s4:torture: add some SMB2 renaming tests
authorChristian Ambach <ambi@samba.org>
Tue, 7 Feb 2012 17:02:56 +0000 (18:02 +0100)
committerChristian Ambach <ambi@samba.org>
Fri, 10 Feb 2012 12:28:08 +0000 (13:28 +0100)
source4/torture/smb2/rename.c [new file with mode: 0644]
source4/torture/smb2/smb2.c
source4/torture/smb2/wscript_build

diff --git a/source4/torture/smb2/rename.c b/source4/torture/smb2/rename.c
new file mode 100644 (file)
index 0000000..aced971
--- /dev/null
@@ -0,0 +1,841 @@
+/*
+   Unix SMB/CIFS implementation.
+
+   SMB2 rename test suite
+
+   Copyright (C) Christian Ambach 2012
+
+   This program is free software; you can redistribute it and/or modify
+   it under the terms of the GNU General Public License as published by
+   the Free Software Foundation; either version 3 of the License, or
+   (at your option) any later version.
+
+   This program is distributed in the hope that it will be useful,
+   but WITHOUT ANY WARRANTY; without even the implied warranty of
+   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+   GNU General Public License for more details.
+
+   You should have received a copy of the GNU General Public License
+   along with this program.  If not, see <http://www.gnu.org/licenses/>.
+*/
+
+#include "includes.h"
+#include "libcli/smb2/smb2.h"
+#include "libcli/smb2/smb2_calls.h"
+
+#include "torture/torture.h"
+#include "torture/smb2/proto.h"
+
+#include "librpc/gen_ndr/security.h"
+
+#define CHECK_STATUS(status, correct) do { \
+       if (!NT_STATUS_EQUAL(status, correct)) { \
+               torture_result(torture, TORTURE_FAIL, \
+                      "(%s) Incorrect status %s - should be %s\n", \
+                      __location__, nt_errstr(status), nt_errstr(correct)); \
+               ret = false; \
+               goto done; \
+       }} while (0)
+
+#define BASEDIR "test_rename"
+
+/*
+ * basic testing of rename: open file with DELETE access
+ * this should pass
+ */
+
+static bool torture_smb2_rename_simple(struct torture_context *torture,
+               struct smb2_tree *tree1)
+{
+       bool ret = true;
+       NTSTATUS status;
+       union smb_open io;
+       union smb_close cl;
+       union smb_setfileinfo sinfo;
+       union smb_fileinfo fi;
+       struct smb2_handle h1;
+
+       smb2_deltree(tree1, BASEDIR);
+       smb2_util_rmdir(tree1, BASEDIR);
+
+       torture_comment(torture, "Creating base directory\n");
+
+       smb2_util_mkdir(tree1, BASEDIR);
+
+
+       torture_comment(torture, "Creating test file\n");
+
+       ZERO_STRUCT(io.smb2);
+       io.generic.level = RAW_OPEN_SMB2;
+       io.smb2.in.create_flags = 0;
+       io.smb2.in.desired_access = SEC_FILE_ALL|SEC_STD_DELETE;
+       io.smb2.in.create_options = NTCREATEX_OPTIONS_NON_DIRECTORY_FILE;
+       io.smb2.in.file_attributes = FILE_ATTRIBUTE_NORMAL;
+       io.smb2.in.share_access = NTCREATEX_SHARE_ACCESS_READ |
+               NTCREATEX_SHARE_ACCESS_WRITE | NTCREATEX_SHARE_ACCESS_DELETE;
+       io.smb2.in.alloc_size = 0;
+       io.smb2.in.create_disposition = NTCREATEX_DISP_CREATE;
+       io.smb2.in.impersonation_level = SMB2_IMPERSONATION_ANONYMOUS;
+       io.smb2.in.security_flags = 0;
+       io.smb2.in.fname = BASEDIR "\\file.txt";
+
+       status = smb2_create(tree1, torture, &(io.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h1 = io.smb2.out.file.handle;
+
+       torture_comment(torture, "Renaming test file\n");
+
+       ZERO_STRUCT(sinfo);
+       sinfo.rename_information.level = RAW_SFILEINFO_RENAME_INFORMATION;
+       sinfo.rename_information.in.file.handle = io.smb2.out.file.handle;
+       sinfo.rename_information.in.overwrite = 0;
+       sinfo.rename_information.in.root_fid = 0;
+       sinfo.rename_information.in.new_name =
+               BASEDIR "\\newname.txt";
+       status = smb2_setinfo_file(tree1, &sinfo);
