1*96c8483aSYuri Pankov#!/bin/ksh -p
2*96c8483aSYuri Pankov#
3*96c8483aSYuri Pankov# CDDL HEADER START
4*96c8483aSYuri Pankov#
5*96c8483aSYuri Pankov# The contents of this file are subject to the terms of the
6*96c8483aSYuri Pankov# Common Development and Distribution License (the "License").
7*96c8483aSYuri Pankov# You may not use this file except in compliance with the License.
8*96c8483aSYuri Pankov#
9*96c8483aSYuri Pankov# You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10*96c8483aSYuri Pankov# or http://www.opensolaris.org/os/licensing.
11*96c8483aSYuri Pankov# See the License for the specific language governing permissions
12*96c8483aSYuri Pankov# and limitations under the License.
13*96c8483aSYuri Pankov#
14*96c8483aSYuri Pankov# When distributing Covered Code, include this CDDL HEADER in each
15*96c8483aSYuri Pankov# file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16*96c8483aSYuri Pankov# If applicable, add the following below this CDDL HEADER, with the
17*96c8483aSYuri Pankov# fields enclosed by brackets "[]" replaced with your own identifying
18*96c8483aSYuri Pankov# information: Portions Copyright [yyyy] [name of copyright owner]
19*96c8483aSYuri Pankov#
20*96c8483aSYuri Pankov# CDDL HEADER END
21*96c8483aSYuri Pankov#
22*96c8483aSYuri Pankov
23*96c8483aSYuri Pankov#
24*96c8483aSYuri Pankov# Copyright 2010 Sun Microsystems, Inc.  All rights reserved.
25*96c8483aSYuri Pankov#
26*96c8483aSYuri Pankov
27*96c8483aSYuri Pankov#
28*96c8483aSYuri Pankov# ID: acl_005
29*96c8483aSYuri Pankov#
30*96c8483aSYuri Pankov# DESCRIPTION:
31*96c8483aSYuri Pankov#	Verify we can take ownership (chown)
32*96c8483aSYuri Pankov#
33*96c8483aSYuri Pankov# STRATEGY:
34*96c8483aSYuri Pankov#       1. run "mount -F smbfs //$TUSER@..." $TMNT
35*96c8483aSYuri Pankov#       2. run "mount -F smbfs //$TUSER1@..." $TMNT2
36*96c8483aSYuri Pankov#       3. create file2, as $TUSER1 and get owner UID
37*96c8483aSYuri Pankov#       4. create a file as $TUSER
38*96c8483aSYuri Pankov#	5. give $TUSER1 full control
39*96c8483aSYuri Pankov#       6. chown UID $TMNT2/file
40*96c8483aSYuri Pankov#	7. verify $TUSER1 owns it
41*96c8483aSYuri Pankov#
42*96c8483aSYuri Pankov
43*96c8483aSYuri Pankov. $STF_SUITE/include/libtest.ksh
44*96c8483aSYuri Pankov
45*96c8483aSYuri Pankovtc_id="acl005"
46*96c8483aSYuri Pankovtc_desc="Verify we can take ownership (chown)"
47*96c8483aSYuri Pankovprint_test_case $tc_id - $tc_desc
48*96c8483aSYuri Pankov
49*96c8483aSYuri Pankovif [[ $STC_CIFS_CLIENT_DEBUG == 1 ]] || \
50*96c8483aSYuri Pankov	[[ *:${STC_CIFS_CLIENT_DEBUG}:* == *:$tc_id:* ]]; then
51*96c8483aSYuri Pankov    set -x
52*96c8483aSYuri Pankovfi
53*96c8483aSYuri Pankov
54*96c8483aSYuri Pankovserver=$(server_name) || return
55*96c8483aSYuri Pankov
56*96c8483aSYuri Pankovsmbmount_clean $TMNT
57*96c8483aSYuri Pankovsmbmount_clean $TMNT2
58*96c8483aSYuri Pankov
59*96c8483aSYuri Pankovsmbmount_init $TMNT
