r22286: Import branch that converted the Samba4 test target code to perl and makes...
authorJelmer Vernooij <jelmer@samba.org>
Tue, 17 Apr 2007 00:30:01 +0000 (00:30 +0000)
committerGerald (Jerry) Carter <jerry@samba.org>
Wed, 10 Oct 2007 19:50:56 +0000 (14:50 -0500)
(This used to be commit e3ba5ced0440e736f0f140e12a8c728f79a20bb2)

source4/script/tests/Samba4.pm
source4/script/tests/mk-fedora-ds.sh [deleted file]
source4/script/tests/mk-keyblobs.sh
source4/script/tests/mk-openldap.sh [deleted file]
source4/script/tests/mksamba4server.sh [deleted file]
source4/script/tests/mktestdc.sh.share_ldb [deleted file]
source4/script/tests/selftest.pl
source4/script/tests/test_samba4.pl [new file with mode: 0755]
source4/torture/local/torture.c
source4/torture/util.c

index cabc952fc313e4d556e74eaa5fba3c92b3415e7e..6ea37a4b92efcb916cef07b67231beae0180b07f 100644 (file)
@@ -11,7 +11,12 @@ use POSIX;
 
 sub new($$$$) {
        my ($classname, $bindir, $ldap, $setupdir) = @_;
-       my $self = { vars => {}, ldap => $ldap, bindir => $bindir, setupdir => $setupdir };
+       my $self = { 
+               vars => {}, 
+               ldap => $ldap, 
+               bindir => $bindir, 
+               setupdir => $setupdir 
+       };
        bless $self;
        return $self;
 }
@@ -21,17 +26,16 @@ sub slapd_start($$)
        my $count = 0;
        my ($self, $env_vars) = @_;
 
-       my $conf = $env_vars->{SLAPD_CONF};
        my $uri = $env_vars->{LDAP_URI};
 
        # running slapd in the background means it stays in the same process group, so it can be
        # killed by timelimit
-       if (defined($ENV{FEDORA_DS_PREFIX})) {
-               system("$ENV{FEDORA_DS_PREFIX}/sbin/ns-slapd -D $env_vars->{FEDORA_DS_DIR} -d$env_vars->{FEDORA_DS_LOGLEVEL} -i $env_vars->{FEDORA_DS_PIDFILE}> $env_vars->{LDAPDIR}/logs 2>&1 &");
-       } else {
+       if ($self->{ldap} eq "fedora") {
+               system("$ENV{FEDORA_DS_PREFIX}/sbin/ns-slapd -D $env_vars->{FEDORA_DS_DIR} -d0 -i $env_vars->{FEDORA_DS_PIDFILE}> $env_vars->{LDAPDIR}/logs 2>&1 &");
+       } elsif ($self->{ldap} eq "openldap") {
                my $oldpath = $ENV{PATH};
                $ENV{PATH} = "/usr/local/sbin:/usr/sbin:/sbin:$ENV{PATH}";
-               system("slapd -d$env_vars->{OPENLDAP_LOGLEVEL} -f $conf -h $uri > $env_vars->{LDAPDIR}/logs 2>&1 &");
+               system("slapd -d0 -f $env_vars->{SLAPD_CONF} -h $uri > $env_vars->{LDAPDIR}/logs 2>&1 &");
                $ENV{PATH} = $oldpath;
        }
        while (system("$self->{bindir}/ldbsearch -H $uri -s base -b \"\" supportedLDAPVersion > /dev/null") != 0) {
@@ -48,9 +52,9 @@ sub slapd_start($$)
 sub slapd_stop($$)
 {
        my ($self, $envvars) = @_;
-       if (defined($ENV{FEDORA_DS_PREFIX})) {
+       if ($self->{ldap} eq "fedora") {
                system("$envvars->{LDAPDIR}/slapd-samba4/stop-slapd");
-       } else {
+       } elsif ($self->{ldap} eq "openldap") {
                open(IN, "<$envvars->{OPENLDAP_PIDFILE}") or 
                        die("unable to open slapd pid file: $envvars->{OPENLDAP_PIDFILE}");
                kill 9, <IN>;
@@ -64,7 +68,7 @@ sub check_or_start($$$)
        return 0 if ( -p $env_vars->{SMBD_TEST_FIFO});
 
        # Start slapd before smbd
-       if ($self->{ldap}) {
+       if (defined($self->{ldap})) {
                $self->slapd_start($env_vars) or 
                        die("couldn't start slapd");
 
@@ -93,7 +97,7 @@ sub check_or_start($$$)
                if (defined($max_time)) {
                        $optarg = "--maximum-runtime=$max_time ";
                }
-               my $ret = system("$valgrind $self->{bindir}/smbd $optarg -s $env_vars->{CONFFILE} -M single -i --leak-report-full");
+               my $ret = system("$valgrind $self->{bindir}/smbd $optarg $env_vars->{CONFIGURATION} -M single -i --leak-report-full");
                if ($? == -1) {
                        print "Unable to start smbd: $ret: $!\n";
                        exit 1;
@@ -135,48 +139,488 @@ sub wait_for_start($$)
        system("bin/nmblookup $testenv_vars->{CONFIGURATION} -U $testenv_vars->{SERVER} $testenv_vars->{NETBIOSNAME}");
 }
 