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       torture_comment(torture, "Checking for new filename\n");
+
+       ZERO_STRUCT(fi);
+       fi.generic.level = RAW_FILEINFO_SMB2_ALL_INFORMATION;
+       fi.generic.in.file.handle = h1;
+       status = smb2_getinfo_file(tree1, torture, &fi);
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+
+       torture_comment(torture, "Closing test file\n");
+
+       ZERO_STRUCT(cl.smb2);
+       cl.smb2.level = RAW_CLOSE_SMB2;
+       cl.smb2.in.file.handle = h1;
+       status = smb2_close(tree1, &(cl.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       ZERO_STRUCT(h1);
+
+done:
+
+       torture_comment(torture, "Cleaning up\n");
+
+       if (h1.data) {
+               ZERO_STRUCT(cl.smb2);
+               cl.smb2.level = RAW_CLOSE_SMB2;
+               cl.smb2.in.file.handle = h1;
+               status = smb2_close(tree1, &(cl.smb2));
+       }
+       smb2_deltree(tree1, BASEDIR);
+       return ret;
+}
+
+/*
+ * basic testing of rename, this time do not request DELETE access
+ * for the file, this should fail
+ */
+
+static bool torture_smb2_rename_simple2(struct torture_context *torture,
+               struct smb2_tree *tree1)
+{
+       bool ret = true;
+       NTSTATUS status;
+       union smb_open io;
+       union smb_close cl;
+       union smb_setfileinfo sinfo;
+       struct smb2_handle h1;
+
+       smb2_deltree(tree1, BASEDIR);
+       smb2_util_rmdir(tree1, BASEDIR);
+
+       torture_comment(torture, "Creating base directory\n");
+
+       smb2_util_mkdir(tree1, BASEDIR);
+
+
+       torture_comment(torture, "Creating test file\n");
+
+       ZERO_STRUCT(io.smb2);
+       io.generic.level = RAW_OPEN_SMB2;
+       io.smb2.in.create_flags = 0;
+       io.smb2.in.desired_access = SEC_FILE_ALL;
+       io.smb2.in.create_options = NTCREATEX_OPTIONS_NON_DIRECTORY_FILE;
+       io.smb2.in.file_attributes = FILE_ATTRIBUTE_NORMAL;
+       io.smb2.in.share_access = NTCREATEX_SHARE_ACCESS_READ |
+               NTCREATEX_SHARE_ACCESS_WRITE | NTCREATEX_SHARE_ACCESS_DELETE;
+       io.smb2.in.alloc_size = 0;
+       io.smb2.in.create_disposition = NTCREATEX_DISP_CREATE;
+       io.smb2.in.impersonation_level = SMB2_IMPERSONATION_ANONYMOUS;
+       io.smb2.in.security_flags = 0;
+       io.smb2.in.fname = BASEDIR "\\file.txt";
+
+       status = smb2_create(tree1, torture, &(io.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h1 = io.smb2.out.file.handle;
+
+       torture_comment(torture, "Renaming test file\n");
+
+       ZERO_STRUCT(sinfo);
+       sinfo.rename_information.level = RAW_SFILEINFO_RENAME_INFORMATION;
+       sinfo.rename_information.in.file.handle = io.smb2.out.file.handle;
+       sinfo.rename_information.in.overwrite = 0;
+       sinfo.rename_information.in.root_fid = 0;
+       sinfo.rename_information.in.new_name =
+               BASEDIR "\\newname.txt";
+       status = smb2_setinfo_file(tree1, &sinfo);
+       CHECK_STATUS(status, NT_STATUS_ACCESS_DENIED);
+
+       torture_comment(torture, "Closing test file\n");
+
+       ZERO_STRUCT(cl.smb2);
+       cl.smb2.level = RAW_CLOSE_SMB2;
+       cl.smb2.in.file.handle = h1;
+       status = smb2_close(tree1, &(cl.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       ZERO_STRUCT(h1);
+
+done:
+
+       torture_comment(torture, "Cleaning up\n");
+
+       if (h1.data) {
+               ZERO_STRUCT(cl.smb2);
+               cl.smb2.level = RAW_CLOSE_SMB2;
+               cl.smb2.in.file.handle = h1;
+               status = smb2_close(tree1, &(cl.smb2));
+       }
+       smb2_deltree(tree1, BASEDIR);
+       return ret;
+}
+
+
+/*
+ * testing of rename with no sharing allowed on file
+ * this should work
+ */
+
+static bool torture_smb2_rename_no_sharemode(struct torture_context *torture,
+               struct smb2_tree *tree1)
+{
+       bool ret = true;
+       NTSTATUS status;
+       union smb_open io;
+       union smb_close cl;
