1
0
mirror of https://github.com/samba-team/samba.git synced 2025-01-11 05:18:09 +03:00
samba-mirror/python/samba/tests/posixacl.py
Noel Power d36bab52d0 s3/utils: when encoding ace string use "FA", "FR", "FW", "FX" string rights
prior to this patch rights matching "FA", "FR", "FW", "FX" were
outputted as the hex string representing the bit value.

While outputting the hex string is perfectly fine, it makes it harder
to compare icacls output (which always uses the special string values)

Additionally adjust various tests to deal with use of shortcut access masks
as sddl format now uses FA, FR, FW & FX strings (like icalcs does) instead
of hex representation of the bit mask.

adjust
  samba4.blackbox.samba-tool_ntacl
  samba3.blackbox.large_acl
  samba.tests.samba_tool.ntacl
  samba.tests.ntacls
  samba.tests.posixacl

so various string comparisons of the sddl format now pass

Signed-off-by: Noel Power <noel.power@suse.com>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>

[abartlet@samba.org Adapted to new stricter SDDL behaviour around leading zeros in hex
 numbers, eg 0x001]
2023-04-28 02:15:36 +00:00

879 lines
39 KiB
Python

# Unix SMB/CIFS implementation. Tests for NT and posix ACL manipulation
# Copyright (C) Matthieu Patou <mat@matws.net> 2009-2010
# Copyright (C) Andrew Bartlett 2012
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#
"""Tests for the Samba3 NT -> posix ACL layer"""
from samba.ntacls import setntacl, getntacl, checkset_backend
from samba.dcerpc import security, smb_acl, idmap
from samba.tests.smbd_base import SmbdBaseTests
from samba import provision
import os
from samba.samba3 import smbd, passdb
from samba.samba3 import param as s3param
from samba import auth
from samba.samdb import SamDB
from samba.auth_util import system_session_unix
from errno import ENODATA
DOM_SID = "S-1-5-21-2212615479-2695158682-2101375467"
ACL = "O:S-1-5-21-2212615479-2695158682-2101375467-512G:S-1-5-21-2212615479-2695158682-2101375467-513D:(A;OICI;FA;;;S-1-5-21-2212615479-2695158682-2101375467-512)"
class PosixAclMappingTests(SmbdBaseTests):
def setUp(self):
super(PosixAclMappingTests, self).setUp()
s3conf = s3param.get_context()
s3conf.load(self.get_loadparm().configfile)
s3conf.set("xattr_tdb:file", os.path.join(self.tempdir, "xattr.tdb"))
self.lp = s3conf
self.tempf = os.path.join(self.tempdir, "test")
open(self.tempf, 'w').write("empty")
self.samdb = SamDB(lp=self.lp, session_info=auth.system_session())
def tearDown(self):
smbd.unlink(self.tempf, self.get_session_info())
os.unlink(os.path.join(self.tempdir, "xattr.tdb"))
super(PosixAclMappingTests, self).tearDown()
def get_session_info(self, domsid=DOM_SID):
"""
Get session_info for setntacl.
"""
return system_session_unix()
def print_posix_acl(self, posix_acl):
aclstr = ""
for entry in posix_acl.acl:
aclstr += "a_type: %d\n" % entry.a_type +\
"a_perm: %o\n" % entry.a_perm
if entry.a_type == smb_acl.SMB_ACL_USER:
aclstr += "uid: %d\n" % entry.info.uid
if entry.a_type == smb_acl.SMB_ACL_GROUP:
aclstr += "gid: %d\n" % entry.info.gid
return aclstr
def test_setntacl(self):
acl = ACL
setntacl(self.lp, self.tempf, acl, DOM_SID,
self.get_session_info(), use_ntvfs=False)
def test_setntacl_smbd_getntacl(self):
acl = ACL
setntacl(self.lp, self.tempf, acl, DOM_SID,
self.get_session_info(), use_ntvfs=True)
facl = getntacl(self.lp, self.tempf, self.get_session_info(), direct_db_access=True)
anysid = security.dom_sid(security.SID_NT_SELF)
self.assertEqual(facl.as_sddl(anysid), acl)
def test_setntacl_smbd_setposixacl_getntacl(self):
acl = ACL
setntacl(self.lp, self.tempf, acl, DOM_SID,
self.get_session_info(), use_ntvfs=True)