+sub write_ldb_file($$$)
+{
+       my ($self, $file, $ldif) = @_;
+
+       open(LDIF, "|$self->{bindir}/ldbadd -H $file >/dev/null");
+       print LDIF $ldif;
+       return close(LDIF);
+}
+
+sub add_wins_config($$)
+{
+       my ($self, $privatedir) = @_;
+
+       return $self->write_ldb_file("$privatedir/wins_config.ldb", "
+dn: name=TORTURE_6,CN=PARTNERS
+objectClass: wreplPartner
+name: TORTURE_6
+address: 127.0.0.6
+pullInterval: 0
+pushChangeCount: 0
+type: 0x3
+");
+}
+
+sub mk_fedora($$$$$$)
+{
+       my ($self, $ldapdir, $basedn, $root, $password, $privatedir, $configuration) = @_;
+
+       my $fedora_ds_inf = "$ldapdir/fedorads.inf";
+       my $fedora_ds_initial_ldif = "$ldapdir/fedorads-initial.ldif";
+
+       #Make the subdirectory be as fedora DS would expect
+       my $fedora_ds_dir = "$ldapdir/slapd-samba4";
+
+       my $pidfile = "$fedora_ds_dir/logs/slapd-samba4.pid";
+
+       open(CONF, ">$fedora_ds_inf");
+       print CONF "
+[General]
+SuiteSpotUserID = $root
+fullMachineName=   localhost
+ServerRoot=   $ldapdir
+
+[slapd]
+ldapifilepath=$ldapdir/ldapi
+Suffix= $basedn
+rootDN= cn=Manager,$basedn
+rootDNPwd= $password
+serverIdentifier= samba4
+InstallLdifFile=$fedora_ds_initial_ldif
+
+inst_dir= $fedora_ds_dir
+config_dir= $fedora_ds_dir
+schema_dir= $fedora_ds_dir/schema
+lock_dir= $fedora_ds_dir/lock
+log_dir= $fedora_ds_dir/logs
+run_dir= $fedora_ds_dir/logs
+db_dir= $fedora_ds_dir/db
+bak_dir= $fedora_ds_dir/bak
+tmp_dir= $fedora_ds_dir/tmp
+ldif_dir= $fedora_ds_dir/ldif
+cert_dir= $fedora_ds_dir
+
+start_server= 0
+";
+       close(CONF);
+
+       open(CONF, ">$fedora_ds_initial_ldif");
+       print "
+# These entries need to be added to get the container for the 
+# provision to be aimed at.
+
+dn: cn=\"dc=$basedn\",cn=mapping tree,cn=config
+objectclass: top
+objectclass: extensibleObject
+objectclass: nsMappingTree
+nsslapd-state: backend
+nsslapd-backend: userData
+cn: $basedn
+
+dn: cn=userData,cn=ldbm database,cn=plugins,cn=config
+objectclass: extensibleObject
+objectclass: nsBackendInstance
+nsslapd-suffix: $basedn
+";
+       close(CONF);
+
+       system("perl $ENV{FEDORA_DS_PREFIX}/bin/ds_newinst.pl $fedora_ds_inf >&2") == 0 or return 0;
+
+       foreach(<$fedora_ds_dir/schema/*>) {
+               unlink unless (/00core.*/);
+       }
+
+       open(LDIF, ">$fedora_ds_dir/dse.ldif");
+       print LDIF "
+dn: cn=bitwise,cn=plugins,cn=config
+objectClass: top
+objectClass: nsSlapdPlugin
+objectClass: extensibleObject
+cn: bitwise
+nsslapd-pluginPath: $ENV{FEDORA_DS_PREFIX}/lib/fedora-ds/plugins/libbitwise-plugin.so
+nsslapd-pluginInitfunc: bitwise_init
+nsslapd-pluginType: matchingRule
+nsslapd-pluginEnabled: on
+nsslapd-pluginId: bitwise
+nsslapd-pluginVersion: 1.1.0a3
+nsslapd-pluginVendor: Fedora Project
+nsslapd-pluginDescription: Allow bitwise matching rules
+";
+       close(CONF);
+
+       system("$self->{bindir}/ad2oLschema $configuration -H $privatedir/sam.ldb --option=convert:target=fedora-ds -I $self->{setupdir}/schema-map-fedora-ds-1.0 -O $fedora_ds_dir/schema/99_ad.ldif >&2");
+
+       return ($fedora_ds_dir, $pidfile);
+}
+
+sub mk_openldap($$$$$$$$)
+{
+       my ($self, $ldapdir, $basedn, $password, $privatedir, $dnsname, $configuration, $provision_options) = @_;
+
+       my $slapd_conf = "$ldapdir/slapd.conf";
+       my $pidfile = "$ldapdir/slapd.pid";
+       my $modconf = "$ldapdir/modules.conf";
+
+       mkdir($_) foreach ($ldapdir, "$ldapdir/db", "$ldapdir/db/bdb-logs", 
+               "$ldapdir/db/tmp");
+
+       open(CONF, ">$slapd_conf");
+       print CONF "
+loglevel 0
+
+include $ldapdir/ad.schema
+
+pidfile                $pidfile
+argsfile       $ldapdir/slapd.args
+sasl-realm $dnsname
+access to * by * write
+
+allow update_anon
+
+authz-regexp
+          uid=([^,]*),cn=$dnsname,cn=digest-md5,cn=auth
+          ldap:///$basedn??sub?(samAccountName=\$1)
+
+authz-regexp
+          uid=([^,]*),cn=([^,]*),cn=digest-md5,cn=auth
+          ldap:///$basedn??sub?(samAccountName=\$1)
+
+include $modconf
+
+defaultsearchbase \"$basedn\"
+
+backend                bdb
+database        bdb
+suffix         \"$basedn\"
+rootdn          \"cn=Manager,$basedn\"
+rootpw          $password
+directory      $ldapdir/db
+index           objectClass eq
+index           samAccountName eq
+index name eq
+index objectSid eq
+index objectCategory eq
+index member eq
+index uidNumber eq
+index gidNumber eq
+index unixName eq
+index privilege eq
+index nCName eq pres
+index lDAPDisplayName eq
+index subClassOf eq
+index dnsRoot eq
+index nETBIOSName eq pres
+
+#syncprov is stable in OpenLDAP 2.3, and available in 2.2.  
+#We only need this for the contextCSN attribute anyway....
+overlay syncprov
+syncprov-checkpoint 100 10
+syncprov-sessionlog 100
+";
+
+       close(CONF);
+
+       open(CONF, ">$ldapdir/db/DB_CONFIG");
+       print CONF "
+#
+       # Set the database in memory cache size.
+       #
+       set_cachesize   0       524288        0
+       
+       
+       #
+       # Set database flags (this is a test environment, we don't need to fsync()).
+       #               
+       set_flags       DB_TXN_NOSYNC
+       
+       #
+       # Set log values.
+       #
+       set_lg_regionmax        104857
+       set_lg_max              1048576
+       set_lg_bsize            209715
+       set_lg_dir              $ldapdir/db/bdb-logs
+       
+       
+       #
+       # Set temporary file creation directory.
+       #                       
+       set_tmp_dir             $ldapdir/db/tmp
+       ";
+       close(CONF);
+
+       #This uses the provision we just did, to read out the schema
+       system("$self->{bindir}/ad2oLschema $configuration -H $privatedir/sam.ldb -I $self->{setupdir}/schema-map-openldap-2.3 -O $ldapdir/ad.schema >&2");
+
+       #Now create an LDAP baseDN
+       system("$self->{bindir}/smbscript $self->{setupdir}/provision $provision_options --ldap-base >&2");
+
+       my $oldpath = $ENV{PATH};
+       $ENV{PATH} = "/usr/local/sbin:/usr/sbin:/sbin:$ENV{PATH}";
+
+       unlink($modconf);
+       open(CONF, ">$modconf"); close(CONF);
+
+       if (system("slaptest -u -f $slapd_conf >&2") != 0) {
+               open(CONF, ">$modconf"); 
+               # enable slapd modules
+               print CONF "
+modulepath     /usr/lib/ldap
+moduleload     back_bdb
+moduleload     syncprov
+";
+               close(CONF);
+       }
+
+       system("slaptest -u -f $slapd_conf") == 0 or die("slaptest still fails after adding modules");
+       system("slapadd -f $slapd_conf < $privatedir/$dnsname.ldif >/dev/null") == 0 or die("slapadd failed");
+
+    system("slaptest -f $slapd_conf >/dev/null") == 0 or 
+               die ("slaptest after database load failed");
+    
+       $ENV{PATH} = $oldpath;
+
+       return ($slapd_conf, $pidfile);
+}
+
+sub provision($$$$$)
+{
+       my ($self, $prefix, $server_role, $domain, $netbiosname) = @_;
+
+       my $smbd_loglevel = 1;