+       union smb_setfileinfo sinfo;
+       union smb_fileinfo fi;
+       struct smb2_handle h1;
+
+       smb2_deltree(tree1, BASEDIR);
+       smb2_util_rmdir(tree1, BASEDIR);
+
+       torture_comment(torture, "Creating base directory\n");
+
+       smb2_util_mkdir(tree1, BASEDIR);
+
+
+       torture_comment(torture, "Creating test file\n");
+
+       ZERO_STRUCT(io.smb2);
+       io.generic.level = RAW_OPEN_SMB2;
+       io.smb2.in.create_flags = 0;
+       io.smb2.in.desired_access = 0x0017019f;
+       io.smb2.in.create_options = NTCREATEX_OPTIONS_NON_DIRECTORY_FILE;
+       io.smb2.in.file_attributes = FILE_ATTRIBUTE_NORMAL;
+       io.smb2.in.share_access = 0;
+       io.smb2.in.alloc_size = 0;
+       io.smb2.in.create_disposition = NTCREATEX_DISP_CREATE;
+       io.smb2.in.impersonation_level = SMB2_IMPERSONATION_ANONYMOUS;
+       io.smb2.in.security_flags = 0;
+       io.smb2.in.fname = BASEDIR "\\file.txt";
+
+       status = smb2_create(tree1, torture, &(io.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h1 = io.smb2.out.file.handle;
+
+       torture_comment(torture, "Renaming test file\n");
+
+       ZERO_STRUCT(sinfo);
+       sinfo.rename_information.level = RAW_SFILEINFO_RENAME_INFORMATION;
+       sinfo.rename_information.in.file.handle = io.smb2.out.file.handle;
+       sinfo.rename_information.in.overwrite = 0;
+       sinfo.rename_information.in.root_fid = 0;
+       sinfo.rename_information.in.new_name =
+               BASEDIR "\\newname.txt";
+       status = smb2_setinfo_file(tree1, &sinfo);
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       torture_comment(torture, "Checking for new filename\n");
+
+       ZERO_STRUCT(fi);
+       fi.generic.level = RAW_FILEINFO_SMB2_ALL_INFORMATION;
+       fi.generic.in.file.handle = h1;
+       status = smb2_getinfo_file(tree1, torture, &fi);
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+
+       torture_comment(torture, "Closing test file\n");
+
+       ZERO_STRUCT(cl.smb2);
+       cl.smb2.level = RAW_CLOSE_SMB2;
+       cl.smb2.in.file.handle = h1;
+       status = smb2_close(tree1, &(cl.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       ZERO_STRUCT(h1);
+
+done:
+
+       torture_comment(torture, "Cleaning up\n");
+
+       if (h1.data) {
+               ZERO_STRUCT(cl.smb2);
+               cl.smb2.level = RAW_CLOSE_SMB2;
+               cl.smb2.in.file.handle = h1;
+               status = smb2_close(tree1, &(cl.smb2));
+       }
+       smb2_deltree(tree1, BASEDIR);
+       return ret;
+}
+
+/*
+ * testing of rename when opening parent dir with delete access and delete
+ * sharing allowed
+ * should result in sharing violation
+ */
+
+static bool torture_smb2_rename_with_delete_access(struct torture_context *torture,
+               struct smb2_tree *tree1)
+{
+       bool ret = true;
+       NTSTATUS status;
+       union smb_open io;
+       union smb_close cl;
+       union smb_setfileinfo sinfo;
+       struct smb2_handle fh, dh;
+
+       smb2_deltree(tree1, BASEDIR);
+       smb2_util_rmdir(tree1, BASEDIR);
+
+       torture_comment(torture, "Creating base directory\n");
+
+       smb2_util_mkdir(tree1, BASEDIR);
+
+       torture_comment(torture, "Opening parent directory\n");
+
+       ZERO_STRUCT(io.smb2);
+       io.generic.level = RAW_OPEN_SMB2;
+       io.smb2.in.create_flags = 0;
+       io.smb2.in.desired_access = SEC_STD_SYNCHRONIZE | SEC_STD_WRITE_DAC |
+               SEC_STD_READ_CONTROL | SEC_STD_DELETE | SEC_FILE_WRITE_ATTRIBUTE |
+               SEC_FILE_READ_ATTRIBUTE | SEC_FILE_EXECUTE | SEC_FILE_WRITE_EA |
+               SEC_FILE_READ_EA | SEC_FILE_APPEND_DATA | SEC_FILE_READ_DATA |
+               SEC_FILE_WRITE_DATA;
+       io.smb2.in.create_options = NTCREATEX_OPTIONS_DIRECTORY;
+       io.smb2.in.file_attributes = FILE_ATTRIBUTE_DIRECTORY;
+       io.smb2.in.share_access = NTCREATEX_SHARE_ACCESS_READ |