# This will invalidate the ACL, as we have a hook!
smbd.set_simple_acl(self.tempf, 0o640, self.get_session_info())
# However, this only asks the xattr
with self.assertRaises(OSError) as cm:
getntacl(self.lp, self.tempf, self.get_session_info(),
direct_db_access=True)
self.assertEqual(cm.exception.errno, ENODATA)
def test_setntacl_invalidate_getntacl(self):
acl = ACL
setntacl(self.lp, self.tempf, acl, DOM_SID,
self.get_session_info(), use_ntvfs=True)
# This should invalidate the ACL, as we include the posix ACL in the hash
(backend_obj, dbname) = checkset_backend(self.lp, None, None)
backend_obj.wrap_setxattr(dbname,
self.tempf, "system.fake_access_acl", b"")
# however, as this is direct DB access, we do not notice it
facl = getntacl(self.lp, self.tempf, self.get_session_info(), direct_db_access=True)
anysid = security.dom_sid(security.SID_NT_SELF)
self.assertEqual(acl, facl.as_sddl(anysid))
def test_setntacl_invalidate_getntacl_smbd(self):
acl = ACL
setntacl(self.lp, self.tempf, acl, DOM_SID,
self.get_session_info(), use_ntvfs=False)
# This should invalidate the ACL, as we include the posix ACL in the hash
(backend_obj, dbname) = checkset_backend(self.lp, None, None)
backend_obj.wrap_setxattr(dbname,
self.tempf, "system.fake_access_acl", b"")
# the hash would break, and we return an ACL based only on the mode, except we set the ACL using the 'ntvfs' mode that doesn't include a hash
facl = getntacl(self.lp, self.tempf, self.get_session_info())
anysid = security.dom_sid(security.SID_NT_SELF)
self.assertEqual(acl, facl.as_sddl(anysid))
def test_setntacl_smbd_invalidate_getntacl_smbd(self):
acl = ACL
simple_acl_from_posix = "O:S-1-5-21-2212615479-2695158682-2101375467-512G:S-1-5-21-2212615479-2695158682-2101375467-513D:(A;;FA;;;S-1-5-21-2212615479-2695158682-2101375467-512)(A;;0x1200a9;;;S-1-5-21-2212615479-2695158682-2101375467-513)(A;;;;;WD)"
os.chmod(self.tempf, 0o750)
setntacl(self.lp, self.tempf, acl, DOM_SID,
self.get_session_info(), use_ntvfs=False)
# This should invalidate the ACL, as we include the posix ACL in the hash
(backend_obj, dbname) = checkset_backend(self.lp, None, None)
backend_obj.wrap_setxattr(dbname,
self.tempf, "system.fake_access_acl", b"")
# the hash will break, and we return an ACL based only on the mode
facl = getntacl(self.lp, self.tempf, self.get_session_info(), direct_db_access=False)
anysid = security.dom_sid(security.SID_NT_SELF)
self.assertEqual(simple_acl_from_posix, facl.as_sddl(anysid))
def test_setntacl_getntacl_smbd(self):
acl = ACL
setntacl(self.lp, self.tempf, acl, DOM_SID,
self.get_session_info(), use_ntvfs=True)
facl = getntacl(self.lp, self.tempf, self.get_session_info(), direct_db_access=False)
anysid = security.dom_sid(security.SID_NT_SELF)
self.assertEqual(facl.as_sddl(anysid), acl)
def test_setntacl_smbd_getntacl_smbd(self):
acl = ACL
setntacl(self.lp, self.tempf, acl, DOM_SID,
self.get_session_info(), use_ntvfs=False)
facl = getntacl(self.lp, self.tempf, self.get_session_info(), direct_db_access=False)
anysid = security.dom_sid(security.SID_NT_SELF)
self.assertEqual(facl.as_sddl(anysid), acl)
def test_setntacl_smbd_setposixacl_getntacl_smbd(self):
acl = ACL
simple_acl_from_posix = "O:S-1-5-21-2212615479-2695158682-2101375467-512G:S-1-5-21-2212615479-2695158682-2101375467-513D:(A;;0x1f019f;;;S-1-5-21-2212615479-2695158682-2101375467-512)(A;;FR;;;S-1-5-21-2212615479-2695158682-2101375467-513)(A;;;;;WD)"
setntacl(self.lp, self.tempf, acl, DOM_SID,
self.get_session_info(), use_ntvfs=False)
# This invalidates the hash of the NT acl just set because there is a hook in the posix ACL set code
smbd.set_simple_acl(self.tempf, 0o640, self.get_session_info())
facl = getntacl(self.lp, self.tempf, self.get_session_info(), direct_db_access=False)
anysid = security.dom_sid(security.SID_NT_SELF)
self.assertEqual(simple_acl_from_posix, facl.as_sddl(anysid))
def test_setntacl_smbd_setposixacl_group_getntacl_smbd(self):
acl = ACL
BA_sid = security.dom_sid(security.SID_BUILTIN_ADMINISTRATORS)
simple_acl_from_posix = "O:S-1-5-21-2212615479-2695158682-2101375467-512G:S-1-5-21-2212615479-2695158682-2101375467-513D:(A;;0x1f019f;;;S-1-5-21-2212615479-2695158682-2101375467-512)(A;;FR;;;BA)(A;;FR;;;S-1-5-21-2212615479-2695158682-2101375467-513)(A;;;;;WD)"
setntacl(self.lp, self.tempf, acl, DOM_SID,
self.get_session_info(), use_ntvfs=False)