+       my $username = "administrator";
+       my $realm = "SAMBA.EXAMPLE.COM";
+       my $dnsname = "samba.example.com";
+       my $basedn = "dc=samba,dc=example,dc=com";
+       my $password = "penguin";
+       my $root = ($ENV{USER} or $ENV{LOGNAME} or `whoami`);
+       my $server = "localhost";
+       my $srcdir="$RealBin/../..";
+       -d $prefix or mkdir($prefix) or die("Unable to create $prefix");
+       my $prefix_abs = getcwd()."/".$prefix;
+
+       my $tmpdir = "$prefix_abs/tmp";
+       my $etcdir = "$prefix_abs/etc";
+       my $piddir = "$prefix_abs/pid";
+       my $conffile = "$etcdir/smb.conf";
+       my $krb5_config = "$etcdir/krb5.conf";
+       my $privatedir = "$prefix_abs/private";
+       my $ncalrpcdir = "$prefix_abs/ncalrpc";
+       my $lockdir= "$prefix_abs/lockdir";
+
+       my $winbindd_socket_dir = "$prefix_abs/winbind_socket";
+       my $configuration = "--configfile=$conffile";
+       my $ldapdir = "$prefix_abs/ldap";
+
+       my $tlsdir = "$privatedir/tls";
+
+       (system("rm -rf $prefix/*") == 0) or die("Unable to clean up");
+       mkdir($_) foreach ($privatedir, $etcdir, $piddir, $ncalrpcdir, $lockdir, 
+               $tmpdir);
+
+       open(CONFFILE, ">$conffile");
+       print CONFFILE "
+[global]
+       netbios name = $netbiosname
+       netbios aliases = $server
+       workgroup = $domain
+       realm = $realm
+       private dir = $privatedir
+       pid directory = $piddir
+       ncalrpc dir = $ncalrpcdir
+       lock dir = $lockdir
+       setup directory = $self->{setupdir}
+       js include = $srcdir/scripting/libjs
+       winbindd socket directory = $winbindd_socket_dir
+       name resolve order = bcast
+       interfaces = 127.0.0.1/8
+       tls dh params file = $tlsdir/dhparms.pem
+       panic action = $srcdir/script/gdb_backtrace \%PID% \%PROG%
+       wins support = yes
+       server role = $server_role
+       max xmit = 32K
+       server max protocol = SMB2
+       notify:inotify = false
+       ldb:nosync = true
+       system:anonymous = true
+#We don't want to pass our self-tests if the PAC code is wrong
+       gensec:require_pac = true
+       log level = $smbd_loglevel
+
+[tmp]
+       path = $tmpdir
+       read only = no
+       ntvfs handler = posix
+       posix:sharedelay = 100000
+       posix:eadb = $lockdir/eadb.tdb
+
+[cifs]
+       read only = no
+       ntvfs handler = cifs
+       cifs:server = $server
+       cifs:user = $username
+       cifs:password = $password
+       cifs:domain = $domain
+       cifs:share = tmp
+
+[simple]
+       path = $tmpdir
+       read only = no
+       ntvfs handler = simple
+
+[cifsposixtestshare]
+       copy = simple
+       ntvfs handler = cifsposix   
+";
+       close(CONFFILE);
+
+       die ("Unable to create key blobs") if
+               (system("TLSDIR=$tlsdir $RealBin/mk-keyblobs.sh") != 0);
+
+       open(KRB5CONF, ">$krb5_config");
+       print KRB5CONF "
+#Generated krb5.conf for $realm
+
+[libdefaults]
+ default_realm = $realm
+ dns_lookup_realm = false
+ dns_lookup_kdc = false
+ ticket_lifetime = 24h
+ forwardable = yes
+
+[realms]
+ $realm = {
+  kdc = 127.0.0.1:88
+  admin_server = 127.0.0.1:88
+  default_domain = $dnsname
+ }
+ $dnsname = {
+  kdc = 127.0.0.1:88
+  admin_server = 127.0.0.1:88
+  default_domain = $dnsname
+ }
+ $domain = {
+  kdc = 127.0.0.1:88
+  admin_server = 127.0.0.1:88
+  default_domain = $dnsname
+ }
+
+[appdefaults]
+       pkinit_anchors = FILE:$tlsdir/ca.pem
+
+[kdc]
+       enable-pkinit = true
+       pkinit_identity = FILE:$tlsdir/kdc.pem,$tlsdir/key.pem
+       pkinit_anchors = FILE:$tlsdir/ca.pem
+
+[domain_realm]
+ .$dnsname = $realm
+";
+       close(KRB5CONF);
+
+#Ensure the config file is valid before we start
+       if (system("$self->{bindir}/testparm $configuration -v --suppress-prompt >/dev/null 2>&1") != 0) {
+               system("$self->{bindir}/testparm $configuration >&2");
+               die("Failed to create configuration!");
+       }
+
+       (system("($self->{bindir}/testparm $configuration -v --suppress-prompt --parameter-name=\"netbios name\" --section-name=global 2> /dev/null | grep -i ^$netbiosname ) >/dev/null 2>&1") == 0) or die("Failed to create configuration!");
+
+       my @provision_options = ($configuration);
+       push (@provision_options, "--host-name=$netbiosname");
+       push (@provision_options, "--host-ip=127.0.0.1");
+       push (@provision_options, "--quiet");
+       push (@provision_options, "--domain $domain");
+       push (@provision_options, "--realm $realm");
+       push (@provision_options, "--adminpass $password");
+       push (@provision_options, "--root=$root");
+       push (@provision_options, "--simple-bind-dn=cn=Manager,$basedn");
+       push (@provision_options, "--password=$password");
+       push (@provision_options, "--root=$root");
+
+       (system("$self->{bindir}/smbscript $self->{setupdir}/provision " .  join(' ', @provision_options) . ">&2") == 0) or die("Unable to provision");
+
+       my $ldap_uri= "$ldapdir/ldapi";
+       $ldap_uri =~ s|/|%2F|g;
+       $ldap_uri = "ldapi://$ldap_uri";
+
+       my $ret = {
+               KRB5_CONFIG => $krb5_config,
+               PIDDIR => $piddir,
+               SERVER => $server,
+               NETBIOSNAME => $netbiosname,
+               LDAP_URI => $ldap_uri,
+               DOMAIN => $domain,
+               USERNAME => $username,
+               REALM => $realm,
+               PASSWORD => $password,
+               LDAPDIR => $ldapdir,
+               WINBINDD_SOCKET_DIR => $winbindd_socket_dir,
+               NCALRPCDIR => $ncalrpcdir,
+               CONFIGURATION => $configuration
+       };
+
+       if (not defined($self->{ldap})) {
+       } elsif ($self->{ldap} eq "openldap") {
+               ($ret->{SLAPD_CONF}, $ret->{OPENLDAP_PIDFILE}) = $self->mk_openldap($ldapdir, $basedn, $password, $privatedir, $dnsname, $configuration, join(' ', @provision_options)) or die("Unable to create openldap directories");
+       } elsif ($self->{ldap} eq "fedora") {
+               ($ret->{FEDORA_DS_DIR}, $ret->{FEDORA_DS_PIDFILE}) = $self->mk_fedora($ldapdir, $basedn, $root, $password, $privatedir, $configuration) or die("Unable to create fedora ds directories");
+               push (@provision_options, "--ldap-module=nsuniqueid");
+       }
+
+       $ret->{PROVISION_OPTIONS} = join(' ', @provision_options);
+
+       return $ret; 
+}
+
 sub provision_member($$$)
 {
        my ($self, $prefix, $dcvars) = @_;
-       my %ret = ();
-       print "PROVISIONING...";
-       open(IN, "SERVER_ROLE=\"member server\" $RealBin/mksamba4server.sh $prefix|") or die("Unable to setup");
-       while (<IN>) {
-               die ("Error parsing `$_'") unless (/^([A-Z0-9a-z_]+)=(.*)$/);
-               $ret{$1} = $2;
-       }
-       close(IN);
+       print "PROVISIONING MEMBER...";
+
+       my $ret = $self->provision($prefix, "member server", "SAMBADOMAIN", 
+               "localmember");
 