+               NTCREATEX_SHARE_ACCESS_WRITE | NTCREATEX_SHARE_ACCESS_DELETE;
+       io.smb2.in.alloc_size = 0;
+       io.smb2.in.create_disposition = NTCREATEX_DISP_OPEN;
+       io.smb2.in.impersonation_level = SMB2_IMPERSONATION_ANONYMOUS;
+       io.smb2.in.security_flags = 0;
+       io.smb2.in.fname = BASEDIR;
+
+       status = smb2_create(tree1, torture, &(io.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+       dh = io.smb2.out.file.handle;
+
+
+       torture_comment(torture, "Creating test file\n");
+
+       ZERO_STRUCT(io.smb2);
+       io.generic.level = RAW_OPEN_SMB2;
+       io.smb2.in.create_flags = 0;
+       io.smb2.in.desired_access = SEC_STD_SYNCHRONIZE | SEC_STD_WRITE_DAC |
+               SEC_STD_READ_CONTROL | SEC_STD_DELETE | SEC_FILE_WRITE_ATTRIBUTE |
+               SEC_FILE_READ_ATTRIBUTE | SEC_FILE_WRITE_EA | SEC_FILE_READ_EA |
+               SEC_FILE_APPEND_DATA | SEC_FILE_READ_DATA | SEC_FILE_WRITE_DATA;
+       io.smb2.in.create_options = NTCREATEX_OPTIONS_NON_DIRECTORY_FILE;
+       io.smb2.in.file_attributes = FILE_ATTRIBUTE_NORMAL;
+       io.smb2.in.share_access = 0;
+       io.smb2.in.alloc_size = 0;
+       io.smb2.in.create_disposition = NTCREATEX_DISP_CREATE;
+       io.smb2.in.impersonation_level = SMB2_IMPERSONATION_ANONYMOUS;
+       io.smb2.in.security_flags = 0;
+       io.smb2.in.fname = BASEDIR "\\file.txt";
+
+       status = smb2_create(tree1, torture, &(io.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+       fh = io.smb2.out.file.handle;
+
+       torture_comment(torture, "Renaming test file\n");
+
+       ZERO_STRUCT(sinfo);
+       sinfo.rename_information.level = RAW_SFILEINFO_RENAME_INFORMATION;
+       sinfo.rename_information.in.file.handle = fh;
+       sinfo.rename_information.in.overwrite = 0;
+       sinfo.rename_information.in.root_fid = 0;
+       sinfo.rename_information.in.new_name =
+               BASEDIR "\\newname.txt";
+       status = smb2_setinfo_file(tree1, &sinfo);
+       CHECK_STATUS(status, NT_STATUS_SHARING_VIOLATION);
+
+       torture_comment(torture, "Closing test file\n");
+
+       ZERO_STRUCT(cl.smb2);
+       cl.smb2.level = RAW_CLOSE_SMB2;
+       cl.smb2.in.file.handle = fh;
+       status = smb2_close(tree1, &(cl.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       ZERO_STRUCT(fh);
+
+       torture_comment(torture, "Closing directory\n");
+
+       ZERO_STRUCT(cl.smb2);
+       cl.smb2.level = RAW_CLOSE_SMB2;
+       cl.smb2.in.file.handle = dh;
+       status = smb2_close(tree1, &(cl.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       ZERO_STRUCT(dh);
+
+
+done:
+
+       torture_comment(torture, "Cleaning up\n");
+
+       if (fh.data) {
+               ZERO_STRUCT(cl.smb2);
+               cl.smb2.level = RAW_CLOSE_SMB2;
+               cl.smb2.in.file.handle = fh;
+               status = smb2_close(tree1, &(cl.smb2));
+       }
+       if (dh.data) {
+               ZERO_STRUCT(cl.smb2);
+               cl.smb2.level = RAW_CLOSE_SMB2;
+               cl.smb2.in.file.handle = dh;
+               status = smb2_close(tree1, &(cl.smb2));
+       }
+
+       smb2_deltree(tree1, BASEDIR);
+       return ret;
+}
+
+
+/*
+ * testing of rename with delete access on parent dir
+ * this is a variation of the test above: parent dir is opened
+ * without share_delete, so rename must fail
+ */
+
+static bool torture_smb2_rename_with_delete_access2(struct torture_context *torture,
+               struct smb2_tree *tree1)
+{
+       bool ret = true;
+       NTSTATUS status;
+       union smb_open io;
+       union smb_close cl;
+       union smb_setfileinfo sinfo;
+       struct smb2_handle fh, dh;
+
+       smb2_deltree(tree1, BASEDIR);
+       smb2_util_rmdir(tree1, BASEDIR);
+
+       torture_comment(torture, "Creating base directory\n");
+
+       smb2_util_mkdir(tree1, BASEDIR);
+
+       torture_comment(torture, "Opening parent directory\n");
