mirror of
https://github.com/samba-team/samba.git
synced 2025-01-12 09:18:10 +03:00
1298280a22
Signed-off-by: Andreas Schneider <asn@samba.org> Reviewed-by: Alexander Bokovoy <ab@samba.org>
165 lines
4.5 KiB
C
165 lines
4.5 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
Samba utility functions
|
|
Copyright (C) Jelmer Vernooij <jelmer@samba.org> 2007
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include "auth/credentials/credentials.h"
|
|
#include "torture/torture.h"
|
|
#include "torture/local/proto.h"
|
|
|
|
static bool test_init(struct torture_context *tctx)
|
|
{
|
|
struct cli_credentials *creds = cli_credentials_init(tctx);
|
|
|
|
cli_credentials_set_domain(creds, "bla", CRED_SPECIFIED);
|
|
|
|
torture_assert_str_equal(tctx, "BLA", cli_credentials_get_domain(creds),
|
|
"domain");
|
|
|
|
cli_credentials_set_username(creds, "someuser", CRED_SPECIFIED);
|
|
|
|
torture_assert_str_equal(tctx, "someuser",
|
|
cli_credentials_get_username(creds),
|
|
"username");
|
|
|
|
cli_credentials_set_password(creds, "p4ssw0rd", CRED_SPECIFIED);
|
|
|
|
torture_assert_str_equal(tctx, "p4ssw0rd",
|
|
cli_credentials_get_password(creds),
|
|
"password");
|
|
|
|
return true;
|
|
}
|
|
|
|
static bool test_init_anonymous(struct torture_context *tctx)
|
|
{
|
|
struct cli_credentials *creds = cli_credentials_init_anon(tctx);
|
|
|
|
torture_assert_str_equal(tctx, cli_credentials_get_domain(creds),
|
|
"", "domain");
|
|
|
|
torture_assert_str_equal(tctx, cli_credentials_get_username(creds),
|
|
"", "username");
|
|
|
|
torture_assert(tctx, cli_credentials_get_password(creds) == NULL,
|
|
"password");
|
|
|
|
return true;
|
|
}
|
|
|
|
static bool test_guess(struct torture_context *tctx)
|
|
{
|
|
struct cli_credentials *creds = cli_credentials_init_anon(tctx);
|
|
enum credentials_use_kerberos old_kerb_state = \
|
|
cli_credentials_get_kerberos_state(creds);
|
|
const char *logname = getenv("LOGNAME");
|
|
const char *user = getenv("USER");
|
|
const char *passwd = getenv("PASSWD");
|
|
const char *passwd_fd = getenv("PASSWD_FD");
|
|
const char *passwd_file = getenv("PASSWD_FILE");
|
|
|
|
cli_credentials_set_kerberos_state(creds, CRED_USE_KERBEROS_REQUIRED);
|
|
|
|
unsetenv("USER");
|
|
unsetenv("PASSWD_FD");
|
|
unsetenv("PASSWD_FILE");
|
|
|
|
setenv("LOGNAME", "xx", 1);
|
|
setenv("PASSWD", "xx", 1);
|
|
|
|
cli_credentials_guess(creds, NULL);
|
|
if (logname != NULL) {
|
|
setenv("LOGNAME", logname, 1);
|
|
}
|
|
if (user != NULL) {
|
|
setenv("USER", user, 1);
|
|
}
|
|
if (passwd != NULL) {
|
|
setenv("PASSWD", passwd, 1);
|
|
}
|
|
if (passwd_fd != NULL) {
|
|
setenv("PASSWD_FD", passwd_fd, 1);
|
|
}
|
|
if (passwd_file != NULL) {
|
|
setenv("PASSWD_FILE", passwd_file, 1);
|
|
}
|
|
cli_credentials_set_kerberos_state(creds, old_kerb_state);
|
|
|
|
return true;
|
|
}
|
|
|
|
|
|
static bool test_parse_string(struct torture_context *tctx)
|
|
{
|
|
struct cli_credentials *creds = cli_credentials_init_anon(tctx);
|
|
|
|
/* anonymous */
|
|
cli_credentials_parse_string(creds, "%", CRED_SPECIFIED);
|
|
|
|
torture_assert_str_equal(tctx, cli_credentials_get_domain(creds),
|
|
"", "domain");
|
|
|
|
torture_assert_str_equal(tctx, cli_credentials_get_username(creds),
|
|
"", "username");
|
|
|
|
torture_assert(tctx, cli_credentials_get_password(creds) == NULL,
|
|
"password");
|
|
|
|
/* username + password */
|
|
cli_credentials_parse_string(creds, "somebody%secret",
|
|
CRED_SPECIFIED);
|
|
|
|
torture_assert_str_equal(tctx, cli_credentials_get_domain(creds),
|
|
"", "domain");
|
|
|
|
torture_assert_str_equal(tctx, cli_credentials_get_username(creds),
|
|
"somebody", "username");
|
|
|
|
torture_assert_str_equal(tctx, cli_credentials_get_password(creds),
|
|
"secret", "password");
|
|
|
|
/* principal */
|
|
cli_credentials_parse_string(creds, "prin@styx",
|
|
CRED_SPECIFIED);
|
|
|
|
torture_assert_str_equal(tctx, cli_credentials_get_realm(creds),
|
|
"STYX", "realm");
|
|
|
|
torture_assert_str_equal(tctx,
|
|
cli_credentials_get_principal(creds, tctx),
|
|
"prin@styx", "principal");
|
|
|
|
return true;
|
|
}
|
|
|
|
struct torture_suite *torture_local_credentials(TALLOC_CTX *mem_ctx)
|
|
{
|
|
struct torture_suite *suite = torture_suite_create(mem_ctx, "credentials");
|
|
|
|
torture_suite_add_simple_test(suite, "init", test_init);
|
|
torture_suite_add_simple_test(suite, "init anonymous",
|
|
test_init_anonymous);
|
|
torture_suite_add_simple_test(suite, "guess",
|
|
test_guess);
|
|
torture_suite_add_simple_test(suite, "parse_string",
|
|
test_parse_string);
|
|
|
|
return suite;
|
|
}
|
|
|