-       system("$self->{bindir}/net join $ret{CONFIGURATION} $dcvars->{DOMAIN} member -U$dcvars->{USERNAME}\%$dcvars->{PASSWORD}") or die("Join failed");
+       $ret or die("Unable to provision");
 
-       $ret{SMBD_TEST_FIFO} = "$prefix/smbd_test.fifo";
-       $ret{SMBD_TEST_LOG} = "$prefix/smbd_test.log";
-       print "$ret{DOMAIN}\n";
-       return \%ret;
+       system("$self->{bindir}/net join $ret->{CONFIGURATION} $dcvars->{DOMAIN} member -U$dcvars->{USERNAME}\%$dcvars->{PASSWORD}") == 0 or die("Join failed");
+
+       $ret->{SMBD_TEST_FIFO} = "$prefix/smbd_test.fifo";
+       $ret->{SMBD_TEST_LOG} = "$prefix/smbd_test.log";
+       return $ret;
 }
 
 sub provision_dc($$)
 {
        my ($self, $prefix) = @_;
-       my %ret = ();
-       print "PROVISIONING...";
-       open(IN, "$RealBin/mksamba4server.sh $prefix|") or die("Unable to setup");
-       while (<IN>) {
-               die ("Error parsing `$_'") unless (/^([A-Z0-9a-z_]+)=(.*)$/);
-               $ret{$1} = $2;
-       }
-       close(IN);
 
-       $ret{SMBD_TEST_FIFO} = "$prefix/smbd_test.fifo";
-       $ret{SMBD_TEST_LOG} = "$prefix/smbd_test.log";
-       return \%ret;
+       print "PROVISIONING DC...";
+       my $ret = $self->provision($prefix, "domain controller", "SAMBADOMAIN", 
+               "localtest");
+
+       $self->add_wins_config("$prefix/private") or 
+               die("Unable to add wins configuration");
+
+       $ret->{SMBD_TEST_FIFO} = "$prefix/smbd_test.fifo";
+       $ret->{SMBD_TEST_LOG} = "$prefix/smbd_test.log";
+       return $ret;
 }
 
 sub provision_ldap($$)
 {
        my ($self, $envvars) = @_;
-       system("$self->{bindir}/smbscript $self->{setupdir}/provision $envvars->{PROVISION_OPTIONS} \"$envvars->{PROVISION_ACI}\" --ldap-backend=$envvars->{LDAP_URI}") and
-               die("LDAP PROVISIONING failed: $self->{bindir}/smbscript $self->{setupdir}/provision $envvars->{PROVISION_OPTIONS} \"$envvars->{PROVISION_ACI}\" --ldap-backend=$envvars->{LDAP_URI}");
+       my $provision_aci = "";
+       
+       if ($self->{ldap} eq "fedora") {
+               #it is easier to base64 encode this than correctly escape it:
+               # (targetattr = "*") (version 3.0;acl "full access to all by all";allow (all)(userdn = "ldap:///anyone");)
+               $provision_aci = "--aci=aci:: KHRhcmdldGF0dHIgPSAiKiIpICh2ZXJzaW9uIDMuMDthY2wgImZ1bGwgYWNjZXNzIHRvIGFsbCBieSBhbGwiO2FsbG93IChhbGwpKHVzZXJkbiA9ICJsZGFwOi8vL2FueW9uZSIpOykK";
+       }
+
+       system("$self->{bindir}/smbscript $self->{setupdir}/provision $envvars->{PROVISION_OPTIONS} \"$provision_aci\" --ldap-backend=$envvars->{LDAP_URI}") and
+               die("LDAP PROVISIONING failed: $self->{bindir}/smbscript $self->{setupdir}/provision $envvars->{PROVISION_OPTIONS} \"$provision_aci\" --ldap-backend=$envvars->{LDAP_URI}");
 }
 
