ctdb-scripts: Support storing statd-callout state in cluster filesystem
[samba4-gss.git] / source4 / torture / rpc / eventlog.c
blob87dc6a2cd314e108d454d15e763ccff49ee390cb
1 /*
2 Unix SMB/CIFS implementation.
3 test suite for eventlog rpc operations
5 Copyright (C) Tim Potter 2003,2005
6 Copyright (C) Jelmer Vernooij 2004
7 Copyright (C) Guenther Deschner 2009
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 #include "includes.h"
24 #include "librpc/gen_ndr/ndr_eventlog.h"
25 #include "librpc/gen_ndr/ndr_eventlog_c.h"
26 #include "torture/rpc/torture_rpc.h"
27 #include "param/param.h"
29 #define TEST_BACKUP_NAME "samrtorturetest"
31 static void init_lsa_String(struct lsa_String *name, const char *s)
33 name->string = s;
34 name->length = 2*strlen_m(s);
35 name->size = name->length;
38 static bool get_policy_handle(struct torture_context *tctx,
39 struct dcerpc_binding_handle *b,
40 struct policy_handle *handle)
42 struct eventlog_OpenEventLogW r;
43 struct eventlog_OpenUnknown0 unknown0;
44 struct lsa_String logname, servername;
46 unknown0.unknown0 = 0x005c;
47 unknown0.unknown1 = 0x0001;
49 r.in.unknown0 = &unknown0;
50 init_lsa_String(&logname, "dns server");
51 init_lsa_String(&servername, NULL);
52 r.in.logname = &logname;
53 r.in.servername = &servername;
54 r.in.major_version = 0x00000001;
55 r.in.minor_version = 0x00000001;
56 r.out.handle = handle;
58 torture_assert_ntstatus_ok(tctx,
59 dcerpc_eventlog_OpenEventLogW_r(b, tctx, &r),
60 "OpenEventLog failed");
62 torture_assert_ntstatus_ok(tctx, r.out.result, "OpenEventLog failed");
64 return true;
69 static bool test_GetNumRecords(struct torture_context *tctx, struct dcerpc_pipe *p)
71 struct eventlog_GetNumRecords r;
72 struct eventlog_CloseEventLog cr;
73 struct policy_handle handle;
74 uint32_t number = 0;
75 struct dcerpc_binding_handle *b = p->binding_handle;
77 if (!get_policy_handle(tctx, b, &handle))
78 return false;
80 ZERO_STRUCT(r);
81 r.in.handle = &handle;
82 r.out.number = &number;
84 torture_assert_ntstatus_ok(tctx,
85 dcerpc_eventlog_GetNumRecords_r(b, tctx, &r),
86 "GetNumRecords failed");
87 torture_assert_ntstatus_ok(tctx, r.out.result,
88 "GetNumRecords failed");
89 torture_comment(tctx, "%d records\n", *r.out.number);
91 cr.in.handle = cr.out.handle = &handle;
93 torture_assert_ntstatus_ok(tctx,
94 dcerpc_eventlog_CloseEventLog_r(b, tctx, &cr),
95 "CloseEventLog failed");
96 torture_assert_ntstatus_ok(tctx, cr.out.result,
97 "CloseEventLog failed");
98 return true;
101 static bool test_ReadEventLog(struct torture_context *tctx,
102 struct dcerpc_pipe *p)
104 NTSTATUS status;
105 struct eventlog_ReadEventLogW r;
106 struct eventlog_CloseEventLog cr;
107 struct policy_handle handle;
108 struct dcerpc_binding_handle *b = p->binding_handle;
110 uint32_t sent_size = 0;
111 uint32_t real_size = 0;
113 if (!get_policy_handle(tctx, b, &handle))
114 return false;
116 ZERO_STRUCT(r);
117 r.in.offset = 0;
118 r.in.handle = &handle;
119 r.in.flags = 0;
120 r.out.data = NULL;
121 r.out.sent_size = &sent_size;
122 r.out.real_size = &real_size;
124 torture_assert_ntstatus_ok(tctx, dcerpc_eventlog_ReadEventLogW_r(b, tctx, &r),
125 "ReadEventLog failed");
127 torture_assert_ntstatus_equal(tctx, r.out.result, NT_STATUS_INVALID_PARAMETER,
128 "ReadEventLog failed");
130 while (1) {
131 struct EVENTLOGRECORD rec;
132 enum ndr_err_code ndr_err;
133 uint32_t size = 0;
134 uint32_t pos = 0;
136 /* Read first for number of bytes in record */
138 r.in.number_of_bytes = 0;
139 r.in.flags = EVENTLOG_BACKWARDS_READ|EVENTLOG_SEQUENTIAL_READ;
