1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-25 23:21:54 +03:00
samba-mirror/selftest/target
Stefan Metzmacher 66e90b7391 nsswitch: reduce dependecies to private libraries and link static/builtin if possible
Over the last month I got more and more reports,
that it's not possible to use a custom Samba version
on systems with sssd being installed, which depends on some
specific samba libraries installed in the system.

One major problem is that the custom libnss_winbind.so.2
depends on the libreplace-samba4.so of the custom build
and also injects an RPATH into the running process.
When sssd uses any nss library call it will get this,
when it then tries to load some of its plugins via dlopen(),
e.g.

ldd /usr/lib64/sssd/libsss_ad.so| grep samba

   libsamba-util.so.0 => /lib64/libsamba-util.so.0
   libreplace-samba4.so => /usr/lib64/samba/libreplace-samba4.so
   libsamba-security-samba4.so => /usr/lib64/samba/libsamba-security-samba4.so
   libsamba-errors.so.1 => /lib64/libsamba-errors.so.1
   libsamba-debug-samba4.so => /usr/lib64/samba/libsamba-debug-samba4.so
   libgenrand-samba4.so => /usr/lib64/samba/libgenrand-samba4.so
   libsocket-blocking-samba4.so => /usr/lib64/samba/libsocket-blocking-samba4.so
   libtime-basic-samba4.so => /usr/lib64/samba/libtime-basic-samba4.so
   libsys-rw-samba4.so => /usr/lib64/samba/libsys-rw-samba4.so
   libiov-buf-samba4.so => /usr/lib64/samba/libiov-buf-samba4.so

When that loads dlopen() will fail as a soname libreplace-samba4.so is
already loaded, but the symbol version within the other one don't match, as the
contain the exact version, e.g. replace_dummy@@SAMBA_4.13.3.

This is just an example and similar things can happen in all situations
where we provide libraries, which are potentially injected into every
process of the running system. These should only depend on libc.so and
related basic system libraries in order to avoid the problem.

We have the following libraries, which are in the that category:

- libnss_winbind.so.2
- libnss_wins.so.2
- pam_winbind.so
- winbind_krb5_locator.so
- async_dns_krb5_locator.so

The rules of library loading are really complex and symbol versioning
is not enough to solve it, only the combination of unique soname and
unique symbol version suffix seem to solve the problem, but injecting
an RPATH is still a problem.

In order to solve the problem I experimented with adding SAMBA_SUBSYSTEM()
definitions with 'hide_symbols=True' in order to do some static linking
of selected components, e.g.

   bld.SAMBA_SUBSYSTEM('replace-hidden',
                       source=REPLACE_SOURCE,
                       group='base_libraries',
                       hide_symbols=True,
                       deps='dl attr' + extra_libs)

It's relatively simple to get to the point where the following are
completely static:

- libnss_winbind.so.2
- libnss_wins.so.2
- pam_winbind.so
- winbind_krb5_locator.so

But 'async_dns_krb5_locator.so' links in almost everything!
It seems we install the krb5 plugins into our own $MODULESDIR/krb5/,
so it may not be so critical, as long it's the admin who created
the desired symlinks into the location the kerberos libraries search
for plugins. Note the at least the locator plugins are always loaded
without any configuration, every .so in a special path are loaded with dlopen().
This is done by every application using kerberos, so we load a lot of samba libraries
into them.

Packagers should not put async_dns_krb5_locator.so (nor a symlink) into
the path that's reachable by libkrb5.so.

As a longterm solution we may want to change async_dns_krb5_locator.so
to use a helper process with posix_spawn() instead of doing everything
within the process.

Note I added hiden_symbols=True to the nss modules for Linux and
FreeBSD only, because these are the only platforms I'm able to test
on. We most likely should do the same on other platforms, but some
with access to the platform should provide a tested patch.

In order to avoid manual definitions of SAMBA_SUBSYSTEMS() with
'-hidden', I added the 'provide_builtin_linking=True' option,
as the logic is very similar to what we already have with the
'--builtin-libraries=BUILTIN_LIBRARIES' configure option.

SAMBA_PLUGIN() is used in order to use SAMBA_LIBRARY() in order
to make it more strict that these plugins can't be used as
normal depedency by other subsystems and libraries.

While being there it was easy enough to make libwbclient.so
also standalone without dependecies to other samba libraries.

BUG: https://bugzilla.samba.org/show_bug.cgi?id=14780

Signed-off-by: Stefan Metzmacher <metze@samba.org>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
Reviewed-by: Andreas Schneider <asn@samba.org>
2021-11-30 15:53:34 +00:00
..
dns_hub.py selftest: Catch exception from dns_hub.py 2020-08-26 08:39:29 +00:00
README selftest: rename schemaupgrade_dc (+pair) to schema_dc 2019-04-12 05:41:36 +00:00
Samba3.pm CVE-2020-25717: selftest: turn ad_member_no_nss_wb into ad_member_idmap_nss 2021-11-15 18:10:28 +00:00
Samba4.pm CVE-2020-25719 CVE-2020-25717: selftest: remove "gensec:require_pac" settings 2021-11-09 19:45:32 +00:00
Samba.pm nsswitch: reduce dependecies to private libraries and link static/builtin if possible 2021-11-30 15:53:34 +00:00

Selftest target environments (testenvs)
=======================================
Samba's integration testing heavily relies on the automatic creation of a Samba
network. This specialized test environment is generally referred to as a Samba
'testenv'.