 sub teardown_env($$)
diff --git a/source4/script/tests/mk-fedora-ds.sh b/source4/script/tests/mk-fedora-ds.sh
deleted file mode 100755 (executable)
index bc19eff..0000000
+++ /dev/null
@@ -1,91 +0,0 @@
-FEDORA_DS_INF=$LDAPDIR/fedorads.inf
-FEDORA_DS_INITIAL_LDIF=$LDAPDIR/fedorads-initial.ldif
-
-echo "FEDORA_DS_LOGLEVEL=0"
-
-#Make the subdirectory be as fedora DS would expect
-FEDORA_DS_DIR=$LDAPDIR/slapd-samba4
-echo FEDORA_DS_DIR=$FEDORA_DS_DIR
-
-echo "FEDORA_DS_PIDFILE=$FEDORA_DS_DIR/logs/slapd-samba4.pid"
-
-cat >$FEDORA_DS_INF <<EOF
-[General]
-SuiteSpotUserID = $ROOT
-FullMachineName=   localhost
-ServerRoot=   $LDAPDIR
-
-[slapd]
-ldapifilepath=$LDAPDIR/ldapi
-Suffix= $BASEDN
-RootDN= cn=Manager,$BASEDN
-RootDNPwd= $PASSWORD
-ServerIdentifier= samba4
-InstallLdifFile=$FEDORA_DS_INITIAL_LDIF
-
-inst_dir= $FEDORA_DS_DIR
-config_dir= $FEDORA_DS_DIR
-schema_dir= $FEDORA_DS_DIR/schema
-lock_dir= $FEDORA_DS_DIR/lock
-log_dir= $FEDORA_DS_DIR/logs
-run_dir= $FEDORA_DS_DIR/logs
-db_dir= $FEDORA_DS_DIR/db
-bak_dir= $FEDORA_DS_DIR/bak
-tmp_dir= $FEDORA_DS_DIR/tmp
-ldif_dir= $FEDORA_DS_DIR/ldif
-cert_dir= $FEDORA_DS_DIR
-
-start_server= 0
-
-EOF
-
-cat >$FEDORA_DS_INITIAL_LDIF<<EOF
-# These entries need to be added to get the container for the 
-# provision to be aimed at.
-
-dn: cn="dc=$BASEDN",cn=mapping tree,cn=config
-objectclass: top
-objectclass: extensibleObject
-objectclass: nsMappingTree
-nsslapd-state: backend
-nsslapd-backend: userData
-cn: $BASEDN
-
-dn: cn=userData,cn=ldbm database,cn=plugins,cn=config
-objectclass: extensibleObject
-objectclass: nsBackendInstance
-nsslapd-suffix: $BASEDN
-
-EOF
-
-perl $FEDORA_DS_PREFIX/bin/ds_newinst.pl $FEDORA_DS_INF >&2 || exit 1;
-
-( 
-     cd $FEDORA_DS_DIR/schema
-     ls | grep -v ^00core | xargs rm
-)
-
-cat >>$FEDORA_DS_DIR/dse.ldif<<EOF
-dn: cn=bitwise,cn=plugins,cn=config
-objectClass: top
-objectClass: nsSlapdPlugin
-objectClass: extensibleObject
-cn: bitwise
-nsslapd-pluginPath: $FEDORA_DS_PREFIX/lib/fedora-ds/plugins/libbitwise-plugin.so
-nsslapd-pluginInitfunc: bitwise_init
-nsslapd-pluginType: matchingRule
-nsslapd-pluginEnabled: on
-nsslapd-pluginId: bitwise
-nsslapd-pluginVersion: 1.1.0a3
-nsslapd-pluginVendor: Fedora Project
-nsslapd-pluginDescription: Allow bitwise matching rules
-
-EOF
-
-$srcdir/bin/ad2oLschema $CONFIGURATION -H $PRIVATEDIR/sam.ldb --option=convert:target=fedora-ds -I $srcdir/setup/schema-map-fedora-ds-1.0 -O $FEDORA_DS_DIR/schema/99_ad.ldif >&2
-
-PROVISION_OPTIONS="$PROVISION_OPTIONS --ldap-module=nsuniqueid"
-#it is easier to base64 encode this than correctly escape it:
-# (targetattr = "*") (version 3.0;acl "full access to all by all";allow (all)(userdn = "ldap:///anyone");)
-PROVISION_ACI="--aci=aci:: KHRhcmdldGF0dHIgPSAiKiIpICh2ZXJzaW9uIDMuMDthY2wgImZ1bGwgYWNjZXNzIHRvIGFsbCBieSBhbGwiO2FsbG93IChhbGwpKHVzZXJkbiA9ICJsZGFwOi8vL2FueW9uZSIpOykK"
-
index d05f804faec4d9ce1ec20e0b9c1d8b9251f328d5..7792e0a6d5e9cc9ef4e3c9bfef68db3bb883a32e 100755 (executable)
@@ -1,5 +1,4 @@
 #TLS and PKINIT crypto blobs
-TLSDIR=$PRIVATEDIR/tls
 DHFILE=$TLSDIR/dhparms.pem
 CAFILE=$TLSDIR/ca.pem
 CERTFILE=$TLSDIR/cert.pem
diff --git a/source4/script/tests/mk-openldap.sh b/source4/script/tests/mk-openldap.sh
deleted file mode 100755 (executable)
index 1eb8b66..0000000
+++ /dev/null
@@ -1,124 +0,0 @@
-SLAPD_CONF=$LDAPDIR/slapd.conf
-export SLAPD_CONF
-
-echo "OPENLDAP_LOGLEVEL=0"
-OPENLDAP_PIDFILE=$PIDDIR/slapd.pid
-echo "OPENLDAP_PIDFILE=$OPENLDAP_PIDFILE"
-
-cat >$SLAPD_CONF <<EOF
-loglevel 0
-
-include $LDAPDIR/ad.schema
-
-pidfile                $OPENLDAP_PIDFILE
-argsfile       $LDAPDIR/slapd.args
-sasl-realm $DNSNAME
-access to * by * write
-
-allow update_anon
-
-authz-regexp
-          uid=([^,]*),cn=$DNSNAME,cn=digest-md5,cn=auth
-          ldap:///$BASEDN??sub?(samAccountName=\$1)
-
-authz-regexp
-          uid=([^,]*),cn=([^,]*),cn=digest-md5,cn=auth
-          ldap:///$BASEDN??sub?(samAccountName=\$1)
-
-include $LDAPDIR/modules.conf
-
-defaultsearchbase "$BASEDN"
-
-backend                bdb
-database        bdb
-suffix         "$BASEDN"
-rootdn          "cn=Manager,$BASEDN"
-rootpw          $PASSWORD
-directory      $LDAPDIR/db
-index           objectClass eq
-index           samAccountName eq
-index name eq
-index objectSid eq
-index objectCategory eq
-index member eq
-index uidNumber eq
-index gidNumber eq
-index unixName eq
-index privilege eq
-index nCName eq pres
-index lDAPDisplayName eq
-index subClassOf eq
-index dnsRoot eq
-index nETBIOSName eq pres
-
-#syncprov is stable in OpenLDAP 2.3, and available in 2.2.  
-#We only need this for the contextCSN attribute anyway....
-overlay syncprov
-syncprov-checkpoint 100 10
-syncprov-sessionlog 100
-
-EOF
-
-cat > $LDAPDIR/db/DB_CONFIG <<EOF
-#
-       # Set the database in memory cache size.