140 r.out.data = NULL;
141 r.out.sent_size = &sent_size;
142 r.out.real_size = &real_size;
144 torture_assert_ntstatus_ok(tctx, dcerpc_eventlog_ReadEventLogW_r(b, tctx, &r),
145 "ReadEventLogW failed");
147 if (NT_STATUS_EQUAL(r.out.result, NT_STATUS_END_OF_FILE)) {
148 /* FIXME: still need to decode then */
149 break;
152 torture_assert_ntstatus_equal(tctx, r.out.result, NT_STATUS_BUFFER_TOO_SMALL,
153 "ReadEventLog failed");
155 /* Now read the actual record */
157 r.in.number_of_bytes = *r.out.real_size;
158 r.out.data = talloc_array(tctx, uint8_t, r.in.number_of_bytes);
160 torture_assert_ntstatus_ok(tctx, dcerpc_eventlog_ReadEventLogW_r(b, tctx, &r),
161 "ReadEventLogW failed");
163 torture_assert_ntstatus_ok(tctx, r.out.result, "ReadEventLog failed");
165 /* Decode a user-marshalled record */
166 size = IVAL(r.out.data, pos);
168 while (size > 0) {
169 DATA_BLOB blob = data_blob_const(
170 r.out.data + pos, size);
171 dump_data(0, blob.data, blob.length);
173 ndr_err = ndr_pull_struct_blob_all(&blob, tctx, &rec,
174 (ndr_pull_flags_fn_t)ndr_pull_EVENTLOGRECORD);
175 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
176 status = ndr_map_error2ntstatus(ndr_err);
177 torture_assert_ntstatus_ok(tctx, status,
178 "ReadEventLog failed parsing event log record");
181 NDR_PRINT_DEBUG(EVENTLOGRECORD, &rec);
183 pos += size;
185 if (pos + 4 > *r.out.sent_size) {
186 break;
189 size = IVAL(r.out.data, pos);
192 torture_assert_ntstatus_ok(tctx, r.out.result,
193 "ReadEventLog failed parsing event log record");
195 r.in.offset++;
198 cr.in.handle = cr.out.handle = &handle;
200 torture_assert_ntstatus_ok(tctx,
201 dcerpc_eventlog_CloseEventLog_r(b, tctx, &cr),
202 "CloseEventLog failed");
203 torture_assert_ntstatus_ok(tctx, cr.out.result,
204 "CloseEventLog failed");
206 return true;
209 static bool test_ReportEventLog(struct torture_context *tctx,
210 struct dcerpc_pipe *p)
212 struct eventlog_ReportEventW r;
213 struct eventlog_CloseEventLog cr;
214 struct policy_handle handle;
215 struct dcerpc_binding_handle *b = p->binding_handle;
217 uint32_t record_number = 0;
218 time_t time_written = 0;
219 struct lsa_String servername, *strings;
221 if (!get_policy_handle(tctx, b, &handle))
222 return false;
224 init_lsa_String(&servername, NULL);
226 strings = talloc_array(tctx, struct lsa_String, 1);
227 init_lsa_String(&strings[0], "Currently tortured by samba 4");
229 ZERO_STRUCT(r);
231 r.in.handle = &handle;
232 r.in.timestamp = time(NULL);
233 r.in.event_type = EVENTLOG_INFORMATION_TYPE;
234 r.in.event_category = 0;
235 r.in.event_id = 0;
236 r.in.num_of_strings = 1;
237 r.in.data_size = 0;
238 r.in.servername = &servername;
239 r.in.user_sid = NULL;
240 r.in.strings = &strings;
241 r.in.data = NULL;
242 r.in.flags = 0;
243 r.in.record_number = r.out.record_number = &record_number;
244 r.in.time_written = r.out.time_written = &time_written;
246 torture_assert_ntstatus_ok(tctx,
247 dcerpc_eventlog_ReportEventW_r(b, tctx, &r),
248 "ReportEventW failed");
250 torture_assert_ntstatus_ok(tctx, r.out.result, "ReportEventW failed");
252 cr.in.handle = cr.out.handle = &handle;
254 torture_assert_ntstatus_ok(tctx,
255 dcerpc_eventlog_CloseEventLog_r(b, tctx, &cr),
256 "CloseEventLog failed");
257 torture_assert_ntstatus_ok(tctx, cr.out.result,
258 "CloseEventLog failed");
260 return true;
263 static bool test_FlushEventLog(struct torture_context *tctx,
264 struct dcerpc_pipe *p)
266 struct eventlog_FlushEventLog r;
267 struct eventlog_CloseEventLog cr;
268 struct policy_handle handle;
