1*96c8483aSYuri Pankov#!/bin/ksh -p 2*96c8483aSYuri Pankov# 3*96c8483aSYuri Pankov# CDDL HEADER START 4*96c8483aSYuri Pankov# 5*96c8483aSYuri Pankov# The contents of this file are subject to the terms of the 6*96c8483aSYuri Pankov# Common Development and Distribution License (the "License"). 7*96c8483aSYuri Pankov# You may not use this file except in compliance with the License. 8*96c8483aSYuri Pankov# 9*96c8483aSYuri Pankov# You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 10*96c8483aSYuri Pankov# or http://www.opensolaris.org/os/licensing. 11*96c8483aSYuri Pankov# See the License for the specific language governing permissions 12*96c8483aSYuri Pankov# and limitations under the License. 13*96c8483aSYuri Pankov# 14*96c8483aSYuri Pankov# When distributing Covered Code, include this CDDL HEADER in each 15*96c8483aSYuri Pankov# file and include the License file at usr/src/OPENSOLARIS.LICENSE. 16*96c8483aSYuri Pankov# If applicable, add the following below this CDDL HEADER, with the 17*96c8483aSYuri Pankov# fields enclosed by brackets "[]" replaced with your own identifying 18*96c8483aSYuri Pankov# information: Portions Copyright [yyyy] [name of copyright owner] 19*96c8483aSYuri Pankov# 20*96c8483aSYuri Pankov# CDDL HEADER END 21*96c8483aSYuri Pankov# 22*96c8483aSYuri Pankov 23*96c8483aSYuri Pankov# 24*96c8483aSYuri Pankov# Copyright 2010 Sun Microsystems, Inc. All rights reserved. 25*96c8483aSYuri Pankov# 26*96c8483aSYuri Pankov 27*96c8483aSYuri Pankov# 28*96c8483aSYuri Pankov# ID: acl_005 29*96c8483aSYuri Pankov# 30*96c8483aSYuri Pankov# DESCRIPTION: 31*96c8483aSYuri Pankov# Verify we can take ownership (chown) 32*96c8483aSYuri Pankov# 33*96c8483aSYuri Pankov# STRATEGY: 34*96c8483aSYuri Pankov# 1. run "mount -F smbfs //$TUSER@..." $TMNT 35*96c8483aSYuri Pankov# 2. run "mount -F smbfs //$TUSER1@..." $TMNT2 36*96c8483aSYuri Pankov# 3. create file2, as $TUSER1 and get owner UID 37*96c8483aSYuri Pankov# 4. create a file as $TUSER 38*96c8483aSYuri Pankov# 5. give $TUSER1 full control 39*96c8483aSYuri Pankov# 6. chown UID $TMNT2/file 40*96c8483aSYuri Pankov# 7. verify $TUSER1 owns it 41*96c8483aSYuri Pankov# 42*96c8483aSYuri Pankov 43*96c8483aSYuri Pankov. $STF_SUITE/include/libtest.ksh 44*96c8483aSYuri Pankov 45*96c8483aSYuri Pankovtc_id="acl005" 46*96c8483aSYuri Pankovtc_desc="Verify we can take ownership (chown)" 47*96c8483aSYuri Pankovprint_test_case $tc_id - $tc_desc 48*96c8483aSYuri Pankov 49*96c8483aSYuri Pankovif [[ $STC_CIFS_CLIENT_DEBUG == 1 ]] || \ 50*96c8483aSYuri Pankov [[ *:${STC_CIFS_CLIENT_DEBUG}:* == *:$tc_id:* ]]; then 51*96c8483aSYuri Pankov set -x 52*96c8483aSYuri Pankovfi 53*96c8483aSYuri Pankov 54*96c8483aSYuri Pankovserver=$(server_name) || return 55*96c8483aSYuri Pankov 56*96c8483aSYuri Pankovsmbmount_clean $TMNT 57*96c8483aSYuri Pankovsmbmount_clean $TMNT2 58*96c8483aSYuri Pankov 59*96c8483aSYuri Pankovsmbmount_init $TMNT 60*96c8483aSYuri Pankovsmbmount_init $TMNT2 61*96c8483aSYuri Pankov 62*96c8483aSYuri Pankov# 1. run "mount -F smbfs //$TUSER@..." $TMNT 63*96c8483aSYuri Pankov 64*96c8483aSYuri Pankovcmd="mount -F smbfs -oacl //$TUSER:$TPASS@$server/public $TMNT" 65*96c8483aSYuri Pankovcti_execute -i '' FAIL $cmd 66*96c8483aSYuri Pankovif [[ $? != 0 ]]; then 67*96c8483aSYuri Pankov cti_fail "FAIL: $cmd" 68*96c8483aSYuri Pankov return 69*96c8483aSYuri Pankovelse 70*96c8483aSYuri Pankov cti_report "PASS: $cmd" 71*96c8483aSYuri Pankovfi 72*96c8483aSYuri Pankov 73*96c8483aSYuri Pankov# Require that the mount supports ACLs 74*96c8483aSYuri Pankovsmbmount_getmntopts $TMNT |grep /acl/ >/dev/null 75*96c8483aSYuri Pankovif [[ $? != 0 ]]; then 76*96c8483aSYuri Pankov smbmount_clean $TMNT 77*96c8483aSYuri Pankov cti_unsupported "UNSUPPORTED (no ACLs in this mount)" 78*96c8483aSYuri Pankov return 79*96c8483aSYuri Pankovfi 80*96c8483aSYuri Pankov 81*96c8483aSYuri Pankov# 2. run "mount -F smbfs //$TUSER1@..." $TMNT2 82*96c8483aSYuri Pankov 83*96c8483aSYuri Pankovcmd="mount -F smbfs -oacl //$TUSER1:$TPASS@$server/public $TMNT2" 84*96c8483aSYuri Pankovcti_execute -i '' FAIL $cmd 85*96c8483aSYuri Pankovif [[ $? != 0 ]]; then 86*96c8483aSYuri Pankov cti_fail "FAIL: $cmd" 87*96c8483aSYuri Pankov smbmount_clean $TMNT 88*96c8483aSYuri Pankov return 89*96c8483aSYuri Pankovelse 90*96c8483aSYuri Pankov cti_report "PASS: $cmd" 91*96c8483aSYuri Pankovfi 92*96c8483aSYuri Pankov 93*96c8483aSYuri Pankov# 3. create a file2 as $TUSER1 and get owner UID 94*96c8483aSYuri Pankov 95*96c8483aSYuri Pankovcmd="touch $TMNT2/${tc_id}B" 96*96c8483aSYuri Pankovcti_execute_cmd $cmd 97*96c8483aSYuri Pankovif [[ $? != 0 ]]; then 98*96c8483aSYuri Pankov cti_fail "FAIL: $cmd" 99*96c8483aSYuri Pankov smbmount_clean $TMNT 100*96c8483aSYuri Pankov smbmount_clean $TMNT2 101*96c8483aSYuri Pankov return 102*96c8483aSYuri Pankovfi 103*96c8483aSYuri Pankovcmd="ls -l $TMNT/${tc_id}B" 104*96c8483aSYuri Pankovcti_execute_cmd $cmd 105*96c8483aSYuri Pankovif [[ $? != 0 ]]; then 106*96c8483aSYuri Pankov cti_fail "FAIL: $cmd" 107*96c8483aSYuri Pankov smbmount_clean $TMNT 108*96c8483aSYuri Pankov smbmount_clean $TMNT2 109*96c8483aSYuri Pankov return 110*96c8483aSYuri Pankovfi 111*96c8483aSYuri Pankov# Get the ephemereal UID and GID for $TUSER1 112*96c8483aSYuri Pankovread mode cnt uid gid junk < cti_stdout 113*96c8483aSYuri Pankovcti_execute_cmd "rm $TMNT2/${tc_id}B" 114*96c8483aSYuri Pankov 115*96c8483aSYuri Pankov# 4. create a file, as $TUSER 116*96c8483aSYuri Pankov 117*96c8483aSYuri Pankovcmd="cp /etc/passwd $TMNT/$tc_id" 118*96c8483aSYuri Pankovcti_execute_cmd $cmd 119*96c8483aSYuri Pankovif [[ $? != 0 ]]; then 120*96c8483aSYuri Pankov cti_fail "FAIL: $cmd" 121*96c8483aSYuri Pankov smbmount_clean $TMNT 122*96c8483aSYuri Pankov smbmount_clean $TMNT2 123*96c8483aSYuri Pankov return 124*96c8483aSYuri Pankovfi 