-       #
-       set_cachesize   0       524288        0
-       
-       
-       #
-       # Set database flags (this is a test environment, we don't need to fsync()).
-       #               
-       set_flags       DB_TXN_NOSYNC
-       
-       #
-       # Set log values.
-       #
-       set_lg_regionmax        104857
-       set_lg_max              1048576
-       set_lg_bsize            209715
-       set_lg_dir              $LDAPDIR/db/bdb-logs
-       
-       
-       #
-       # Set temporary file creation directory.
-       #                       
-       set_tmp_dir             $LDAPDIR/db/tmp
-EOF
-
-#This uses the provision we just did, to read out the schema
-$srcdir/bin/ad2oLschema $CONFIGURATION -H $PRIVATEDIR/sam.ldb -I $srcdir/setup/schema-map-openldap-2.3 -O $LDAPDIR/ad.schema >&2
-
-#Now create an LDAP baseDN
-$srcdir/bin/smbscript $srcdir/setup/provision $PROVISION_OPTIONS --ldap-base >&2
-
-OLDPATH=$PATH
-PATH=/usr/local/sbin:/usr/sbin:/sbin:$PATH
-export PATH
-
-MODCONF=$LDAPDIR/modules.conf
-rm -f $MODCONF
-touch $MODCONF
-
-slaptest -u -f $SLAPD_CONF >&2 || {
-    # echo "enabling slapd modules" >&2
-    cat > $MODCONF <<EOF 
-modulepath     /usr/lib/ldap
-moduleload     back_bdb
-moduleload     syncprov
-EOF
-}
-
-if slaptest -u -f $SLAPD_CONF; then
-    slapadd -f $SLAPD_CONF < $PRIVATEDIR/$DNSNAME.ldif >/dev/null || {
-       echo "slapadd failed" >&2
-    }
-
-    slaptest -f $SLAPD_CONF >/dev/null || {
-       echo "slaptest after database load failed" >&2
-    }
-fi
-    
-PATH=$OLDPATH
-export PATH
-
diff --git a/source4/script/tests/mksamba4server.sh b/source4/script/tests/mksamba4server.sh
deleted file mode 100755 (executable)
index f59d8c2..0000000
+++ /dev/null
@@ -1,301 +0,0 @@
-#!/bin/sh
-# Build a test environment for running Samba
-
-if [ $# -lt 1 ]
-then
-       echo "$0 PREFIX"
-       exit 1
-fi
-
-PREFIX=$1
-
-if test -z "$SHARE_BACKEND"; then
-       SHARE_BACKEND=classic
-fi
-
-if test -z "$SMBD_LOGLEVEL"; then
-       SMBD_LOGLEVEL=1
-fi
-
-if test -z "$SERVER_ROLE"; then
-       SERVER_ROLE="domain controller"
-fi
-
-DOMAIN=SAMBADOMAIN
-USERNAME=administrator
-REALM=SAMBA.EXAMPLE.COM
-DNSNAME="samba.example.com"
-BASEDN="dc=samba,dc=example,dc=com"
-PASSWORD=penguin
-SRCDIR=`pwd`
-ROOT=$USER
-SERVER=localhost
-NETBIOSNAME=localtest
-if test -z "$ROOT"; then
-    ROOT=$LOGNAME
-fi
-if test -z "$ROOT"; then
-    ROOT=`whoami`
-fi
-
-oldpwd=`pwd`
-srcdir=`dirname $0`/../..
-mkdir -p $PREFIX || exit $?
-cd $PREFIX
-PREFIX_ABS=`pwd`
-cd $oldpwd
-
-TMPDIR=$PREFIX_ABS/tmp
-ETCDIR=$PREFIX_ABS/etc
-PIDDIR=$PREFIX_ABS/pid
-CONFFILE=$ETCDIR/smb.conf
-KRB5_CONFIG=$ETCDIR/krb5.conf
-PRIVATEDIR=$PREFIX_ABS/private
-NCALRPCDIR=$PREFIX_ABS/ncalrpc
-LOCKDIR=$PREFIX_ABS/lockdir
-
-WINBINDD_SOCKET_DIR=$PREFIX_ABS/winbind_socket
-CONFIGURATION="--configfile=$CONFFILE"
-LDAPDIR=$PREFIX_ABS/ldap
-
-rm -rf $PREFIX/*
-mkdir -p $PRIVATEDIR $ETCDIR $PIDDIR $NCALRPCDIR $LOCKDIR $TMPDIR $LDAPDIR/db $LDAPDIR/db/bdb-logs $LDAPDIR/db/tmp
-
-cat >$CONFFILE<<EOF
-[global]
-       netbios name = $NETBIOSNAME
-       netbios aliases = $SERVER
-       workgroup = $DOMAIN
-       realm = $REALM
-       private dir = $PRIVATEDIR
-       pid directory = $PIDDIR
-       ncalrpc dir = $NCALRPCDIR
-       lock dir = $LOCKDIR
-       share backend = $SHARE_BACKEND
-       setup directory = $SRCDIR/setup
-       js include = $SRCDIR/scripting/libjs
-       winbindd socket directory = $WINBINDD_SOCKET_DIR
-       name resolve order = bcast
-       interfaces = 127.0.0.1/8
-       tls dh params file = $DHFILE
-       panic action = $SRCDIR/script/gdb_backtrace %PID% %PROG%
-       wins support = yes
-       server role = $SERVER_ROLE
-       max xmit = 32K
-       server max protocol = SMB2
-       notify:inotify = false
-       ldb:nosync = true
-       system:anonymous = true
-#We don't want to pass our self-tests if the PAC code is wrong
-       gensec:require_pac = true
-       log level = $SMBD_LOGLEVEL
-
-[tmp]
-       path = $TMPDIR
-       read only = no
-       ntvfs handler = posix
-       posix:sharedelay = 100000
-       posix:eadb = $LOCKDIR/eadb.tdb
-
-[cifs]
-       read only = no
-       ntvfs handler = cifs
-       cifs:server = $SERVER
-       cifs:user = $USERNAME
-       cifs:password = $PASSWORD
-       cifs:domain = $DOMAIN
-       cifs:share = tmp
-
-[simple]
-       path = $TMPDIR
-       read only = no
-       ntvfs handler = simple
-
-[cifsposixtestshare]
-       copy = simple
-       ntvfs handler = cifsposix   
-EOF
-
-## Override default share.ldb file
-rm -f $PRIVATEDIR/share.ldb
-cat >$PRIVATEDIR/share.ldif<<EOF
-### Shares basedn
-dn: @INDEXLIST
-@IDXATTR: name
-
-dn: @ATTRIBUTES
-cn: CASE_INSENSITIVE
-dc: CASE_INSENSITIVE
-name: CASE_INSENSITIVE