269 struct dcerpc_binding_handle *b = p->binding_handle;
271 if (!get_policy_handle(tctx, b, &handle))
272 return false;
274 r.in.handle = &handle;
276 /* Huh? Does this RPC always return access denied? */
277 torture_assert_ntstatus_ok(tctx,
278 dcerpc_eventlog_FlushEventLog_r(b, tctx, &r),
279 "FlushEventLog failed");
281 torture_assert_ntstatus_equal(tctx,
282 r.out.result,
283 NT_STATUS_ACCESS_DENIED,
284 "FlushEventLog failed");
286 cr.in.handle = cr.out.handle = &handle;
288 torture_assert_ntstatus_ok(tctx,
289 dcerpc_eventlog_CloseEventLog_r(b, tctx, &cr),
290 "CloseEventLog failed");
291 torture_assert_ntstatus_ok(tctx, cr.out.result,
292 "CloseEventLog failed");
294 return true;
297 static bool test_ClearEventLog(struct torture_context *tctx,
298 struct dcerpc_pipe *p)
300 struct eventlog_ClearEventLogW r;
301 struct eventlog_CloseEventLog cr;
302 struct policy_handle handle;
303 struct dcerpc_binding_handle *b = p->binding_handle;
305 if (!get_policy_handle(tctx, b, &handle))
306 return false;
308 r.in.handle = &handle;
309 r.in.backupfile = NULL;
311 torture_assert_ntstatus_ok(tctx,
312 dcerpc_eventlog_ClearEventLogW_r(b, tctx, &r),
313 "ClearEventLog failed");
314 torture_assert_ntstatus_ok(tctx, r.out.result,
315 "ClearEventLog failed");
317 cr.in.handle = cr.out.handle = &handle;
319 torture_assert_ntstatus_ok(tctx,
320 dcerpc_eventlog_CloseEventLog_r(b, tctx, &cr),
321 "CloseEventLog failed");
322 torture_assert_ntstatus_ok(tctx, cr.out.result,
323 "CloseEventLog failed");
325 return true;
328 static bool test_GetLogInformation(struct torture_context *tctx,
329 struct dcerpc_pipe *p)
331 struct eventlog_GetLogInformation r;
332 struct eventlog_CloseEventLog cr;
333 struct policy_handle handle;
334 uint32_t bytes_needed = 0;
335 struct dcerpc_binding_handle *b = p->binding_handle;
337 if (!get_policy_handle(tctx, b, &handle))
338 return false;
340 r.in.handle = &handle;
341 r.in.level = 1;
342 r.in.buf_size = 0;
343 r.out.buffer = NULL;
344 r.out.bytes_needed = &bytes_needed;
346 torture_assert_ntstatus_ok(tctx, dcerpc_eventlog_GetLogInformation_r(b, tctx, &r),
347 "GetLogInformation failed");
349 torture_assert_ntstatus_equal(tctx, r.out.result, NT_STATUS_INVALID_LEVEL,
350 "GetLogInformation failed");
352 r.in.level = 0;
354 torture_assert_ntstatus_ok(tctx, dcerpc_eventlog_GetLogInformation_r(b, tctx, &r),
355 "GetLogInformation failed");
357 torture_assert_ntstatus_equal(tctx, r.out.result, NT_STATUS_BUFFER_TOO_SMALL,
358 "GetLogInformation failed");
360 r.in.buf_size = bytes_needed;
361 r.out.buffer = talloc_array(tctx, uint8_t, bytes_needed);
363 torture_assert_ntstatus_ok(tctx, dcerpc_eventlog_GetLogInformation_r(b, tctx, &r),
364 "GetLogInformation failed");
366 torture_assert_ntstatus_ok(tctx, r.out.result, "GetLogInformation failed");
368 cr.in.handle = cr.out.handle = &handle;
370 torture_assert_ntstatus_ok(tctx,
371 dcerpc_eventlog_CloseEventLog_r(b, tctx, &cr),
372 "CloseEventLog failed");
373 torture_assert_ntstatus_ok(tctx, cr.out.result,
374 "CloseEventLog failed");
376 return true;
380 static bool test_OpenEventLog(struct torture_context *tctx,
381 struct dcerpc_pipe *p)
383 struct policy_handle handle;
384 struct eventlog_CloseEventLog cr;
385 struct dcerpc_binding_handle *b = p->binding_handle;
387 if (!get_policy_handle(tctx, b, &handle))
388 return false;
390 cr.in.handle = cr.out.handle = &handle;
392 torture_assert_ntstatus_ok(tctx,
393 dcerpc_eventlog_CloseEventLog_r(b, tctx, &cr),
394 "CloseEventLog failed");
395 torture_assert_ntstatus_ok(tctx, cr.out.result,
396 "CloseEventLog failed");