125*96c8483aSYuri Pankovcmd="ls -l $TMNT/$tc_id" 126*96c8483aSYuri Pankovcti_execute_cmd $cmd 127*96c8483aSYuri Pankovif [[ $? != 0 ]]; then 128*96c8483aSYuri Pankov cti_fail "FAIL: $cmd" 129*96c8483aSYuri Pankov smbmount_clean $TMNT 130*96c8483aSYuri Pankov smbmount_clean $TMNT2 131*96c8483aSYuri Pankov return 132*96c8483aSYuri Pankovfi 133*96c8483aSYuri Pankovcp cti_stdout out_save 134*96c8483aSYuri Pankov 135*96c8483aSYuri Pankov# 5. give $TUSER1 full control 136*96c8483aSYuri Pankovcmd="chmod A+user:${uid}:rwxpdDaARWcCos::allow $TMNT/$tc_id" 137*96c8483aSYuri Pankovcti_execute_cmd $cmd 138*96c8483aSYuri Pankovif [[ $? != 0 ]]; then 139*96c8483aSYuri Pankov cti_fail "FAIL: $cmd" 140*96c8483aSYuri Pankov smbmount_clean $TMNT 141*96c8483aSYuri Pankov smbmount_clean $TMNT2 142*96c8483aSYuri Pankov return 143*96c8483aSYuri Pankovfi 144*96c8483aSYuri Pankov 145*96c8483aSYuri Pankov# 6. chown UID $TMNT2/file 146*96c8483aSYuri Pankov 147*96c8483aSYuri Pankovcmd="sudo -n chown ${uid} $TMNT2/$tc_id" 148*96c8483aSYuri Pankovcti_execute_cmd $cmd 149*96c8483aSYuri Pankovif [[ $? != 0 ]]; then 150*96c8483aSYuri Pankov cti_fail "FAIL: $cmd" 151*96c8483aSYuri Pankov smbmount_clean $TMNT 152*96c8483aSYuri Pankov smbmount_clean $TMNT2 153*96c8483aSYuri Pankov return 154*96c8483aSYuri Pankovfi 155*96c8483aSYuri Pankov 156*96c8483aSYuri Pankov# 6. verify $TUSER1 owns it 157*96c8483aSYuri Pankov 158*96c8483aSYuri Pankovcmd="ls -l $TMNT2/$tc_id" 159*96c8483aSYuri Pankovcti_execute_cmd $cmd 160*96c8483aSYuri Pankovif [[ $? != 0 ]]; then 161*96c8483aSYuri Pankov cti_fail "FAIL: $cmd" 162*96c8483aSYuri Pankov smbmount_clean $TMNT 163*96c8483aSYuri Pankov smbmount_clean $TMNT2 164*96c8483aSYuri Pankov return 165*96c8483aSYuri Pankovfi 166*96c8483aSYuri Pankovcp cti_stdout out_test 167*96c8483aSYuri Pankov 168*96c8483aSYuri Pankov# The new owner should be different... 169*96c8483aSYuri Pankovcmd="diff out_save out_test" 170*96c8483aSYuri Pankovcti_execute_cmd $cmd 171*96c8483aSYuri Pankovif [[ $? == 0 ]]; then 172*96c8483aSYuri Pankov cti_fail "FAIL: owner should have changed" 173*96c8483aSYuri Pankov smbmount_clean $TMNT 174*96c8483aSYuri Pankov smbmount_clean $TMNT2 175*96c8483aSYuri Pankov return 176*96c8483aSYuri Pankovfi 177*96c8483aSYuri Pankov 178*96c8483aSYuri Pankov# The new owner should contain $uid 179*96c8483aSYuri Pankovgrep " $uid " out_test >/dev/null 180*96c8483aSYuri Pankovif [[ $? != 0 ]]; then 181*96c8483aSYuri Pankov cti_fail "FAIL: did not find $uid" 182*96c8483aSYuri Pankov smbmount_clean $TMNT 183*96c8483aSYuri Pankov smbmount_clean $TMNT2 184*96c8483aSYuri Pankov return 185*96c8483aSYuri Pankovfi 186*96c8483aSYuri Pankov 187*96c8483aSYuri Pankovcti_execute_cmd "rm $TMNT/$tc_id" 188*96c8483aSYuri Pankovsmbmount_clean $TMNT 189*96c8483aSYuri Pankovsmbmount_clean $TMNT2 190*96c8483aSYuri Pankov 191*96c8483aSYuri Pankovcti_pass "${tc_id}: PASS" 192