-dn: CASE_INSENSITIVE
-objectClass: CASE_INSENSITIVE
-
-dn: CN=Shares
-objectClass: top
-objectClass: organizationalUnit
-cn: Shares
-
-### Default IPC$ Share
-dn: CN=IPC$,CN=Shares
-objectClass: top
-objectClass: share
-cn: IPC$
-name: IPC$
-type: IPC
-path: /tmp
-comment: Remote IPC
-max-connections: -1
-available: True
-readonly: True
-browseable: False
-ntvfs-handler: default
-
-### Default ADMIN$ Share
-dn: CN=ADMIN$,CN=Shares
-objectClass: top
-objectClass: share
-cn: ADMIN$
-name: ADMIN$
-type: DISK
-path: /tmp
-comment: Remote Admin
-max-connections: -1
-available: True
-readonly: True
-browseable: False
-ntvfs-handler: default
-
-dn: CN=tmp,CN=Shares
-objectClass: top
-objectClass: share
-cn: tmp
-name: tmp
-type: DISK
-path: $TMPDIR
-comment: Temp Dir for Tests
-readonly: False
-ntvfs-handler: posix
-posix-sharedelay: 100000
-posix-eadb: $LOCKDIR/eadb.tdb
-
-dn: CN=cifs,CN=Shares
-objectClass: top
-objectClass: share
-cn: cifs
-name: cifs
-type: DISK
-readonly: False
-ntvfs-handler: cifs
-cifs-server: $SERVER
-cifs-user: $USERNAME
-cifs-password: $PASSWORD
-cifs-domain: $DOMAIN
-cifs-share: tmp
-EOF
-
-$srcdir/bin/ldbadd -H $PRIVATEDIR/share.ldb < $PRIVATEDIR/share.ldif >/dev/null || exit 1
-
-. `dirname $0`/mk-keyblobs.sh
-
-cat >$KRB5_CONFIG<<EOF
-#Generated krb5.conf for $REALM
-
-[libdefaults]
- default_realm = $REALM
- dns_lookup_realm = false
- dns_lookup_kdc = false
- ticket_lifetime = 24h
- forwardable = yes
-
-[realms]
- $REALM = {
-  kdc = 127.0.0.1:88
-  admin_server = 127.0.0.1:88
-  default_domain = $DNSNAME
- }
- $DNSNAME = {
-  kdc = 127.0.0.1:88
-  admin_server = 127.0.0.1:88
-  default_domain = $DNSNAME
- }
- $DOMAIN = {
-  kdc = 127.0.0.1:88
-  admin_server = 127.0.0.1:88
-  default_domain = $DNSNAME
- }
-
-[appdefaults]
-       pkinit_anchors = FILE:$CAFILE
-
-[kdc]
-       enable-pkinit = true
-       pkinit_identity = FILE:$KDCCERTFILE,$KEYFILE
-       pkinit_anchors = FILE:$CAFILE
-
-[domain_realm]
- .$DNSNAME = $REALM
-EOF
-
-#Ensure the config file is valid before we start
-$srcdir/bin/testparm $CONFIGURATION -v --suppress-prompt >/dev/null 2>&1 || {
-    echo "">&2
-    echo "Failed to create configuration!" >&2
-    $srcdir/bin/testparm $CONFIGURATION  >&2
-    exit 1
-}
-
-( $srcdir/bin/testparm $CONFIGURATION -v --suppress-prompt --parameter-name="netbios name" --section-name=global 2> /dev/null | grep -i ^$NETBIOSNAME ) >/dev/null 2>&1 || {
-    echo "$?" >&2
-    $srcdir/bin/testparm $CONFIGURATION -v --suppress-prompt --parameter-name="netbios name" --section-name=global --suppress-prompt 2> /dev/null | grep -i ^$NETBIOSNAME >&2
-    echo "Failed to create configuration!" >&2
-    exit 1
-}
-
-PROVISION_OPTIONS="$CONFIGURATION --host-name=$NETBIOSNAME --host-ip=127.0.0.1"
-PROVISION_OPTIONS="$PROVISION_OPTIONS --quiet --domain $DOMAIN --realm $REALM"
-PROVISION_OPTIONS="$PROVISION_OPTIONS --adminpass $PASSWORD --root=$ROOT"
-PROVISION_OPTIONS="$PROVISION_OPTIONS --simple-bind-dn=cn=Manager,$BASEDN --password=$PASSWORD --root=$ROOT"
-$srcdir/bin/smbscript $srcdir/setup/provision $PROVISION_OPTIONS >&2
-
-LDAP_URI="ldapi://"`echo $LDAPDIR/ldapi | sed 's|/|%2F|g'`
-
-. `dirname $0`/mk-openldap.sh
-
-test -z "$FEDORA_DS_PREFIX" || {
-    . `dirname $0`/mk-fedora-ds.sh
-}
-
-cat >$PRIVATEDIR/wins_config.ldif<<EOF
-dn: name=TORTURE_6,CN=PARTNERS
-objectClass: wreplPartner
-name: TORTURE_6
-address: 127.0.0.6
-pullInterval: 0
-pushChangeCount: 0
-type: 0x3
-EOF
-
-$srcdir/bin/ldbadd -H $PRIVATEDIR/wins_config.ldb < $PRIVATEDIR/wins_config.ldif >/dev/null || exit 1
-
-echo "KRB5_CONFIG=$KRB5_CONFIG"
-echo "PREFIX_ABS=$PREFIX_ABS"
-echo "SLAPD_CONF=$SLAPD_CONF"
-echo "PIDDIR=$PIDDIR"
-echo "SERVER=$SERVER"
-echo "NETBIOSNAME=$NETBIOSNAME"
-echo "LDAP_URI=$LDAP_URI"
-echo "DOMAIN=$DOMAIN"
-echo "USERNAME=$USERNAME"
-echo "REALM=$REALM"
-echo "DNSNAME=$DNSNAME"
-echo "BASEDN=$BASEDN"
-echo "PASSWORD=$PASSWORD"
-echo "SRCDIR=$SRCDIR"
-echo "PREFIX=$PREFIX"
-echo "LDAPDIR=$LDAPDIR"
-echo "CONFFILE=$CONFFILE"
-echo "PROVISION_OPTIONS=$PROVISION_OPTIONS"
-echo "PROVISION_ACI=$PROVISION_ACI"
-echo "WINBINDD_SOCKET_DIR=$WINBINDD_SOCKET_DIR"
-echo "NCALRPCDIR=$NCALRPCDIR"
-echo "CONFIGURATION=$CONFIGURATION"
diff --git a/source4/script/tests/mktestdc.sh.share_ldb b/source4/script/tests/mktestdc.sh.share_ldb
deleted file mode 100755 (executable)
index 8aa0a04..0000000
+++ /dev/null
@@ -1,5 +0,0 @@
-#!/bin/sh
-
-SHARE_BACKEND="ldb"
-
-. `dirname $0`/mktestsetup.sh
index d5576d576714d57b5f8d8fa4d70ce92f973fb293..0f7b29c258e78c556cf11437503f20e16bad9dc5 100755 (executable)
@@ -130,7 +130,7 @@ my $opt_expected_failures = undef;
 my $opt_skip = undef;
 my $opt_verbose = 0;
 my $opt_testenv = 0;
-my $opt_ldap = undef;
+my $ldap = undef;
 my $opt_analyse_cmd = undef;
 my $opt_resetup_env = undef;
 
