Mercurial > illumos > illumos-gate
diff usr/src/test/zfs-tests/tests/functional/acl/nontrivial/zfs_acl_chmod_xattr_001_pos.ksh @ 13899:0bcf78798346
3311 Want a test framework for arbitrary OS unit tests
3312 Add a testrunner package for OS unit tests
3313 Add a testrunner package to convert ZFS tests from STF
Reviewed by: Matt Ahrens <matthew.ahrens@delphix.com>
Reviewed by: Will Guyette <will.guyette@delphix.com>
Reviewed by: Dan Kimmel <dan.kimmel@delphix.com>
Reviewed by: Adam Leventhal <ahl@delphix.com>
Reviewed by: Henrik Mattson <henrik.mattson@delphix.com>
Reviewed by: Sonu Pillai <sonu.pillai@delphix.com>
Reviewed by: Christopher Siden <chris.siden@delphix.com>
Reviewed by: George Wilson <george.wilson@delphix.com>
Reviewed by: Richard Lowe <richlowe@richlowe.net>
Approved by: Richard Lowe <richlowe@richlowe.net>
author | John Wren Kennedy <john.kennedy@delphix.com> |
---|---|
date | Wed, 05 Dec 2012 22:04:50 -0500 |
parents | |
children |
line wrap: on
line diff
--- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/usr/src/test/zfs-tests/tests/functional/acl/nontrivial/zfs_acl_chmod_xattr_001_pos.ksh Wed Dec 05 22:04:50 2012 -0500 @@ -0,0 +1,238 @@ +#!/bin/ksh -p +# +# CDDL HEADER START +# +# The contents of this file are subject to the terms of the +# Common Development and Distribution License (the "License"). +# You may not use this file except in compliance with the License. +# +# You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE +# or http://www.opensolaris.org/os/licensing. +# See the License for the specific language governing permissions +# and limitations under the License. +# +# When distributing Covered Code, include this CDDL HEADER in each +# file and include the License file at usr/src/OPENSOLARIS.LICENSE. +# If applicable, add the following below this CDDL HEADER, with the +# fields enclosed by brackets "[]" replaced with your own identifying +# information: Portions Copyright [yyyy] [name of copyright owner] +# +# CDDL HEADER END +# + +# +# Copyright 2009 Sun Microsystems, Inc. All rights reserved. +# Use is subject to license terms. +# + +. $STF_SUITE/tests/functional/acl/acl_common.kshlib + +# +# DESCRIPTION: +# Verify that the read_xattr/write_xattr for +# owner/group/everyone are correct. +# +# STRATEGY: +# 1. Create file and directory in zfs filesystem +# 2. Set special read_xattr ACE to the file and directory +# 3. Try to list the extended attributes of the file and directory +# 4. Set special write_xattr ACE to the file and directory +# 5. Try to add new extended attributes to the file and directory +# 6. Verify above operation is successful. +# + +verify_runnable "both" + +function cleanup +{ + cd $cwd + + cleanup_test_files $TESTDIR/basedir + + if [[ -e $TESTDIR/$ARCHIVEFILE ]]; then + log_must $RM -f $TESTDIR/$ARCHIVEFILE + fi + + return 0 +} + +# owner@ group group_users other_users +set -A users \ + "root" "root" "$ZFS_ACL_ADMIN" "$ZFS_ACL_OTHER1" \ + "$ZFS_ACL_STAFF1" "$ZFS_ACL_STAFF_GROUP" "$ZFS_ACL_STAFF2" \ + "$ZFS_ACL_OTHER1" + +set -A a_access \ + "read_xattr:allow" \ + "read_xattr:deny" \ + "write_xattr:allow" \ + "write_xattr:deny" + +set -A a_flag "owner@" "group@" "everyone@" + +MYTESTFILE=/etc/passwd + +log_assert "Verify that the permission of read_xattr/write_xattr for " \ + "owner/group/everyone are correct." +log_onexit cleanup + +function operate_node #user node acl +{ + typeset