summaryrefslogtreecommitdiffstats
path: root/source3/modules/test_vfs_posixacl.c
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 17:20:00 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 17:20:00 +0000
commit8daa83a594a2e98f39d764422bfbdbc62c9efd44 (patch)
tree4099e8021376c7d8c05bdf8503093d80e9c7bad0 /source3/modules/test_vfs_posixacl.c
parentInitial commit. (diff)
downloadsamba-8daa83a594a2e98f39d764422bfbdbc62c9efd44.tar.xz
samba-8daa83a594a2e98f39d764422bfbdbc62c9efd44.zip
Adding upstream version 2:4.20.0+dfsg.upstream/2%4.20.0+dfsg
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'source3/modules/test_vfs_posixacl.c')
-rw-r--r--source3/modules/test_vfs_posixacl.c171
1 files changed, 171 insertions, 0 deletions
diff --git a/source3/modules/test_vfs_posixacl.c b/source3/modules/test_vfs_posixacl.c
new file mode 100644
index 0000000..19e7d98
--- /dev/null
+++ b/source3/modules/test_vfs_posixacl.c
@@ -0,0 +1,171 @@
+/*
+ * Unix SMB/CIFS implementation.
+ *
+ * Unit test for vfs_posixacl
+ *
+ * Copyright (C) Christof Schmitt 2020
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, see <http://www.gnu.org/licenses/>.
+ */
+
+#include "vfs_posixacl.c"
+#include <cmocka.h>
+
+static void smb_acl_add_entry(struct smb_acl_t * smb_acl,
+ SMB_ACL_TAG_T tag, uint32_t id,
+ bool read, bool write, bool execute)
+{
+ int ret;
+ struct smb_acl_entry *smb_acl_entry = NULL;
+ SMB_ACL_PERMSET_T smb_permset = NULL;
+
+ ret = sys_acl_create_entry(&smb_acl, &smb_acl_entry);
+ assert_int_equal(ret, 0);
+
+ ret = sys_acl_set_tag_type(smb_acl_entry, tag);
+ assert_int_equal(ret, 0);
+
+ if (tag == SMB_ACL_USER || tag == SMB_ACL_GROUP) {
+ ret = sys_acl_set_qualifier(smb_acl_entry, &id);
+ assert_int_equal(ret, 0);
+ }
+
+ ret = sys_acl_get_permset(smb_acl_entry, &smb_permset);
+ assert_int_equal(ret, 0);
+
+ if (read) {
+ ret = sys_acl_add_perm(smb_permset, SMB_ACL_READ);
+ assert_int_equal(ret, 0);
+ }
+
+ if (write) {
+ ret = sys_acl_add_perm(smb_permset, SMB_ACL_WRITE);
+ assert_int_equal(ret, 0);
+ }
+
+ if (execute) {
+ ret = sys_acl_add_perm(smb_permset, SMB_ACL_EXECUTE);
+ assert_int_equal(ret, 0);
+ }
+
+ ret = sys_acl_set_permset(smb_acl_entry, smb_permset);
+ assert_int_equal(ret, 0);
+}
+
+static void acl_check_entry(acl_entry_t acl_entry, SMB_ACL_TAG_T tag,
+ uint32_t id,
+ bool read, bool write, bool execute)
+{
+ int ret;
+ acl_permset_t acl_permset = NULL;
+ acl_tag_t acl_tag;
+
+ ret = acl_get_permset(acl_entry, &acl_permset);
+ assert_int_equal(ret, 0);
+
+ ret = acl_get_tag_type(acl_entry, &acl_tag);
+ assert_int_equal(ret, 0);
+ assert_int_equal(acl_tag, tag);
+
+ if (tag == ACL_USER || tag == ACL_GROUP) {
+ uint32_t *id_p;
+
+ id_p = acl_get_qualifier(acl_entry);
+ assert_non_null(id_p);
+ assert_int_equal(*id_p, id);
+ }
+
+#ifdef HAVE_ACL_GET_PERM_NP
+ ret = acl_get_perm_np(acl_permset, ACL_READ);
+#else
+ ret = acl_get_perm(acl_permset, ACL_READ);
+#endif
+ assert_int_equal(ret, read ? 1 : 0);
+
+#ifdef HAVE_ACL_GET_PERM_NP
+ ret = acl_get_perm_np(acl_permset, ACL_WRITE);
+#else
+ ret = acl_get_perm(acl_permset, ACL_WRITE);
+#endif
+ assert_int_equal(ret, write ? 1 : 0);
+
+#ifdef HAVE_ACL_GET_PERM_NP
+ ret = acl_get_perm_np(acl_permset, ACL_EXECUTE);
+#else
+ ret = acl_get_perm(acl_permset, ACL_EXECUTE);
+#endif
+ assert_int_equal(ret, execute ? 1 : 0);
+}
+
+static void test_smb_acl_to_posix_simple_acl(void **state)
+{
+ TALLOC_CTX *mem_ctx = talloc_stackframe();
+ struct smb_acl_t *smb_acl = NULL;
+ acl_t acl = NULL;
+ acl_entry_t acl_entry = NULL;
+ int ret;
+
+ smb_acl = sys_acl_init(mem_ctx);
+ assert_non_null(smb_acl);
+
+ smb_acl_add_entry(smb_acl, SMB_ACL_USER_OBJ, 0, false, true, false);
+ smb_acl_add_entry(smb_acl, SMB_ACL_GROUP_OBJ, 0, true, false, false);
+ smb_acl_add_entry(smb_acl, SMB_ACL_OTHER, 0, false, false, true);
+
+ acl = smb_acl_to_posix(smb_acl);
+ assert_non_null(acl);
+
+ ret = acl_get_entry(acl, ACL_FIRST_ENTRY, &acl_entry);
+ assert_int_equal(ret, 1);
+ acl_check_entry(acl_entry, ACL_USER_OBJ, 0, false, true, false);
+
+ ret = acl_get_entry(acl, ACL_NEXT_ENTRY, &acl_entry);
+ assert_int_equal(ret, 1);
+ acl_check_entry(acl_entry, ACL_GROUP_OBJ, 0, true, false, false);
+
+ ret = acl_get_entry(acl, ACL_NEXT_ENTRY, &acl_entry);
+ assert_int_equal(ret, 1);
+ acl_check_entry(acl_entry, ACL_OTHER, 0, false, false, true);
+
+ ret = acl_get_entry(acl, ACL_NEXT_ENTRY, &acl_entry);
+ assert_int_equal(ret, 0);
+
+ ret = acl_free(acl);
+ assert_int_equal(ret, 0);
+
+ TALLOC_FREE(mem_ctx);
+}
+
+int main(int argc, char **argv)
+{
+ const struct CMUnitTest tests[] = {
+ cmocka_unit_test(test_smb_acl_to_posix_simple_acl),
+ };
+
+ cmocka_set_message_output(CM_OUTPUT_SUBUNIT);
+
+ if (argc != 2) {
+ print_error("Usage: %s smb.conf\n", argv[0]);
+ exit(1);
+ }
+
+ /*
+ * Initialize enough of the Samba internals to have the
+ * mappings tests work.
+ */
+ talloc_stackframe();
+ lp_load_global(argv[1]);
+
+ return cmocka_run_group_tests(tests, NULL, NULL);
+}