@@ -308,7 +308,7 @@ Target Specific:
  --socket-wrapper-pcap=FILE save traffic to pcap file
  --socket-wrapper           enable socket wrapper
  --expected-failures=FILE   specify list of tests that is guaranteed to fail
- --ldap                     run against ldap
+ --ldap=openldap|fedora     back smbd onto specified ldap server
 
 Behaviour:
  --quick                    run quick overall test
@@ -335,7 +335,7 @@ my $result = GetOptions (
                'builddir=s' => \$builddir,
                'verbose' => \$opt_verbose,
                'testenv' => \$opt_testenv,
-               'ldap' => \$opt_ldap,
+               'ldap:s' => \$ldap,
                'analyse-cmd=s' => \$opt_analyse_cmd,
                'resetup-environment' => \$opt_resetup_env,
            );
@@ -353,12 +353,14 @@ unless (defined($ENV{VALGRIND})) {
 }
 
 my $old_pwd = "$RealBin/../..";
-my $ldap = 0;
-if (defined($ENV{TEST_LDAP})) {
-       $ldap = ($ENV{TEST_LDAP} eq "yes");
-}
-if (defined($opt_ldap)) {
-       $ldap = $opt_ldap;
+
+# Backwards compatibility:
+if (defined($ENV{TEST_LDAP}) and $ENV{TEST_LDAP} eq "yes") {
+       if (defined($ENV{FEDORA_DS_PREFIX})) {
+               $ldap = "fedora";
+       } else {
+               $ldap = "openldap";
+       }
 }
 
 my $torture_maxtime = ($ENV{TORTURE_MAXTIME} or 1200);
@@ -573,6 +575,7 @@ sub setup_env($)
 sub teardown_env($)
 {
        my ($envname) = @_;
+       return if ($envname eq "none");
        $target->teardown_env($running_envs{$envname});
        delete $running_envs{$envname};
 }
diff --git a/source4/script/tests/test_samba4.pl b/source4/script/tests/test_samba4.pl
new file mode 100755 (executable)
index 0000000..8476e6e
--- /dev/null
@@ -0,0 +1,21 @@
+#!/usr/bin/perl
+
+use Test::More tests => 3;
+use FindBin qw($RealBin);
+use lib $RealBin;
+use Samba4;
+
+my $s = new Samba4($RealBin."/../../bin", undef, $RealBin."/../../setup");
+
+ok($s);
+
+is($RealBin."/../../bin", $s->{bindir});
+
+
+ok($s->write_ldb_file("tmpldb", "
+dn: a=b
+a: b
+c: d
+"));
+
+unlink("tmpldb");
index 653049f351593b92b56eab47d9a8aeb132854daf..b77b5fc69dd1792a2dd4e396d58d43cea798ff88 100644 (file)
@@ -40,44 +40,12 @@ static bool test_tempdir(struct torture_context *tctx)
        return true;
 }
 
-static bool test_setup_server(struct torture_context *tctx)
-{
-       pid_t pid;
-       TALLOC_CTX *mem_ctx = tctx;
-
-       torture_assert_ntstatus_ok(tctx, torture_setup_server(mem_ctx, 
-                                                                       "setupserver-success",
-                                                                       "./script/tests/mktestdc.sh",
-                                                                       "./bin/smbd", &pid),
-                                                          "starting smbd failed");
-
-       torture_assert(tctx, pid > 0, "Pid invalid");
-
-       torture_comment(tctx, "Created smbd with pid %d\n", pid);
-
-       kill(pid, SIGINT);
-
-       waitpid(pid, NULL, 0);
-
-       torture_assert_ntstatus_equal(tctx, torture_setup_server(mem_ctx, 
-                                                                       "setupserver-fail",
-                                                                       "./invalid-script",
-                                                                       "./bin/smbd", &pid), 
-                                                                 NT_STATUS_UNSUCCESSFUL,
-                                                          "invalid script specified");
-
-       torture_assert(tctx, pid == -1, "Pid not -1 after failure");
-       return true;
-}
-
-
 struct torture_suite *torture_local_torture(TALLOC_CTX *mem_ctx)
 {
        struct torture_suite *suite = torture_suite_create(mem_ctx, 
                                                                                                           "TORTURE");
 
        torture_suite_add_simple_test(suite, "tempdir", test_tempdir);
-       torture_suite_add_simple_test(suite, "setup server", test_setup_server);
 
        return suite;
 }
index 11cb81ca064b61857e784024a73f4782eb9f0391..55e4bc977fc90374264172e8ccb0880c06218d7c 100644 (file)
@@ -50,77 +50,6 @@ BOOL nt_time_equal(NTTIME *t1, NTTIME *t2)
        return *t1 == *t2;
 }
 
-/**
- * Provision a Samba installation using @param setupdir_script and start smbd.
- */
-NTSTATUS torture_setup_server(TALLOC_CTX *mem_ctx, 
-                                                         const char *prefix,
-                                                         const char *setupdir_script,
-                                                         const char *smbd_path,
-                                                         pid_t *smbd_pid)
-{
-       char *tempdir;
-       NTSTATUS status;
-       pid_t pid;
-       int child_status;
-       char *configfile, *configparam;
-       pid_t closed_pid;
-
-       *smbd_pid = -1;
-
-       status = torture_temp_dir(mem_ctx, prefix, &tempdir);
-       if (NT_STATUS_IS_ERR(status)) {
-               return status;
-       }
-
-       if ((pid = fork()) == 0) {
-               execl(setupdir_script, setupdir_script, tempdir, NULL);
-               exit(1);
-       } else if (pid == -1) {
-               DEBUG(0, ("Unable to fork()\n"));
-               return NT_STATUS_UNSUCCESSFUL;
-       }
-
-       closed_pid = waitpid(pid, &child_status, 0);
-
-       if (closed_pid == -1) {
-               DEBUG(1, ("Error waiting for child"));
-               return NT_STATUS_UNSUCCESSFUL;
-       }
-
-       SMB_ASSERT(closed_pid == pid);
-
-       if (!WIFEXITED(child_status) || WEXITSTATUS(child_status) != 0) {
-               DEBUG(1, ("Invalid return code from setup script %s: %d\n", 
-                                 setupdir_script,
-                                 WEXITSTATUS(child_status)));
-               return NT_STATUS_UNSUCCESSFUL;
-       }
-
-       configfile = talloc_asprintf(mem_ctx, "%s/etc/smb.conf", 
-                                                                tempdir);
-       if (!file_exist(configfile)) {
-               DEBUG(1, ("Setup script didn't create %s\n", configfile));
-               return NT_STATUS_UNSUCCESSFUL;
-       }
-
-       configparam = talloc_asprintf(mem_ctx, "--configfile=%s", configfile);
-       talloc_free(configfile);
-
-       if ((pid = fork()) == 0) {
-               execl(smbd_path, smbd_path, "-i", "--model=single", 
-                                               configparam, NULL);
-               exit(1);
-       } else if (pid == -1) {
-               DEBUG(0, ("Unable to fork()\n"));
-               return NT_STATUS_UNSUCCESSFUL;
-       }
-
-       *smbd_pid = pid;
-
-       return NT_STATUS_OK;
-}
-
 NTSTATUS torture_second_tcon(TALLOC_CTX *mem_ctx,
                             struct smbcli_session *session,
                             const char *sharename,