# This invalidates the hash of the NT acl just set because there is a hook in the posix ACL set code
s4_passdb = passdb.PDB(self.lp.get("passdb backend"))
(BA_gid, BA_type) = s4_passdb.sid_to_id(BA_sid)
smbd.set_simple_acl(self.tempf, 0o640, self.get_session_info(), BA_gid)
# This should re-calculate an ACL based on the posix details
facl = getntacl(self.lp, self.tempf, self.get_session_info(), direct_db_access=False)
anysid = security.dom_sid(security.SID_NT_SELF)
self.assertEqual(simple_acl_from_posix, facl.as_sddl(anysid))
def test_setntacl_smbd_getntacl_smbd_gpo(self):
acl = "O:DAG:DUD:P(A;OICI;FA;;;DA)(A;OICI;FA;;;EA)(A;OICIIO;FA;;;CO)(A;OICI;FA;;;DA)(A;OICI;FA;;;SY)(A;OICI;0x1200a9;;;AU)(A;OICI;0x1200a9;;;ED)S:AI(OU;CIIDSA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CIIDSA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)"
setntacl(self.lp, self.tempf, acl, DOM_SID,
self.get_session_info(), use_ntvfs=False)
facl = getntacl(self.lp, self.tempf, self.get_session_info(), direct_db_access=False)
domsid = security.dom_sid(DOM_SID)
self.assertEqual(facl.as_sddl(domsid), acl)
def test_setntacl_getposixacl(self):
acl = ACL
setntacl(self.lp, self.tempf, acl, DOM_SID,
self.get_session_info(), use_ntvfs=False)
facl = getntacl(self.lp, self.tempf, self.get_session_info())
anysid = security.dom_sid(security.SID_NT_SELF)
self.assertEqual(facl.as_sddl(anysid), acl)
posix_acl = smbd.get_sys_acl(self.tempf, smb_acl.SMB_ACL_TYPE_ACCESS, self.get_session_info())
def test_setposixacl_getntacl(self):
smbd.set_simple_acl(self.tempf, 0o750, self.get_session_info())
# We don't expect the xattr to be filled in in this case
with self.assertRaises(OSError) as cm:
getntacl(self.lp, self.tempf, self.get_session_info())
self.assertEqual(cm.exception.errno, ENODATA)
def test_setposixacl_getntacl_smbd(self):
s4_passdb = passdb.PDB(self.lp.get("passdb backend"))
group_SID = s4_passdb.gid_to_sid(os.stat(self.tempf).st_gid)
user_SID = s4_passdb.uid_to_sid(os.stat(self.tempf).st_uid)
smbd.set_simple_acl(self.tempf, 0o640, self.get_session_info())
facl = getntacl(self.lp, self.tempf, self.get_session_info(), direct_db_access=False)
acl = "O:%sG:%sD:(A;;0x1f019f;;;%s)(A;;FR;;;%s)(A;;;;;WD)" % (user_SID, group_SID, user_SID, group_SID)
anysid = security.dom_sid(security.SID_NT_SELF)
self.assertEqual(acl, facl.as_sddl(anysid))
def test_setposixacl_dir_getntacl_smbd(self):
s4_passdb = passdb.PDB(self.lp.get("passdb backend"))
user_SID = s4_passdb.uid_to_sid(os.stat(self.tempdir).st_uid)
BA_sid = security.dom_sid(security.SID_BUILTIN_ADMINISTRATORS)
s4_passdb = passdb.PDB(self.lp.get("passdb backend"))
(BA_id, BA_type) = s4_passdb.sid_to_id(BA_sid)
self.assertEqual(BA_type, idmap.ID_TYPE_BOTH)
SO_sid = security.dom_sid(security.SID_BUILTIN_SERVER_OPERATORS)
(SO_id, SO_type) = s4_passdb.sid_to_id(SO_sid)
self.assertEqual(SO_type, idmap.ID_TYPE_BOTH)
smbd.chown(self.tempdir, BA_id, SO_id, self.get_session_info())
smbd.set_simple_acl(self.tempdir, 0o750, self.get_session_info())
facl = getntacl(self.lp, self.tempdir, self.get_session_info(), direct_db_access=False)
acl = "O:BAG:SOD:(A;;FA;;;BA)(A;;0x1200a9;;;SO)(A;;;;;WD)(A;OICIIO;FA;;;CO)(A;OICIIO;0x1200a9;;;CG)(A;OICIIO;0x1200a9;;;WD)"
anysid = security.dom_sid(security.SID_NT_SELF)
self.assertEqual(acl, facl.as_sddl(anysid))
def test_setposixacl_group_getntacl_smbd(self):
BA_sid = security.dom_sid(security.SID_BUILTIN_ADMINISTRATORS)
s4_passdb = passdb.PDB(self.lp.get("passdb backend"))
(BA_gid, BA_type) = s4_passdb.sid_to_id(BA_sid)
group_SID = s4_passdb.gid_to_sid(os.stat(self.tempf).st_gid)
user_SID = s4_passdb.uid_to_sid(os.stat(self.tempf).st_uid)
self.assertEqual(BA_type, idmap.ID_TYPE_BOTH)
smbd.set_simple_acl(self.tempf, 0o640, self.get_session_info(), BA_gid)
facl = getntacl(self.lp, self.tempf, self.get_session_info(), direct_db_access=False)
domsid = passdb.get_global_sam_sid()
acl = "O:%sG:%sD:(A;;0x1f019f;;;%s)(A;;FR;;;BA)(A;;FR;;;%s)(A;;;;;WD)" % (user_SID, group_SID, user_SID, group_SID)
anysid = security.dom_sid(security.SID_NT_SELF)
self.assertEqual(acl, facl.as_sddl(anysid))
def test_setposixacl_getposixacl(self):
smbd.set_simple_acl(self.tempf, 0o640, self.get_session_info())
posix_acl = smbd.get_sys_acl(self.tempf, smb_acl.SMB_ACL_TYPE_ACCESS, self.get_session_info())
self.assertEqual(posix_acl.count, 4, self.print_posix_acl(posix_acl))