398 return true;
401 static bool test_BackupLog(struct torture_context *tctx,
402 struct dcerpc_pipe *p)
404 struct policy_handle handle, backup_handle;
405 struct eventlog_BackupEventLogW r;
406 struct eventlog_OpenBackupEventLogW br;
407 struct eventlog_CloseEventLog cr;
408 const char *tmp;
409 struct lsa_String backup_filename;
410 struct eventlog_OpenUnknown0 unknown0;
411 struct dcerpc_binding_handle *b = p->binding_handle;
413 if (torture_setting_bool(tctx, "samba3", false)) {
414 torture_skip(tctx, "skipping BackupLog test against samba");
417 if (!get_policy_handle(tctx, b, &handle))
418 return false;
420 tmp = talloc_asprintf(tctx, "C:\\%s", TEST_BACKUP_NAME);
421 init_lsa_String(&backup_filename, tmp);
423 r.in.handle = &handle;
424 r.in.backup_filename = &backup_filename;
426 torture_assert_ntstatus_ok(tctx, dcerpc_eventlog_BackupEventLogW_r(b, tctx, &r),
427 "BackupEventLogW failed");
428 torture_assert_ntstatus_equal(tctx, r.out.result,
429 NT_STATUS_OBJECT_PATH_SYNTAX_BAD, "BackupEventLogW failed");
431 tmp = talloc_asprintf(tctx, "\\??\\C:\\%s", TEST_BACKUP_NAME);
432 init_lsa_String(&backup_filename, tmp);
434 r.in.handle = &handle;
435 r.in.backup_filename = &backup_filename;
437 torture_assert_ntstatus_ok(tctx, dcerpc_eventlog_BackupEventLogW_r(b, tctx, &r),
438 "BackupEventLogW failed");
439 torture_assert_ntstatus_ok(tctx, r.out.result, "BackupEventLogW failed");
441 torture_assert_ntstatus_ok(tctx, dcerpc_eventlog_BackupEventLogW_r(b, tctx, &r),
442 "BackupEventLogW failed");
443 torture_assert_ntstatus_equal(tctx, r.out.result,
444 NT_STATUS_OBJECT_NAME_COLLISION, "BackupEventLogW failed");
446 cr.in.handle = cr.out.handle = &handle;
448 torture_assert_ntstatus_ok(tctx,
449 dcerpc_eventlog_CloseEventLog_r(b, tctx, &cr),
450 "BackupLog failed");
451 torture_assert_ntstatus_ok(tctx, cr.out.result,
452 "BackupLog failed");
454 unknown0.unknown0 = 0x005c;
455 unknown0.unknown1 = 0x0001;
457 br.in.unknown0 = &unknown0;
458 br.in.backup_logname = &backup_filename;
459 br.in.major_version = 1;
460 br.in.minor_version = 1;
461 br.out.handle = &backup_handle;
463 torture_assert_ntstatus_ok(tctx, dcerpc_eventlog_OpenBackupEventLogW_r(b, tctx, &br),
464 "OpenBackupEventLogW failed");
466 torture_assert_ntstatus_ok(tctx, br.out.result, "OpenBackupEventLogW failed");
468 cr.in.handle = cr.out.handle = &backup_handle;
470 torture_assert_ntstatus_ok(tctx,
471 dcerpc_eventlog_CloseEventLog_r(b, tctx, &cr),
472 "CloseEventLog failed");
473 torture_assert_ntstatus_ok(tctx, cr.out.result,
474 "CloseEventLog failed");
476 return true;
479 struct torture_suite *torture_rpc_eventlog(TALLOC_CTX *mem_ctx)
481 struct torture_suite *suite;
482 struct torture_rpc_tcase *tcase;
483 struct torture_test *test;
485 suite = torture_suite_create(mem_ctx, "eventlog");
486 tcase = torture_suite_add_rpc_iface_tcase(suite, "eventlog",
487 &ndr_table_eventlog);
489 torture_rpc_tcase_add_test(tcase, "OpenEventLog", test_OpenEventLog);
490 test = torture_rpc_tcase_add_test(tcase, "ClearEventLog",
491 test_ClearEventLog);
492 test->dangerous = true;
493 torture_rpc_tcase_add_test(tcase, "GetNumRecords", test_GetNumRecords);
494 torture_rpc_tcase_add_test(tcase, "ReadEventLog", test_ReadEventLog);
495 torture_rpc_tcase_add_test(tcase, "ReportEventLog", test_ReportEventLog);
496 torture_rpc_tcase_add_test(tcase, "FlushEventLog", test_FlushEventLog);
497 torture_rpc_tcase_add_test(tcase, "GetLogIntormation", test_GetLogInformation);
498 torture_rpc_tcase_add_test(tcase, "BackupLog", test_BackupLog);
500 return suite;