#!/bin/ksh -p # # CDDL HEADER START # # The contents of this file are subject to the terms of the # Common Development and Distribution License (the "License"). # You may not use this file except in compliance with the License. # # You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE # or http://www.opensolaris.org/os/licensing. # See the License for the specific language governing permissions # and limitations under the License. # # When distributing Covered Code, include this CDDL HEADER in each # file and include the License file at usr/src/OPENSOLARIS.LICENSE. # If applicable, add the following below this CDDL HEADER, with the # fields enclosed by brackets "[]" replaced with your own identifying # information: Portions Copyright [yyyy] [name of copyright owner] # # CDDL HEADER END # # # Copyright 2010 Sun Microsystems, Inc. All rights reserved. # # # ID: acl_004 # # DESCRIPTION: # Verify we can modify an ACL (add $TUSER1) # # STRATEGY: # 1. run "mount -F smbfs //$TUSER@..." $TMNT # 2. run "mount -F smbfs //$TUSER1@..." $TMNT2 # 3. create a file, as $TUSER # 4. create file2, as $TUSER1 and get owner UID # 5. chmod A+user:$TUSER1@:rxaRcs::allow file # 6. verify $TUSER1 ACE is there # . $STF_SUITE/include/libtest.ksh tc_id="acl004" tc_desc="Verify we can modify an ACL (add user ACE)" print_test_case $tc_id - $tc_desc if [[ $STC_CIFS_CLIENT_DEBUG == 1 ]] || \ [[ *:${STC_CIFS_CLIENT_DEBUG}:* == *:$tc_id:* ]]; then set -x fi server=$(server_name) || return smbmount_clean $TMNT smbmount_clean $TMNT2 smbmount_init $TMNT smbmount_init $TMNT2 # 1. run "mount -F smbfs //$TUSER@..." $TMNT cmd="mount -F smbfs -oacl //$TUSER:$TPASS@$server/public $TMNT" cti_execute -i '' FAIL $cmd if [[ $? != 0 ]]; then cti_fail "FAIL: $cmd" return else cti_report "PASS: $cmd" fi # Require that the mount supports ACLs smbmount_getmntopts $TMNT |grep /acl/ >/dev/null if [[ $? != 0 ]]; then smbmount_clean $TMNT cti_unsupported "UNSUPPORTED (no ACLs in this mount)" return fi # 2. run "mount -F smbfs //$TUSER1@..." $TMNT2 cmd="mount -F smbfs -oacl //$TUSER1:$TPASS@$server/public $TMNT2" cti_execute -i '' FAIL $cmd if [[ $? != 0 ]]; then cti_fail "FAIL: $cmd" smbmount_clean $TMNT return else cti_report "PASS: $cmd" fi # 3. create a file, as $TUSER cmd="cp /etc/passwd $TMNT/$tc_id" cti_execute_cmd $cmd if [[ $? != 0 ]]; then cti_fail "FAIL: $cmd" smbmount_clean $TMNT smbmount_clean $TMNT2 return fi cmd="ls -V $TMNT/$tc_id" cti_execute_cmd $cmd if [[ $? != 0 ]]; then cti_fail "FAIL: $cmd" smbmount_clean $TMNT smbmount_clean $TMNT2 return fi tail +2 cti_stdout > acl_save # 4. create a file, as $TUSER1 and get owner UID cmd="touch $TMNT2/${tc_id}B" cti_execute_cmd $cmd if [[ $? != 0 ]]; then cti_fail "FAIL: $cmd" smbmount_clean $TMNT smbmount_clean $TMNT2 return fi cmd="ls -V $TMNT/${tc_id}B" cti_execute_cmd $cmd if [[ $? != 0 ]]; then cti_fail "FAIL: $cmd" smbmount_clean $TMNT smbmount_clean $TMNT2 return fi # Get the ephemereal UID and GID for $TUSER1 read mode cnt uid gid junk < cti_stdout cti_execute_cmd "rm $TMNT2/${tc_id}B" # 5. chmod A+user:$TUSER1@:rxaRcs::allow file cmd="chmod A+user:${uid}:rxaRcs::allow $TMNT/$tc_id" cti_execute_cmd $cmd if [[ $? != 0 ]]; then cti_fail "FAIL: $cmd" smbmount_clean $TMNT smbmount_clean $TMNT2 return fi # 6. verify $TUSER1 ACE is there cmd="ls -V $TMNT/$tc_id" cti_execute_cmd $cmd if [[ $? != 0 ]]; then cti_fail "FAIL: $cmd" smbmount_clean $TMNT smbmount_clean $TMNT2 return fi tail +2 cti_stdout > acl_test # The new ACL should be different... cmd="diff acl_save acl_test" cti_execute_cmd $cmd if [[ $? == 0 ]]; then cti_fail "FAIL: ACL should have changed" smbmount_clean $TMNT smbmount_clean $TMNT2 return fi # The new ACL should contain $uid grep " user:${uid}:" acl_test >/dev/null if [[ $? != 0 ]]; then cti_fail "FAIL: did not find new ACE" smbmount_clean $TMNT smbmount_clean $TMNT2 return fi cti_execute_cmd "rm $TMNT/$tc_id" smbmount_clean $TMNT smbmount_clean $TMNT2 cti_pass "${tc_id}: PASS"