self.assertEqual(posix_acl.acl[0].a_type, smb_acl.SMB_ACL_USER_OBJ)
self.assertEqual(posix_acl.acl[0].a_perm, 6)
self.assertEqual(posix_acl.acl[1].a_type, smb_acl.SMB_ACL_GROUP_OBJ)
self.assertEqual(posix_acl.acl[1].a_perm, 4)
self.assertEqual(posix_acl.acl[2].a_type, smb_acl.SMB_ACL_OTHER)
self.assertEqual(posix_acl.acl[2].a_perm, 0)
self.assertEqual(posix_acl.acl[3].a_type, smb_acl.SMB_ACL_MASK)
self.assertEqual(posix_acl.acl[3].a_perm, 7)
def test_setposixacl_dir_getposixacl(self):
smbd.set_simple_acl(self.tempdir, 0o750, self.get_session_info())
posix_acl = smbd.get_sys_acl(self.tempdir, smb_acl.SMB_ACL_TYPE_ACCESS, self.get_session_info())
self.assertEqual(posix_acl.count, 4, self.print_posix_acl(posix_acl))
self.assertEqual(posix_acl.acl[0].a_type, smb_acl.SMB_ACL_USER_OBJ)
self.assertEqual(posix_acl.acl[0].a_perm, 7)
self.assertEqual(posix_acl.acl[1].a_type, smb_acl.SMB_ACL_GROUP_OBJ)
self.assertEqual(posix_acl.acl[1].a_perm, 5)
self.assertEqual(posix_acl.acl[2].a_type, smb_acl.SMB_ACL_OTHER)
self.assertEqual(posix_acl.acl[2].a_perm, 0)
self.assertEqual(posix_acl.acl[3].a_type, smb_acl.SMB_ACL_MASK)
self.assertEqual(posix_acl.acl[3].a_perm, 7)
def test_setposixacl_group_getposixacl(self):
BA_sid = security.dom_sid(security.SID_BUILTIN_ADMINISTRATORS)
s4_passdb = passdb.PDB(self.lp.get("passdb backend"))
(BA_gid, BA_type) = s4_passdb.sid_to_id(BA_sid)
self.assertEqual(BA_type, idmap.ID_TYPE_BOTH)
smbd.set_simple_acl(self.tempf, 0o670, self.get_session_info(), BA_gid)
posix_acl = smbd.get_sys_acl(self.tempf, smb_acl.SMB_ACL_TYPE_ACCESS, self.get_session_info())
self.assertEqual(posix_acl.count, 5, self.print_posix_acl(posix_acl))
self.assertEqual(posix_acl.acl[0].a_type, smb_acl.SMB_ACL_USER_OBJ)
self.assertEqual(posix_acl.acl[0].a_perm, 6)
self.assertEqual(posix_acl.acl[1].a_type, smb_acl.SMB_ACL_GROUP_OBJ)
self.assertEqual(posix_acl.acl[1].a_perm, 7)
self.assertEqual(posix_acl.acl[2].a_type, smb_acl.SMB_ACL_OTHER)
self.assertEqual(posix_acl.acl[2].a_perm, 0)
self.assertEqual(posix_acl.acl[3].a_type, smb_acl.SMB_ACL_GROUP)
self.assertEqual(posix_acl.acl[3].a_perm, 7)
self.assertEqual(posix_acl.acl[3].info.gid, BA_gid)
self.assertEqual(posix_acl.acl[4].a_type, smb_acl.SMB_ACL_MASK)
self.assertEqual(posix_acl.acl[4].a_perm, 7)
def test_setntacl_sysvol_check_getposixacl(self):
acl = provision.SYSVOL_ACL
domsid = passdb.get_global_sam_sid()
session_info = self.get_session_info(domsid)
setntacl(self.lp, self.tempf, acl, str(domsid),
session_info, use_ntvfs=False)
facl = getntacl(self.lp, self.tempf, session_info)
self.assertEqual(facl.as_sddl(domsid), acl)
posix_acl = smbd.get_sys_acl(self.tempf, smb_acl.SMB_ACL_TYPE_ACCESS, session_info)
nwrap_module_so_path = os.getenv('NSS_WRAPPER_MODULE_SO_PATH')
nwrap_module_fn_prefix = os.getenv('NSS_WRAPPER_MODULE_FN_PREFIX')
nwrap_winbind_active = (nwrap_module_so_path != "" and
nwrap_module_fn_prefix == "winbind")
is_user_session = not session_info.security_token.is_system()
LA_sid = security.dom_sid(str(domsid) + "-" + str(security.DOMAIN_RID_ADMINISTRATOR))
BA_sid = security.dom_sid(security.SID_BUILTIN_ADMINISTRATORS)
SO_sid = security.dom_sid(security.SID_BUILTIN_SERVER_OPERATORS)
SY_sid = security.dom_sid(security.SID_NT_SYSTEM)
AU_sid = security.dom_sid(security.SID_NT_AUTHENTICATED_USERS)
s4_passdb = passdb.PDB(self.lp.get("passdb backend"))
# These assertions correct for current ad_dc selftest
# configuration. When other environments have a broad range of
# groups mapped via passdb, we can relax some of these checks
(LA_uid, LA_type) = s4_passdb.sid_to_id(LA_sid)
self.assertEqual(LA_type, idmap.ID_TYPE_UID)
(BA_gid, BA_type) = s4_passdb.sid_to_id(BA_sid)
self.assertEqual(BA_type, idmap.ID_TYPE_BOTH)
(SO_gid, SO_type) = s4_passdb.sid_to_id(SO_sid)
self.assertEqual(SO_type, idmap.ID_TYPE_BOTH)
(SY_gid, SY_type) = s4_passdb.sid_to_id(SY_sid)
self.assertEqual(SO_type, idmap.ID_TYPE_BOTH)
(AU_gid, AU_type) = s4_passdb.sid_to_id(AU_sid)
self.assertEqual(AU_type, idmap.ID_TYPE_BOTH)
self.assertEqual(posix_acl.count, 13, self.print_posix_acl(posix_acl))
self.assertEqual(posix_acl.acl[0].a_type, smb_acl.SMB_ACL_GROUP)
self.assertEqual(posix_acl.acl[0].a_perm, 7)
self.assertEqual(posix_acl.acl[0].info.gid, BA_gid)
self.assertEqual(posix_acl.acl[1].a_type, smb_acl.SMB_ACL_USER)