+
+       ZERO_STRUCT(io.smb2);
+       io.generic.level = RAW_OPEN_SMB2;
+       io.smb2.in.create_flags = 0;
+       io.smb2.in.desired_access = SEC_STD_SYNCHRONIZE | SEC_STD_WRITE_DAC |
+               SEC_STD_READ_CONTROL | SEC_STD_DELETE | SEC_FILE_WRITE_ATTRIBUTE |
+               SEC_FILE_READ_ATTRIBUTE | SEC_FILE_EXECUTE | SEC_FILE_WRITE_EA |
+               SEC_FILE_READ_EA | SEC_FILE_APPEND_DATA | SEC_FILE_READ_DATA |
+               SEC_FILE_WRITE_DATA;
+       io.smb2.in.create_options = NTCREATEX_OPTIONS_DIRECTORY;
+       io.smb2.in.file_attributes = FILE_ATTRIBUTE_DIRECTORY;
+       io.smb2.in.share_access = 0;
+       io.smb2.in.alloc_size = 0;
+       io.smb2.in.create_disposition = NTCREATEX_DISP_OPEN;
+       io.smb2.in.impersonation_level = SMB2_IMPERSONATION_ANONYMOUS;
+       io.smb2.in.security_flags = 0;
+       io.smb2.in.fname = BASEDIR;
+
+       status = smb2_create(tree1, torture, &(io.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+       dh = io.smb2.out.file.handle;
+
+
+       torture_comment(torture, "Creating test file\n");
+
+       ZERO_STRUCT(io.smb2);
+       io.generic.level = RAW_OPEN_SMB2;
+       io.smb2.in.create_flags = 0;
+       io.smb2.in.desired_access = SEC_STD_SYNCHRONIZE | SEC_STD_WRITE_DAC |
+               SEC_STD_READ_CONTROL | SEC_STD_DELETE | SEC_FILE_WRITE_ATTRIBUTE |
+               SEC_FILE_READ_ATTRIBUTE | SEC_FILE_WRITE_EA | SEC_FILE_READ_EA |
+               SEC_FILE_APPEND_DATA | SEC_FILE_READ_DATA | SEC_FILE_WRITE_DATA;
+       io.smb2.in.create_options = NTCREATEX_OPTIONS_NON_DIRECTORY_FILE;
+       io.smb2.in.file_attributes = FILE_ATTRIBUTE_NORMAL;
+       io.smb2.in.share_access = 0;
+       io.smb2.in.alloc_size = 0;
+       io.smb2.in.create_disposition = NTCREATEX_DISP_CREATE;
+       io.smb2.in.impersonation_level = SMB2_IMPERSONATION_ANONYMOUS;
+       io.smb2.in.security_flags = 0;
+       io.smb2.in.fname = BASEDIR "\\file.txt";
+
+       status = smb2_create(tree1, torture, &(io.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+       fh = io.smb2.out.file.handle;
+
+       torture_comment(torture, "Renaming test file\n");
+
+       ZERO_STRUCT(sinfo);
+       sinfo.rename_information.level = RAW_SFILEINFO_RENAME_INFORMATION;
+       sinfo.rename_information.in.file.handle = fh;
+       sinfo.rename_information.in.overwrite = 0;
+       sinfo.rename_information.in.root_fid = 0;
+       sinfo.rename_information.in.new_name =
+               BASEDIR "\\newname.txt";
+       status = smb2_setinfo_file(tree1, &sinfo);
+       CHECK_STATUS(status, NT_STATUS_SHARING_VIOLATION);
+
+       torture_comment(torture, "Closing test file\n");
+
+       ZERO_STRUCT(cl.smb2);
+       cl.smb2.level = RAW_CLOSE_SMB2;
+       cl.smb2.in.file.handle = fh;
+       status = smb2_close(tree1, &(cl.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       ZERO_STRUCT(fh);
+
+       torture_comment(torture, "Closing directory\n");
+
+       ZERO_STRUCT(cl.smb2);
+       cl.smb2.level = RAW_CLOSE_SMB2;
+       cl.smb2.in.file.handle = dh;
+       status = smb2_close(tree1, &(cl.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       ZERO_STRUCT(dh);
+
+
+done:
+
+       torture_comment(torture, "Cleaning up\n");
+
+       if (fh.data) {
+               ZERO_STRUCT(cl.smb2);
+               cl.smb2.level = RAW_CLOSE_SMB2;
+               cl.smb2.in.file.handle = fh;
+               status = smb2_close(tree1, &(cl.smb2));
+       }
+       if (dh.data) {
+               ZERO_STRUCT(cl.smb2);
+               cl.smb2.level = RAW_CLOSE_SMB2;
+               cl.smb2.in.file.handle = dh;
+               status = smb2_close(tree1, &(cl.smb2));
+       }
+
+       smb2_deltree(tree1, BASEDIR);
+       return ret;
+}
+
+/*
+ * testing of rename when opening parent dir with no delete access and delete
+ * sharing allowed
+ * this should pass
+ */
