|
|
|
|
if exitcode != 0:
|
|
sys.stderr.write("%s exited with exit code %s\n" % (cmd, exitcode))
|
|
sys.exit(1)
|
|
else:
|
|
for (name, envname, cmd, supports_loadfile, supports_idlist, subtests) in todo:
|
|
try:
|
|
env = switch_env(envname, prefix)
|
|
except UnsupportedEnvironment:
|
|
subunit_ops.start_testsuite(name)
|
|
subunit_ops.end_testsuite(name, "skip",
|
|
"environment %s is unknown in this test backend - skipping" % envname)
|
|
continue
|
|
except Exception, e:
|
|
subunit_ops.start_testsuite(name)
|
|
traceback.print_exc()
|
|
subunit_ops.end_testsuite(name, "error",
|
|
"unable to set up environment %s: %s" % (envname, e))
|
|
continue
|
|
|
|
cmd, tmpf = expand_command_run(cmd, supports_loadfile, supports_idlist,
|
|
subtests)
|
|
|
|
run_testsuite(name, cmd, subunit_ops, env=env)
|
|
|
|
if tmpf is not None:
|
|
os.remove(tmpf)
|
|
|
|
if opts.resetup_environment:
|
|
env_manager.teardown_env(envname)
|
|
env_manager.teardown_all()
|
|
|
|
sys.stdout.write("\n")
|
|
|
|
# if there were any valgrind failures, show them
|
|
for fn in os.listdir(prefix):
|
|
if fn.startswith("valgrind.log"):
|
|
sys.stdout.write("VALGRIND FAILURE\n")
|
|
f = open(os.path.join(prefix, fn), 'r')
|
|
try:
|
|
sys.stdout.write(f.read())
|
|
finally:
|
|
f.close()
|
|
|
|
sys.exit(0)
|