if nwrap_winbind_active or is_user_session:
self.assertEqual(posix_acl.acl[1].a_perm, 7)
else:
self.assertEqual(posix_acl.acl[1].a_perm, 6)
self.assertEqual(posix_acl.acl[1].info.uid, LA_uid)
self.assertEqual(posix_acl.acl[2].a_type, smb_acl.SMB_ACL_OTHER)
self.assertEqual(posix_acl.acl[2].a_perm, 0)
self.assertEqual(posix_acl.acl[3].a_type, smb_acl.SMB_ACL_USER_OBJ)
if nwrap_winbind_active or is_user_session:
self.assertEqual(posix_acl.acl[3].a_perm, 7)
else:
self.assertEqual(posix_acl.acl[3].a_perm, 6)
self.assertEqual(posix_acl.acl[4].a_type, smb_acl.SMB_ACL_USER)
self.assertEqual(posix_acl.acl[4].a_perm, 7)
self.assertEqual(posix_acl.acl[4].info.uid, BA_gid)
self.assertEqual(posix_acl.acl[5].a_type, smb_acl.SMB_ACL_GROUP_OBJ)
self.assertEqual(posix_acl.acl[5].a_perm, 7)
self.assertEqual(posix_acl.acl[6].a_type, smb_acl.SMB_ACL_USER)
self.assertEqual(posix_acl.acl[6].a_perm, 5)
self.assertEqual(posix_acl.acl[6].info.uid, SO_gid)
self.assertEqual(posix_acl.acl[7].a_type, smb_acl.SMB_ACL_GROUP)
self.assertEqual(posix_acl.acl[7].a_perm, 5)
self.assertEqual(posix_acl.acl[7].info.gid, SO_gid)
self.assertEqual(posix_acl.acl[8].a_type, smb_acl.SMB_ACL_USER)
self.assertEqual(posix_acl.acl[8].a_perm, 7)
self.assertEqual(posix_acl.acl[8].info.uid, SY_gid)
self.assertEqual(posix_acl.acl[9].a_type, smb_acl.SMB_ACL_GROUP)
self.assertEqual(posix_acl.acl[9].a_perm, 7)
self.assertEqual(posix_acl.acl[9].info.gid, SY_gid)
self.assertEqual(posix_acl.acl[10].a_type, smb_acl.SMB_ACL_USER)
self.assertEqual(posix_acl.acl[10].a_perm, 5)
self.assertEqual(posix_acl.acl[10].info.uid, AU_gid)
self.assertEqual(posix_acl.acl[11].a_type, smb_acl.SMB_ACL_GROUP)
self.assertEqual(posix_acl.acl[11].a_perm, 5)
self.assertEqual(posix_acl.acl[11].info.gid, AU_gid)
self.assertEqual(posix_acl.acl[12].a_type, smb_acl.SMB_ACL_MASK)
self.assertEqual(posix_acl.acl[12].a_perm, 7)
# check that it matches:
# user::rwx
# user:root:rwx (selftest user actually)
# group::rwx
# group:Local Admins:rwx
# group:3000000:r-x
# group:3000001:rwx
# group:3000002:r-x
# mask::rwx
# other::---
# This is in this order in the NDR smb_acl(not re-orderded for display)
# a_type: GROUP
# a_perm: 7
# uid: -1
# gid: 10
# a_type: USER
# a_perm: 6
# uid: 0 (selftest user actually)
# gid: -1
# a_type: OTHER
# a_perm: 0
# uid: -1
# gid: -1
# a_type: USER_OBJ
# a_perm: 6
# uid: -1
# gid: -1
# a_type: GROUP_OBJ
# a_perm: 7
# uid: -1
# gid: -1
# a_type: GROUP
# a_perm: 5
# uid: -1
# gid: 3000020
# a_type: GROUP
# a_perm: 7
# uid: -1
# gid: 3000000
# a_type: GROUP
# a_perm: 5
# uid: -1
# gid: 3000001
# a_type: MASK
# a_perm: 7
# uid: -1
# gid: -1
def test_setntacl_sysvol_dir_check_getposixacl(self):
acl = provision.SYSVOL_ACL
domsid = passdb.get_global_sam_sid()
session_info = self.get_session_info(domsid)
setntacl(self.lp, self.tempdir, acl, str(domsid),
session_info, use_ntvfs=False)
facl = getntacl(self.lp, self.tempdir, session_info)
self.assertEqual(facl.as_sddl(domsid), acl)
posix_acl = smbd.get_sys_acl(self.tempdir, smb_acl.SMB_ACL_TYPE_ACCESS, session_info)
LA_sid = security.dom_sid(str(domsid) + "-" + str(security.DOMAIN_RID_ADMINISTRATOR))
BA_sid = security.dom_sid(security.SID_BUILTIN_ADMINISTRATORS)
SO_sid = security.dom_sid(security.SID_BUILTIN_SERVER_OPERATORS)
SY_sid = security.dom_sid(security.SID_NT_SYSTEM)
AU_sid = security.dom_sid(security.SID_NT_AUTHENTICATED_USERS)
s4_passdb = passdb.PDB(self.lp.get("passdb backend"))
# These assertions correct for current ad_dc selftest
# configuration. When other environments have a broad range of
# groups mapped via passdb, we can relax some of these checks
(LA_uid, LA_type) = s4_passdb.sid_to_id(LA_sid)
self.assertEqual(LA_type, idmap.ID_TYPE_UID)
(BA_gid, BA_type) = s4_passdb.sid_to_id(BA_sid)
self.assertEqual(BA_type, idmap.ID_TYPE_BOTH)
(SO_gid, SO_type) = s4_passdb.sid_to_id(SO_sid)
self.assertEqual(SO_type, idmap.ID_TYPE_BOTH)
(SY_gid, SY_type) = s4_passdb.sid_to_id(SY_sid)
self.assertEqual(SO_type, idmap.ID_TYPE_BOTH)
(AU_gid, AU_type) = s4_passdb.sid_to_id(AU_sid)
self.assertEqual(AU_type, idmap.ID_TYPE_BOTH)
self.assertEqual(posix_acl.count, 13, self.print_posix_acl(posix_acl))
self.assertEqual(posix_acl.acl[0].a_type, smb_acl.SMB_ACL_GROUP)
self.assertEqual(posix_acl.acl[0].a_perm, 7)
self.assertEqual(posix_acl.acl[0].info.gid, BA_gid)
self.assertEqual(posix_acl.acl[1].a_type, smb_acl.SMB_ACL_USER)