+
+static bool torture_smb2_rename_no_delete_access(struct torture_context *torture,
+               struct smb2_tree *tree1)
+{
+       bool ret = true;
+       NTSTATUS status;
+       union smb_open io;
+       union smb_close cl;
+       union smb_setfileinfo sinfo;
+       union smb_fileinfo fi;
+       struct smb2_handle fh, dh;
+
+       smb2_deltree(tree1, BASEDIR);
+       smb2_util_rmdir(tree1, BASEDIR);
+
+       torture_comment(torture, "Creating base directory\n");
+
+       smb2_util_mkdir(tree1, BASEDIR);
+
+       torture_comment(torture, "Opening parent directory\n");
+
+       ZERO_STRUCT(io.smb2);
+       io.generic.level = RAW_OPEN_SMB2;
+       io.smb2.in.create_flags = 0;
+       io.smb2.in.desired_access = SEC_STD_SYNCHRONIZE | SEC_STD_WRITE_DAC |
+               SEC_STD_READ_CONTROL | SEC_FILE_WRITE_ATTRIBUTE |
+               SEC_FILE_READ_ATTRIBUTE | SEC_FILE_EXECUTE | SEC_FILE_WRITE_EA |
+               SEC_FILE_READ_EA | SEC_FILE_APPEND_DATA | SEC_FILE_READ_DATA |
+               SEC_FILE_WRITE_DATA;
+       io.smb2.in.create_options = NTCREATEX_OPTIONS_DIRECTORY;
+       io.smb2.in.file_attributes = FILE_ATTRIBUTE_DIRECTORY;
+       io.smb2.in.share_access = NTCREATEX_SHARE_ACCESS_READ |
+               NTCREATEX_SHARE_ACCESS_WRITE | NTCREATEX_SHARE_ACCESS_DELETE;
+       io.smb2.in.alloc_size = 0;
+       io.smb2.in.create_disposition = NTCREATEX_DISP_OPEN;
+       io.smb2.in.impersonation_level = SMB2_IMPERSONATION_ANONYMOUS;
+       io.smb2.in.security_flags = 0;
+       io.smb2.in.fname = BASEDIR;
+
+       status = smb2_create(tree1, torture, &(io.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+       dh = io.smb2.out.file.handle;
+
+
+       torture_comment(torture, "Creating test file\n");
+
+       ZERO_STRUCT(io.smb2);
+       io.generic.level = RAW_OPEN_SMB2;
+       io.smb2.in.create_flags = 0;
+       io.smb2.in.desired_access = SEC_STD_SYNCHRONIZE | SEC_STD_WRITE_DAC |
+               SEC_STD_READ_CONTROL | SEC_STD_DELETE | SEC_FILE_WRITE_ATTRIBUTE |
+               SEC_FILE_READ_ATTRIBUTE | SEC_FILE_WRITE_EA | SEC_FILE_READ_EA |
+               SEC_FILE_APPEND_DATA | SEC_FILE_READ_DATA | SEC_FILE_WRITE_DATA;
+       io.smb2.in.create_options = NTCREATEX_OPTIONS_NON_DIRECTORY_FILE;
+       io.smb2.in.file_attributes = FILE_ATTRIBUTE_NORMAL;
+       io.smb2.in.share_access = 0;
+       io.smb2.in.alloc_size = 0;
+       io.smb2.in.create_disposition = NTCREATEX_DISP_CREATE;
+       io.smb2.in.impersonation_level = SMB2_IMPERSONATION_ANONYMOUS;
+       io.smb2.in.security_flags = 0;
+       io.smb2.in.fname = BASEDIR "\\file.txt";
+
+       status = smb2_create(tree1, torture, &(io.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+       fh = io.smb2.out.file.handle;
+
+       torture_comment(torture, "Renaming test file\n");
+
+       ZERO_STRUCT(sinfo);
+       sinfo.rename_information.level = RAW_SFILEINFO_RENAME_INFORMATION;
+       sinfo.rename_information.in.file.handle = fh;
+       sinfo.rename_information.in.overwrite = 0;
+       sinfo.rename_information.in.root_fid = 0;
+       sinfo.rename_information.in.new_name =
+               BASEDIR "\\newname.txt";
+       status = smb2_setinfo_file(tree1, &sinfo);
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       torture_comment(torture, "Checking for new filename\n");
+
+       ZERO_STRUCT(fi);
+       fi.generic.level = RAW_FILEINFO_SMB2_ALL_INFORMATION;
+       fi.generic.in.file.handle = fh;
+       status = smb2_getinfo_file(tree1, torture, &fi);
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+
+       torture_comment(torture, "Closing test file\n");
+
+       ZERO_STRUCT(cl.smb2);
+       cl.smb2.level = RAW_CLOSE_SMB2;
+       cl.smb2.in.file.handle = fh;
+       status = smb2_close(tree1, &(cl.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       ZERO_STRUCT(fh);
+
+       torture_comment(torture, "Closing directory\n");