user=$1 + typeset node=$2 + typeset acl_t=$3 + typeset ret + + if [[ $user == "" || $node == "" ]]; then + log_fail "user, node are not defined." + fi + + if [[ $acl_t == *read_xattr* ]]; then + chgusr_exec $user $RUNAT $node $LS > /dev/null 2>&1; ret=$? + elif [[ $acl_t == *write_xattr* ]]; then + chgusr_exec $user $RUNAT $node $CP $MYTESTFILE attr.1 ; ret=$? + + if [[ $ret -eq 0 ]]; then + log_must cleanup_test_files $TESTDIR/basedir + log_must $TAR xpf@ $TESTDIR/$ARCHIVEFILE + fi + fi + + return $ret +} + +function logname #acl_target user +{ + typeset acl_target=$1 + typeset user=$2 + typeset ret="log_mustnot" + + # To super user, read and write deny permission was override. + if [[ $user == root || $acl_target == *:allow ]] then + ret="log_must" + fi + + print $ret +} + +function check_chmod_results #node flag acl_target g_usr o_usr +{ + typeset node=$1 + typeset flag=$2 + typeset acl_target=$2:$3 + typeset g_usr=$4 + typeset o_usr=$5 + typeset log + + if [[ $flag == "owner@" || $flag == "everyone@" ]]; then + log=$(logname $acl_target $ZFS_ACL_CUR_USER) + $log operate_node $ZFS_ACL_CUR_USER $node $acl_target + fi + if [[ $flag == "group@" || $flag == "everyone@" ]]; then + log=$(logname $acl_target $g_usr) + $log operate_node $g_usr $node $acl_target + fi + if [[ $flag == "everyone@" ]]; then + log=$(logname $acl_target $o_usr) + $log operate_node $o_usr $node $acl_target + fi +} + +function test_chmod_basic_access #node g_usr o_usr +{ + typeset node=${1%/} + typeset g_usr=$2 + typeset o_usr=$3 + typeset flag acl_p acl_t parent + + parent=${node%/*} + + for flag in ${a_flag[@]}; do + for acl_t in "${a_access[@]}"; do + log_must usr_exec $CHMOD A+$flag:$acl_t $node + + log_must $TAR cpf@ $TESTDIR/$ARCHIVEFILE basedir + + check_chmod_results "$node" "$flag" \ + "$acl_t" "$g_usr" "$o_usr" + + log_must usr_exec $CHMOD A0- $node + done + done +} + +function setup_test_files #base_node user group +{ + typeset base_node=$1 + typeset user=$2 + typeset group=$3 + + cleanup_test_files $base_node + + log_must $MKDIR -p $base_node + log_must $CHOWN $user:$group $base_node + + log_must set_cur_usr $user + + # Prepare all files/sub-dirs for testing. + + file0=$base_node/testfile_rm + + dir0=$base_node/testdir_rm + + log_must usr_exec $TOUCH $file0 + log_must usr_exec $CHMOD 444 $file0 + + log_must usr_exec $RUNAT $file0 $CP $MYTESTFILE attr.0 + + log_must usr_exec $MKDIR -p $dir0 + log_must usr_exec $CHMOD 555 $dir0 + + log_must usr_exec $RUNAT $dir0 $CP $MYTESTFILE attr.0 + + log_must usr_exec $CHMOD 777 $base_node + return 0 +} + +function cleanup_test_files #base_node +{ + typeset base_node=$1 + + if [[ -d $base_node ]]; then + log_must $RM -rf $base_node + elif [[ -e $base_node ]]; then + log_must $RM -f $base_node + fi + + return 0 +} + +typeset cwd=$PWD +typeset ARCHIVEFILE=archive.tar + +typeset -i i=0 +typeset -i j=0 +typeset target + +while (( i < ${#users[@]} )); do + setup_test_files $TESTDIR/basedir ${users[i]} ${users[((i+1))]} + cd $TESTDIR + + j=0 + while (( j < 1 )); do + eval target=\$file$j + test_chmod_basic_access $target \ + "${users[((i+2))]}" "${users[((i+3))]}" + + eval target=\$dir$j + test_chmod_basic_access $target \ + "${users[((i+2))]}" "${users[((i+3))]}" + + (( j = j + 1 )) + done + + (( i += 4 )) +done + +log_pass "Verify that the permission of read_xattr/write_xattr for " \ + "owner/group/everyone are correct."