self.assertEqual(posix_acl.acl[1].a_perm, 7)
self.assertEqual(posix_acl.acl[1].info.uid, LA_uid)
self.assertEqual(posix_acl.acl[2].a_type, smb_acl.SMB_ACL_OTHER)
self.assertEqual(posix_acl.acl[2].a_perm, 0)
self.assertEqual(posix_acl.acl[3].a_type, smb_acl.SMB_ACL_USER_OBJ)
self.assertEqual(posix_acl.acl[3].a_perm, 7)
self.assertEqual(posix_acl.acl[4].a_type, smb_acl.SMB_ACL_USER)
self.assertEqual(posix_acl.acl[4].a_perm, 7)
self.assertEqual(posix_acl.acl[4].info.uid, BA_gid)
self.assertEqual(posix_acl.acl[5].a_type, smb_acl.SMB_ACL_GROUP_OBJ)
self.assertEqual(posix_acl.acl[5].a_perm, 7)
self.assertEqual(posix_acl.acl[6].a_type, smb_acl.SMB_ACL_USER)
self.assertEqual(posix_acl.acl[6].a_perm, 5)
self.assertEqual(posix_acl.acl[6].info.uid, SO_gid)
self.assertEqual(posix_acl.acl[7].a_type, smb_acl.SMB_ACL_GROUP)
self.assertEqual(posix_acl.acl[7].a_perm, 5)
self.assertEqual(posix_acl.acl[7].info.gid, SO_gid)
self.assertEqual(posix_acl.acl[8].a_type, smb_acl.SMB_ACL_USER)
self.assertEqual(posix_acl.acl[8].a_perm, 7)
self.assertEqual(posix_acl.acl[8].info.uid, SY_gid)
self.assertEqual(posix_acl.acl[9].a_type, smb_acl.SMB_ACL_GROUP)
self.assertEqual(posix_acl.acl[9].a_perm, 7)
self.assertEqual(posix_acl.acl[9].info.gid, SY_gid)
self.assertEqual(posix_acl.acl[10].a_type, smb_acl.SMB_ACL_USER)
self.assertEqual(posix_acl.acl[10].a_perm, 5)
self.assertEqual(posix_acl.acl[10].info.uid, AU_gid)
self.assertEqual(posix_acl.acl[11].a_type, smb_acl.SMB_ACL_GROUP)
self.assertEqual(posix_acl.acl[11].a_perm, 5)
self.assertEqual(posix_acl.acl[11].info.gid, AU_gid)
self.assertEqual(posix_acl.acl[12].a_type, smb_acl.SMB_ACL_MASK)
self.assertEqual(posix_acl.acl[12].a_perm, 7)
# check that it matches:
# user::rwx
# user:root:rwx (selftest user actually)
# group::rwx
# group:3000000:rwx
# group:3000001:r-x
# group:3000002:rwx
# group:3000003:r-x
# mask::rwx
# other::---
def test_setntacl_policies_dir_check_getposixacl(self):
acl = provision.POLICIES_ACL
domsid = passdb.get_global_sam_sid()
session_info = self.get_session_info(domsid)
setntacl(self.lp, self.tempdir, acl, str(domsid),
session_info, use_ntvfs=False)
facl = getntacl(self.lp, self.tempdir, session_info)
self.assertEqual(facl.as_sddl(domsid), acl)
posix_acl = smbd.get_sys_acl(self.tempdir, smb_acl.SMB_ACL_TYPE_ACCESS, session_info)
LA_sid = security.dom_sid(str(domsid) + "-" + str(security.DOMAIN_RID_ADMINISTRATOR))
BA_sid = security.dom_sid(security.SID_BUILTIN_ADMINISTRATORS)
SO_sid = security.dom_sid(security.SID_BUILTIN_SERVER_OPERATORS)
SY_sid = security.dom_sid(security.SID_NT_SYSTEM)
AU_sid = security.dom_sid(security.SID_NT_AUTHENTICATED_USERS)
PA_sid = security.dom_sid(str(domsid) + "-" + str(security.DOMAIN_RID_POLICY_ADMINS))
s4_passdb = passdb.PDB(self.lp.get("passdb backend"))
# These assertions correct for current ad_dc selftest
# configuration. When other environments have a broad range of
# groups mapped via passdb, we can relax some of these checks
(LA_uid, LA_type) = s4_passdb.sid_to_id(LA_sid)
self.assertEqual(LA_type, idmap.ID_TYPE_UID)
(BA_gid, BA_type) = s4_passdb.sid_to_id(BA_sid)
self.assertEqual(BA_type, idmap.ID_TYPE_BOTH)
(SO_gid, SO_type) = s4_passdb.sid_to_id(SO_sid)
self.assertEqual(SO_type, idmap.ID_TYPE_BOTH)
(SY_gid, SY_type) = s4_passdb.sid_to_id(SY_sid)
self.assertEqual(SO_type, idmap.ID_TYPE_BOTH)
(AU_gid, AU_type) = s4_passdb.sid_to_id(AU_sid)
self.assertEqual(AU_type, idmap.ID_TYPE_BOTH)
(PA_gid, PA_type) = s4_passdb.sid_to_id(PA_sid)
self.assertEqual(PA_type, idmap.ID_TYPE_BOTH)
self.assertEqual(posix_acl.count, 15, self.print_posix_acl(posix_acl))
self.assertEqual(posix_acl.acl[0].a_type, smb_acl.SMB_ACL_GROUP)
self.assertEqual(posix_acl.acl[0].a_perm, 7)
self.assertEqual(posix_acl.acl[0].info.gid, BA_gid)
self.assertEqual(posix_acl.acl[1].a_type, smb_acl.SMB_ACL_USER)
self.assertEqual(posix_acl.acl[1].a_perm, 7)
self.assertEqual(posix_acl.acl[1].info.uid, LA_uid)
self.assertEqual(posix_acl.acl[2].a_type, smb_acl.SMB_ACL_OTHER)
self.assertEqual(posix_acl.acl[2].a_perm, 0)
self.assertEqual(posix_acl.acl[3].a_type, smb_acl.SMB_ACL_USER_OBJ)
self.assertEqual(posix_acl.acl[3].a_perm, 7)
self.assertEqual(posix_acl.acl[4].a_type, smb_acl.SMB_ACL_USER)
self.assertEqual(posix_acl.acl[4].a_perm, 7)
self.assertEqual(posix_acl.acl[4].info.uid, BA_gid)