+
+       ZERO_STRUCT(cl.smb2);
+       cl.smb2.level = RAW_CLOSE_SMB2;
+       cl.smb2.in.file.handle = dh;
+       status = smb2_close(tree1, &(cl.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       ZERO_STRUCT(dh);
+
+
+done:
+
+       torture_comment(torture, "Cleaning up\n");
+
+       if (fh.data) {
+               ZERO_STRUCT(cl.smb2);
+               cl.smb2.level = RAW_CLOSE_SMB2;
+               cl.smb2.in.file.handle = fh;
+               status = smb2_close(tree1, &(cl.smb2));
+       }
+       if (dh.data) {
+               ZERO_STRUCT(cl.smb2);
+               cl.smb2.level = RAW_CLOSE_SMB2;
+               cl.smb2.in.file.handle = dh;
+               status = smb2_close(tree1, &(cl.smb2));
+       }
+
+       smb2_deltree(tree1, BASEDIR);
+       return ret;
+}
+
+
+/*
+ * testing of rename with no delete access on parent dir
+ * this is the negative case of the test above: parent dir is opened
+ * without share_delete, so rename must fail
+ */
+
+static bool torture_smb2_rename_no_delete_access2(struct torture_context *torture,
+               struct smb2_tree *tree1)
+{
+       bool ret = true;
+       NTSTATUS status;
+       union smb_open io;
+       union smb_close cl;
+       union smb_setfileinfo sinfo;
+       struct smb2_handle fh, dh;
+
+       smb2_deltree(tree1, BASEDIR);
+       smb2_util_rmdir(tree1, BASEDIR);
+
+       torture_comment(torture, "Creating base directory\n");
+
+       smb2_util_mkdir(tree1, BASEDIR);
+
+       torture_comment(torture, "Opening parent directory\n");
+
+       ZERO_STRUCT(io.smb2);
+       io.generic.level = RAW_OPEN_SMB2;
+       io.smb2.in.create_flags = 0;
+       io.smb2.in.desired_access = SEC_STD_SYNCHRONIZE | SEC_STD_WRITE_DAC |
+               SEC_STD_READ_CONTROL | SEC_FILE_WRITE_ATTRIBUTE |
+               SEC_FILE_READ_ATTRIBUTE | SEC_FILE_EXECUTE | SEC_FILE_WRITE_EA |
+               SEC_FILE_READ_EA | SEC_FILE_APPEND_DATA | SEC_FILE_READ_DATA |
+               SEC_FILE_WRITE_DATA;
+       io.smb2.in.create_options = NTCREATEX_OPTIONS_DIRECTORY;
+       io.smb2.in.file_attributes = FILE_ATTRIBUTE_DIRECTORY;
+       io.smb2.in.share_access = 0;
+       io.smb2.in.alloc_size = 0;
+       io.smb2.in.create_disposition = NTCREATEX_DISP_OPEN;
+       io.smb2.in.impersonation_level = SMB2_IMPERSONATION_ANONYMOUS;
+       io.smb2.in.security_flags = 0;
+       io.smb2.in.fname = BASEDIR;
+
+       status = smb2_create(tree1, torture, &(io.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+       dh = io.smb2.out.file.handle;
+
+
+       torture_comment(torture, "Creating test file\n");
+
+       ZERO_STRUCT(io.smb2);
+       io.generic.level = RAW_OPEN_SMB2;
+       io.smb2.in.create_flags = 0;
+       io.smb2.in.desired_access = SEC_STD_SYNCHRONIZE | SEC_STD_WRITE_DAC |
+               SEC_STD_READ_CONTROL | SEC_STD_DELETE | SEC_FILE_WRITE_ATTRIBUTE |
+               SEC_FILE_READ_ATTRIBUTE | SEC_FILE_WRITE_EA | SEC_FILE_READ_EA |
+               SEC_FILE_APPEND_DATA | SEC_FILE_READ_DATA | SEC_FILE_WRITE_DATA;
+       io.smb2.in.create_options = NTCREATEX_OPTIONS_NON_DIRECTORY_FILE;
+       io.smb2.in.file_attributes = FILE_ATTRIBUTE_NORMAL;
+       io.smb2.in.share_access = 0;
+       io.smb2.in.alloc_size = 0;
+       io.smb2.in.create_disposition = NTCREATEX_DISP_CREATE;
+       io.smb2.in.impersonation_level = SMB2_IMPERSONATION_ANONYMOUS;
+       io.smb2.in.security_flags = 0;
+       io.smb2.in.fname = BASEDIR "\\file.txt";
+
+       status = smb2_create(tree1, torture, &(io.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+       fh = io.smb2.out.file.handle;
+
+       torture_comment(torture, "Renaming test file\n");
+
+       ZERO_STRUCT(sinfo);
+       sinfo.rename_information.level = RAW_SFILEINFO_RENAME_INFORMATION;
+       sinfo.rename_information.in.file.handle = fh;
+       sinfo.rename_information.in.overwrite = 0;