60*96c8483aSYuri Pankovsmbmount_init $TMNT2
61*96c8483aSYuri Pankov
62*96c8483aSYuri Pankov#       1. run "mount -F smbfs //$TUSER@..." $TMNT
63*96c8483aSYuri Pankov
64*96c8483aSYuri Pankovcmd="mount -F smbfs -oacl //$TUSER:$TPASS@$server/public $TMNT"
65*96c8483aSYuri Pankovcti_execute -i '' FAIL $cmd
66*96c8483aSYuri Pankovif [[ $? != 0 ]]; then
67*96c8483aSYuri Pankov	cti_fail "FAIL: $cmd"
68*96c8483aSYuri Pankov	return
69*96c8483aSYuri Pankovelse
70*96c8483aSYuri Pankov	cti_report "PASS: $cmd"
71*96c8483aSYuri Pankovfi
72*96c8483aSYuri Pankov
73*96c8483aSYuri Pankov# Require that the mount supports ACLs
74*96c8483aSYuri Pankovsmbmount_getmntopts $TMNT |grep /acl/ >/dev/null
75*96c8483aSYuri Pankovif [[ $? != 0 ]]; then
76*96c8483aSYuri Pankov	smbmount_clean $TMNT
77*96c8483aSYuri Pankov	cti_unsupported "UNSUPPORTED (no ACLs in this mount)"
78*96c8483aSYuri Pankov	return
79*96c8483aSYuri Pankovfi
80*96c8483aSYuri Pankov
81*96c8483aSYuri Pankov#       2. run "mount -F smbfs //$TUSER1@..." $TMNT2
82*96c8483aSYuri Pankov
83*96c8483aSYuri Pankovcmd="mount -F smbfs -oacl //$TUSER1:$TPASS@$server/public $TMNT2"
84*96c8483aSYuri Pankovcti_execute -i '' FAIL $cmd
85*96c8483aSYuri Pankovif [[ $? != 0 ]]; then
86*96c8483aSYuri Pankov	cti_fail "FAIL: $cmd"
87*96c8483aSYuri Pankov	smbmount_clean $TMNT
88*96c8483aSYuri Pankov	return
89*96c8483aSYuri Pankovelse
90*96c8483aSYuri Pankov	cti_report "PASS: $cmd"
91*96c8483aSYuri Pankovfi
92*96c8483aSYuri Pankov
93*96c8483aSYuri Pankov#       3. create a file2 as $TUSER1 and get owner UID
94*96c8483aSYuri Pankov
95*96c8483aSYuri Pankovcmd="touch $TMNT2/${tc_id}B"
96*96c8483aSYuri Pankovcti_execute_cmd $cmd
97*96c8483aSYuri Pankovif [[ $? != 0 ]]; then
98*96c8483aSYuri Pankov	cti_fail "FAIL: $cmd"
99*96c8483aSYuri Pankov	smbmount_clean $TMNT
100*96c8483aSYuri Pankov	smbmount_clean $TMNT2
101*96c8483aSYuri Pankov	return
102*96c8483aSYuri Pankovfi
103*96c8483aSYuri Pankovcmd="ls -l $TMNT/${tc_id}B"
104*96c8483aSYuri Pankovcti_execute_cmd $cmd
105*96c8483aSYuri Pankovif [[ $? != 0 ]]; then
106*96c8483aSYuri Pankov	cti_fail "FAIL: $cmd"
107*96c8483aSYuri Pankov	smbmount_clean $TMNT
108*96c8483aSYuri Pankov	smbmount_clean $TMNT2
109*96c8483aSYuri Pankov	return
110*96c8483aSYuri Pankovfi
111*96c8483aSYuri Pankov# Get the ephemereal UID and GID for $TUSER1
112*96c8483aSYuri Pankovread mode cnt uid gid junk < cti_stdout
113*96c8483aSYuri Pankovcti_execute_cmd "rm $TMNT2/${tc_id}B"
114*96c8483aSYuri Pankov
115*96c8483aSYuri Pankov#       4. create a file, as $TUSER
116*96c8483aSYuri Pankov
117*96c8483aSYuri Pankovcmd="cp /etc/passwd $TMNT/$tc_id"
118*96c8483aSYuri Pankovcti_execute_cmd $cmd
119*96c8483aSYuri Pankovif [[ $? != 0 ]]; then
120*96c8483aSYuri Pankov	cti_fail "FAIL: $cmd"
121*96c8483aSYuri Pankov	smbmount_clean $TMNT
122*96c8483aSYuri Pankov	smbmount_clean $TMNT2
123*96c8483aSYuri Pankov	return
124*96c8483aSYuri Pankovfi