self.assertEqual(posix_acl.acl[5].a_type, smb_acl.SMB_ACL_GROUP_OBJ)
self.assertEqual(posix_acl.acl[5].a_perm, 7)
self.assertEqual(posix_acl.acl[6].a_type, smb_acl.SMB_ACL_USER)
self.assertEqual(posix_acl.acl[6].a_perm, 5)
self.assertEqual(posix_acl.acl[6].info.uid, SO_gid)
self.assertEqual(posix_acl.acl[7].a_type, smb_acl.SMB_ACL_GROUP)
self.assertEqual(posix_acl.acl[7].a_perm, 5)
self.assertEqual(posix_acl.acl[7].info.gid, SO_gid)
self.assertEqual(posix_acl.acl[8].a_type, smb_acl.SMB_ACL_USER)
self.assertEqual(posix_acl.acl[8].a_perm, 7)
self.assertEqual(posix_acl.acl[8].info.uid, SY_gid)
self.assertEqual(posix_acl.acl[9].a_type, smb_acl.SMB_ACL_GROUP)
self.assertEqual(posix_acl.acl[9].a_perm, 7)
self.assertEqual(posix_acl.acl[9].info.gid, SY_gid)
self.assertEqual(posix_acl.acl[10].a_type, smb_acl.SMB_ACL_USER)
self.assertEqual(posix_acl.acl[10].a_perm, 5)
self.assertEqual(posix_acl.acl[10].info.uid, AU_gid)
self.assertEqual(posix_acl.acl[11].a_type, smb_acl.SMB_ACL_GROUP)
self.assertEqual(posix_acl.acl[11].a_perm, 5)
self.assertEqual(posix_acl.acl[11].info.gid, AU_gid)
self.assertEqual(posix_acl.acl[12].a_type, smb_acl.SMB_ACL_USER)
self.assertEqual(posix_acl.acl[12].a_perm, 7)
self.assertEqual(posix_acl.acl[12].info.uid, PA_gid)
self.assertEqual(posix_acl.acl[13].a_type, smb_acl.SMB_ACL_GROUP)
self.assertEqual(posix_acl.acl[13].a_perm, 7)
self.assertEqual(posix_acl.acl[13].info.gid, PA_gid)
self.assertEqual(posix_acl.acl[14].a_type, smb_acl.SMB_ACL_MASK)
self.assertEqual(posix_acl.acl[14].a_perm, 7)
# check that it matches:
# user::rwx
# user:root:rwx (selftest user actually)
# group::rwx
# group:3000000:rwx
# group:3000001:r-x
# group:3000002:rwx
# group:3000003:r-x
# group:3000004:rwx
# mask::rwx
# other::---
def test_setntacl_policies_check_getposixacl(self):
acl = provision.POLICIES_ACL
domsid = passdb.get_global_sam_sid()
session_info = self.get_session_info(domsid)
setntacl(self.lp, self.tempf, acl, str(domsid),
session_info, use_ntvfs=False)
facl = getntacl(self.lp, self.tempf, session_info)
self.assertEqual(facl.as_sddl(domsid), acl)
posix_acl = smbd.get_sys_acl(self.tempf, smb_acl.SMB_ACL_TYPE_ACCESS, session_info)
nwrap_module_so_path = os.getenv('NSS_WRAPPER_MODULE_SO_PATH')
nwrap_module_fn_prefix = os.getenv('NSS_WRAPPER_MODULE_FN_PREFIX')
nwrap_winbind_active = (nwrap_module_so_path != "" and
nwrap_module_fn_prefix == "winbind")
is_user_session = not session_info.security_token.is_system()
LA_sid = security.dom_sid(str(domsid) + "-" + str(security.DOMAIN_RID_ADMINISTRATOR))
BA_sid = security.dom_sid(security.SID_BUILTIN_ADMINISTRATORS)
SO_sid = security.dom_sid(security.SID_BUILTIN_SERVER_OPERATORS)
SY_sid = security.dom_sid(security.SID_NT_SYSTEM)
AU_sid = security.dom_sid(security.SID_NT_AUTHENTICATED_USERS)
PA_sid = security.dom_sid(str(domsid) + "-" + str(security.DOMAIN_RID_POLICY_ADMINS))
s4_passdb = passdb.PDB(self.lp.get("passdb backend"))
# These assertions correct for current ad_dc selftest
# configuration. When other environments have a broad range of
# groups mapped via passdb, we can relax some of these checks
(LA_uid, LA_type) = s4_passdb.sid_to_id(LA_sid)
self.assertEqual(LA_type, idmap.ID_TYPE_UID)
(BA_gid, BA_type) = s4_passdb.sid_to_id(BA_sid)
self.assertEqual(BA_type, idmap.ID_TYPE_BOTH)
(SO_gid, SO_type) = s4_passdb.sid_to_id(SO_sid)
self.assertEqual(SO_type, idmap.ID_TYPE_BOTH)
(SY_gid, SY_type) = s4_passdb.sid_to_id(SY_sid)
self.assertEqual(SO_type, idmap.ID_TYPE_BOTH)
(AU_gid, AU_type) = s4_passdb.sid_to_id(AU_sid)
self.assertEqual(AU_type, idmap.ID_TYPE_BOTH)
(PA_gid, PA_type) = s4_passdb.sid_to_id(PA_sid)
self.assertEqual(PA_type, idmap.ID_TYPE_BOTH)
self.assertEqual(posix_acl.count, 15, self.print_posix_acl(posix_acl))
self.assertEqual(posix_acl.acl[0].a_type, smb_acl.SMB_ACL_GROUP)
self.assertEqual(posix_acl.acl[0].a_perm, 7)
self.assertEqual(posix_acl.acl[0].info.gid, BA_gid)
self.assertEqual(posix_acl.acl[1].a_type, smb_acl.SMB_ACL_USER)
if nwrap_winbind_active or is_user_session:
self.assertEqual(posix_acl.acl[1].a_perm, 7)
else:
self.assertEqual(posix_acl.acl[1].a_perm, 6)
self.assertEqual(posix_acl.acl[1].info.uid, LA_uid)
self.assertEqual(posix_acl.acl[2].a_type, smb_acl.SMB_ACL_OTHER)
self.assertEqual(posix_acl.acl[2].a_perm, 0)
self.assertEqual(posix_acl.acl[3].a_type, smb_acl.SMB_ACL_USER_OBJ)
if nwrap_winbind_active or is_user_session:
self.assertEqual(posix_acl.acl[3].a_perm, 7)
else:
self.assertEqual(posix_acl.acl[3].a_perm, 6)
self.assertEqual(posix_acl.acl[4].a_type, smb_acl.SMB_ACL_USER)
self.assertEqual(posix_acl.acl[4].a_perm, 7)
self.assertEqual(posix_acl.acl[4].info.uid, BA_gid)
self.assertEqual(posix_acl.acl[5].a_type, smb_acl.SMB_ACL_GROUP_OBJ)
self.assertEqual(posix_acl.acl[5].a_perm, 7)
self.assertEqual(posix_acl.acl[6].a_type, smb_acl.SMB_ACL_USER)
self.assertEqual(posix_acl.acl[6].a_perm, 5)
self.assertEqual(posix_acl.acl[6].info.uid, SO_gid)
self.assertEqual(posix_acl.acl[7].a_type, smb_acl.SMB_ACL_GROUP)
self.assertEqual(posix_acl.acl[7].a_perm, 5)
self.assertEqual(posix_acl.acl[7].info.gid, SO_gid)
self.assertEqual(posix_acl.acl[8].a_type, smb_acl.SMB_ACL_USER)
self.assertEqual(posix_acl.acl[8].a_perm, 7)
self.assertEqual(posix_acl.acl[8].info.uid, SY_gid)
self.assertEqual(posix_acl.acl[9].a_type, smb_acl.SMB_ACL_GROUP)
self.assertEqual(posix_acl.acl[9].a_perm, 7)
self.assertEqual(posix_acl.acl[9].info.gid, SY_gid)
self.assertEqual(posix_acl.acl[10].a_type, smb_acl.SMB_ACL_USER)
self.assertEqual(posix_acl.acl[10].a_perm, 5)
self.assertEqual(posix_acl.acl[10].info.uid, AU_gid)
self.assertEqual(posix_acl.acl[11].a_type, smb_acl.SMB_ACL_GROUP)
self.assertEqual(posix_acl.acl[11].a_perm, 5)
self.assertEqual(posix_acl.acl[11].info.gid, AU_gid)
self.assertEqual(posix_acl.acl[12].a_type, smb_acl.SMB_ACL_USER)
self.assertEqual(posix_acl.acl[12].a_perm, 7)
self.assertEqual(posix_acl.acl[12].info.uid, PA_gid)
self.assertEqual(posix_acl.acl[13].a_type, smb_acl.SMB_ACL_GROUP)
self.assertEqual(posix_acl.acl[13].a_perm, 7)
self.assertEqual(posix_acl.acl[13].info.gid, PA_gid)
self.assertEqual(posix_acl.acl[14].a_type, smb_acl.SMB_ACL_MASK)
self.assertEqual(posix_acl.acl[14].a_perm, 7)
# check that it matches:
# user::rwx
# user:root:rwx (selftest user actually)
# group::rwx
# group:Local Admins:rwx
# group:3000000:r-x
# group:3000001:rwx
# group:3000002:r-x
# group:3000003:rwx
# mask::rwx
# other::---
# This is in this order in the NDR smb_acl(not re-orderded for display)
# a_type: GROUP
# a_perm: 7
# uid: -1
# gid: 10
# a_type: USER
# a_perm: 6
# uid: 0 (selftest user actually)
# gid: -1
# a_type: OTHER
# a_perm: 0
# uid: -1
# gid: -1
# a_type: USER_OBJ
# a_perm: 6
# uid: -1
# gid: -1
# a_type: GROUP_OBJ
# a_perm: 7
# uid: -1
# gid: -1
# a_type: GROUP
# a_perm: 5
# uid: -1
# gid: 3000020
# a_type: GROUP
# a_perm: 7
# uid: -1
# gid: 3000000
# a_type: GROUP
# a_perm: 5
# uid: -1
# gid: 3000001
# a_type: GROUP
# a_perm: 7
# uid: -1
# gid: 3000003
# a_type: MASK
# a_perm: 7
# uid: -1
# gid: -1
class SessionedPosixAclMappingTests(PosixAclMappingTests):
"""
Run same test suite with session enabled.
"""
def get_session_info(self, domsid=DOM_SID):
"""
Get session_info for setntacl.
"""
if str(domsid) != str(self.samdb.get_domain_sid()):
# fake it with admin session as domsid is not in local db
admin_session = auth.admin_session(self.lp, str(domsid))
auth.session_info_fill_unix(admin_session,
lp_ctx=self.lp,
user_name="Administrator")
return admin_session
dn = '<SID={0}-{1}>'.format(domsid, security.DOMAIN_RID_ADMINISTRATOR)
flags = (auth.AUTH_SESSION_INFO_DEFAULT_GROUPS |
auth.AUTH_SESSION_INFO_AUTHENTICATED |
auth.AUTH_SESSION_INFO_SIMPLE_PRIVILEGES)
user_session = auth.user_session(self.samdb,
lp_ctx=self.lp,
dn=dn,
session_info_flags=flags)
auth.session_info_fill_unix(user_session,
lp_ctx=self.lp,
user_name="Administrator")
return user_session
class UnixSessionedPosixAclMappingTests(PosixAclMappingTests):
"""
Run same test suite with session enabled.
"""
def get_session_info(self, domsid=DOM_SID):
"""
Get session_info for setntacl.
"""
if str(domsid) != str(self.samdb.get_domain_sid()):
# fake it with admin session as domsid is not in local db
admin_session = auth.admin_session(self.lp, str(domsid))
auth.session_info_fill_unix(admin_session,
lp_ctx=self.lp,
user_name="Administrator")
return admin_session
dn = '<SID={0}-{1}>'.format(domsid, security.DOMAIN_RID_ADMINISTRATOR)
flags = (auth.AUTH_SESSION_INFO_DEFAULT_GROUPS |
auth.AUTH_SESSION_INFO_AUTHENTICATED |
auth.AUTH_SESSION_INFO_SIMPLE_PRIVILEGES)
session = auth.user_session(self.samdb, lp_ctx=self.lp, dn=dn,
session_info_flags=flags)
auth.session_info_fill_unix(session,
lp_ctx=self.lp,
user_name="Administrator")
return session