A testenv involves starting the Samba server listening on a fake network, which
is established using the socket_wrapper library from cwrap (https://cwrap.org).
All testing is also done as a non-root user using the uid_wrapper library, also
from cwrap.

Samba's test framework uses many different types of testenv. Each testenv is
customized to test a particular Samba feature or configuration. Using cwrap
allows multiple different Samba servers to run at the same time, without
interference.

Some of the different testenvs are described in more detail below.

Important notes if adding a new testenv
---------------------------------------
- When adding a new testenv, in the Perl code it is recommended to always
explicitly specify the --configfile option in the samba-tool command, i.e. add
"env->{CONFIGURATION}" to the samba-tool command. Otherwise, the samba-tool
can try to load smb.conf from the default install location (i.e.
/usr/local/samba/etc/smb.conf). Loading a host-specific smb.conf that's outside
of the testenv is obviously not ideal and something we want to avoid in a
reliable test framework.

'local' disambiguation
----------------------
You may notice some variation in the target testenv that test suites are run
against, for example "ad_dc" and "ad_dc:local". The main difference is the
":local" changes the smb.conf that the testenv uses. By default, the testenvs
use the st/client/client.conf config-file, so that they simulate a client
talking to the Samba server. However, some tests may want to simulate running
a command on the Samba server itself. In these cases, the ":local" is used,
which means the testenv uses the Samba server's smb.conf instead (i.e.
st/ad_dc/etc/smb.conf).

Note that several of the testenvs also use local in their name, e.g.
'localvampiredc'. In particular, there's the 'localdc', which is the NetBIOS
name of the DC in the 'ad_dc_ntvfs' testenv.

dns_hub
-------
dns_hub doesn't run a Samba/smbd server like the other testenvs do. It's there
to solve the problem of how to do DNS more nicely in selftest. Running
autobuild can start up a lot of different testenvs, and so we end up with
different DCs running in different domains. Each test suite only wants to talk
to a specific domain at a time. However, by default the tests all use a common
client.conf - essentially the tests are simulating a single client that's
pretending to be in several different domains. The problem is when the test
wants to resolve a DNS host, which DC should it ask? Each DC only knows about its
own realm. dns_hub.py acts as a proxy, so it works out the correct DC to forward
the query to, based on the queried host's realm.

Vampire DC
----------
Vampire DC gets its name for historic reasons. It's one of the few testenvs
where 2 DCs are joined together, so it's used for a lot of DRS replication
testing. Basically its main job is to 'suck' the database changes out of
another DC (the 'ad_dc_ntfvs' DC).

There's also a 'vampire_2000_dc' that joins the 'fl2000dc' DC, although that's
not used very much.

Backup/restore testenvs
-----------------------
Several testenvs are created to test the domain backup/restore commands. These
testenvs verify that we can backup and restore a domain's database, start
Samba against it, and the restored database is actually functional. There are
several different flavours of backups (to cover different use-cases), so there
are separate testenvs for each one.

- backupfromdc: A fairly plain AD DC used as the base to generate the
    backup-files. These backup-files will then seed the domain database
    for the separate testenvs below.
    Backupfromdc's other unique feature is that it's the only testenv that gets
    provisioned with a non-default site, i.e. Default-First-Site-Name doesn't
    exist.
- restoredc: tests the 'backup online' option. Online backups are similar to
    doing a DC join.
    Restoredc's other unique feature is that is has SMBv1 disabled.
- offlinebackupdc: tests the 'backup offline' option. Offline backups capture
    the raw DB files on disk (safely).
- renamedc: tests the 'backup rename' option, where the domain and realm are
    renamed.
- labdc: one of the use-cases for the backup tool is to create a realistic
    pre-production testbed, based off a production DC. This testenv simulates
    that process. It uses the 'backup rename --no-secrets' option.

customdc testenv
----------------
The customdc is a special testenv that's only used for manual testing, rather
than the automated tests most testenvs are primarily used for.

The customdc testenv also uses the backup/restore tool, however, it is quite
special. Instead of the backup-file being automatically generated from a
vanilla AD DC (i.e. backupfromdc), you can specify any backup-file you like.

To run the testenv, you need to specify a 'BACKUP_FILE' shell variable, e.g.

BACKUP_FILE=/tmp/samba-backup-50k-dc-0-mdb-50k-offline.tar.bz2 \
    SELFTEST_TESTENV=customdc make testenv

The main use-case for the customdc is testing changes against a large
database. Adding users is very time-consuming, so it's much quicker to populate
a domain with users once, take a backup, and then you can spin up a testenv
based on the backup multiple times.

Another use-case is that if you get a database that's corrupted or in a bad
state, then you could save a backup and be able to easily get the database back
into the bad state. This allows you to try different commands to diagnose/fix
the issue, without fear of never seeing the problem again.

You could even spin up a 'lab DC' inside a testenv, by taking a backup of a
real network DC.

preforkrestartdc testenv
------------------------
Used to test killing and restarting processes under the pre-fork model. Due to
the destructive nature of the tests, it's not recommended to use this testenv
for anything else.

proclimitdc testenv
-------------------
Used to test process limits on the standard model. It sets the number of
allowed processes artificially low, to test that new connections are refused
correctly.  Due to the limited number of connections accepted, it's not
recommended to use this testenv for anything else.

schema_dc
----------------
This is a 2-DC testenv setup (schema_dc and schema_pair_dc).
We provision the first DC, and join the second, using an older version of the
schema (2008R2), then start-up Samba. Then, we run a schema upgrade (i.e.
'samba-tool domain schemaupgrade') on the PDC.