125*96c8483aSYuri Pankovcmd="ls -l $TMNT/$tc_id"
126*96c8483aSYuri Pankovcti_execute_cmd $cmd
127*96c8483aSYuri Pankovif [[ $? != 0 ]]; then
128*96c8483aSYuri Pankov	cti_fail "FAIL: $cmd"
129*96c8483aSYuri Pankov	smbmount_clean $TMNT
130*96c8483aSYuri Pankov	smbmount_clean $TMNT2
131*96c8483aSYuri Pankov	return
132*96c8483aSYuri Pankovfi
133*96c8483aSYuri Pankovcp cti_stdout out_save
134*96c8483aSYuri Pankov
135*96c8483aSYuri Pankov#	5. give $TUSER1 full control
136*96c8483aSYuri Pankovcmd="chmod A+user:${uid}:rwxpdDaARWcCos::allow $TMNT/$tc_id"
137*96c8483aSYuri Pankovcti_execute_cmd $cmd
138*96c8483aSYuri Pankovif [[ $? != 0 ]]; then
139*96c8483aSYuri Pankov	cti_fail "FAIL: $cmd"
140*96c8483aSYuri Pankov	smbmount_clean $TMNT
141*96c8483aSYuri Pankov	smbmount_clean $TMNT2
142*96c8483aSYuri Pankov	return
143*96c8483aSYuri Pankovfi
144*96c8483aSYuri Pankov
145*96c8483aSYuri Pankov#       6. chown UID $TMNT2/file
146*96c8483aSYuri Pankov
147*96c8483aSYuri Pankovcmd="sudo -n chown ${uid} $TMNT2/$tc_id"
148*96c8483aSYuri Pankovcti_execute_cmd $cmd
149*96c8483aSYuri Pankovif [[ $? != 0 ]]; then
150*96c8483aSYuri Pankov	cti_fail "FAIL: $cmd"
151*96c8483aSYuri Pankov	smbmount_clean $TMNT
152*96c8483aSYuri Pankov	smbmount_clean $TMNT2
153*96c8483aSYuri Pankov	return
154*96c8483aSYuri Pankovfi
155*96c8483aSYuri Pankov
156*96c8483aSYuri Pankov#	6. verify $TUSER1 owns it
157*96c8483aSYuri Pankov
158*96c8483aSYuri Pankovcmd="ls -l $TMNT2/$tc_id"
159*96c8483aSYuri Pankovcti_execute_cmd $cmd
160*96c8483aSYuri Pankovif [[ $? != 0 ]]; then
161*96c8483aSYuri Pankov	cti_fail "FAIL: $cmd"
162*96c8483aSYuri Pankov	smbmount_clean $TMNT
163*96c8483aSYuri Pankov	smbmount_clean $TMNT2
164*96c8483aSYuri Pankov	return
165*96c8483aSYuri Pankovfi
166*96c8483aSYuri Pankovcp cti_stdout out_test
167*96c8483aSYuri Pankov
168*96c8483aSYuri Pankov# The new owner should be different...
169*96c8483aSYuri Pankovcmd="diff out_save out_test"
170*96c8483aSYuri Pankovcti_execute_cmd $cmd
171*96c8483aSYuri Pankovif [[ $? == 0 ]]; then
172*96c8483aSYuri Pankov	cti_fail "FAIL: owner should have changed"
173*96c8483aSYuri Pankov	smbmount_clean $TMNT
174*96c8483aSYuri Pankov	smbmount_clean $TMNT2
175*96c8483aSYuri Pankov	return
176*96c8483aSYuri Pankovfi
177*96c8483aSYuri Pankov
178*96c8483aSYuri Pankov# The new owner should contain $uid
179*96c8483aSYuri Pankovgrep " $uid " out_test >/dev/null
180*96c8483aSYuri Pankovif [[ $? != 0 ]]; then
181*96c8483aSYuri Pankov	cti_fail "FAIL: did not find $uid"
182*96c8483aSYuri Pankov	smbmount_clean $TMNT
183*96c8483aSYuri Pankov	smbmount_clean $TMNT2
184*96c8483aSYuri Pankov	return
185*96c8483aSYuri Pankovfi
186*96c8483aSYuri Pankov
187*96c8483aSYuri Pankovcti_execute_cmd "rm $TMNT/$tc_id"
188*96c8483aSYuri Pankovsmbmount_clean $TMNT
189*96c8483aSYuri Pankovsmbmount_clean $TMNT2
190*96c8483aSYuri Pankov
191*96c8483aSYuri Pankovcti_pass "${tc_id}: PASS"
192