+       sinfo.rename_information.in.root_fid = 0;
+       sinfo.rename_information.in.new_name =
+               BASEDIR "\\newname.txt";
+       status = smb2_setinfo_file(tree1, &sinfo);
+       CHECK_STATUS(status, NT_STATUS_SHARING_VIOLATION);
+
+       torture_comment(torture, "Closing test file\n");
+
+       ZERO_STRUCT(cl.smb2);
+       cl.smb2.level = RAW_CLOSE_SMB2;
+       cl.smb2.in.file.handle = fh;
+       status = smb2_close(tree1, &(cl.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       ZERO_STRUCT(fh);
+
+       torture_comment(torture, "Closing directory\n");
+
+       ZERO_STRUCT(cl.smb2);
+       cl.smb2.level = RAW_CLOSE_SMB2;
+       cl.smb2.in.file.handle = dh;
+       status = smb2_close(tree1, &(cl.smb2));
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       ZERO_STRUCT(dh);
+
+
+done:
+
+       torture_comment(torture, "Cleaning up\n");
+
+       if (fh.data) {
+               ZERO_STRUCT(cl.smb2);
+               cl.smb2.level = RAW_CLOSE_SMB2;
+               cl.smb2.in.file.handle = fh;
+               status = smb2_close(tree1, &(cl.smb2));
+       }
+       if (dh.data) {
+               ZERO_STRUCT(cl.smb2);
+               cl.smb2.level = RAW_CLOSE_SMB2;
+               cl.smb2.in.file.handle = dh;
+               status = smb2_close(tree1, &(cl.smb2));
+       }
+
+       smb2_deltree(tree1, BASEDIR);
+       return ret;
+}
+
+/*
+   basic testing of SMB2 rename
+ */
+struct torture_suite *torture_smb2_rename_init(void)
+{
+       struct torture_suite *suite =
+               torture_suite_create(talloc_autofree_context(), "rename");
+
+       torture_suite_add_1smb2_test(suite, "simple",
+               torture_smb2_rename_simple);
+
+       torture_suite_add_1smb2_test(suite, "simple_nodelete)",
+               torture_smb2_rename_simple2);
+
+       torture_suite_add_1smb2_test(suite, "no_sharing",
+               torture_smb2_rename_no_sharemode);
+
+       torture_suite_add_1smb2_test(suite,
+               "share_delete_and_delete_access",
+               torture_smb2_rename_with_delete_access);
+
+       torture_suite_add_1smb2_test(suite,
+               "no_share_delete_but_delete_access",
+               torture_smb2_rename_with_delete_access2);
+
+       torture_suite_add_1smb2_test(suite,
+               "share_delete_no_delete_access",
+               torture_smb2_rename_no_delete_access);
+
+       torture_suite_add_1smb2_test(suite,
+               "no_share_delete_no_delete_access",
+               torture_smb2_rename_no_delete_access2);
+
+       suite->description = talloc_strdup(suite, "smb2.rename tests");
+
+       return suite;
+}
index 3bbad29d6b4d3f8d388d0ce28f5c045cd1f0ddb2..ef2f516d032e38e839febcf6347bd0dd63ba2c10 100644 (file)
@@ -158,6 +158,7 @@ NTSTATUS torture_smb2_init(void)
        torture_suite_add_suite(suite, torture_smb2_oplocks_init());
        torture_suite_add_suite(suite, torture_smb2_streams_init());
        torture_suite_add_suite(suite, torture_smb2_ioctl_init());
+       torture_suite_add_suite(suite, torture_smb2_rename_init());
        torture_suite_add_1smb2_test(suite, "bench-oplock", test_smb2_bench_oplock);
        torture_suite_add_1smb2_test(suite, "hold-oplock", test_smb2_hold_oplock);
 
index 81dc0e0d93b4c8570eaba63f74cd5acee9f8deff..416fd2700e774f374f5341c9eeb8a09ce018c514 100644 (file)
@@ -1,7 +1,7 @@
 #!/usr/bin/env python
 
 bld.SAMBA_MODULE('TORTURE_SMB2',
-       source='connect.c scan.c util.c getinfo.c setinfo.c lock.c notify.c smb2.c durable_open.c oplock.c dir.c lease.c create.c acls.c read.c compound.c streams.c ioctl.c',
+       source='connect.c scan.c util.c getinfo.c setinfo.c lock.c notify.c smb2.c durable_open.c oplock.c dir.c lease.c create.c acls.c read.c compound.c streams.c ioctl.c rename.c',
        subsystem='smbtorture',
        deps='LIBCLI_SMB2 POPT_CREDENTIALS torture NDR_IOCTL',
        internal_module=True,