ctdb-scripts: Support storing statd-callout state in cluster filesystem
[samba4-gss.git] / source4 / torture / smb2 / delete-on-close.c
blob33561516fa0e8b16dbd503ede6a9a4bb502ece35
1 /*
2 Unix SMB/CIFS implementation.
4 test delete-on-close in more detail
6 Copyright (C) Richard Sharpe, 2013
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "includes.h"
23 #include "libcli/smb2/smb2.h"
24 #include "libcli/smb2/smb2_calls.h"
25 #include "torture/torture.h"
26 #include "torture/util.h"
27 #include "torture/smb2/proto.h"
28 #include "libcli/security/security.h"
29 #include "librpc/gen_ndr/ndr_security.h"
31 #define DNAME "test_dir"
32 #define FNAME DNAME "\\test_create.dat"
34 #define CHECK_STATUS(status, correct) do { \
35 if (!NT_STATUS_EQUAL(status, correct)) { \
36 torture_result(tctx, TORTURE_FAIL, \
37 "(%s) Incorrect status %s - should be %s\n", \
38 __location__, nt_errstr(status), nt_errstr(correct)); \
39 return false; \
40 }} while (0)
42 static bool create_dir(struct torture_context *tctx, struct smb2_tree *tree)
44 NTSTATUS status;
45 struct smb2_create io;
46 struct smb2_handle handle;
47 union smb_fileinfo q;
48 union smb_setfileinfo set;
49 struct security_descriptor *sd, *sd_orig;
50 const char *owner_sid;
51 uint32_t perms = 0;
53 torture_comment(tctx, "Creating Directory for testing: %s\n", DNAME);
55 ZERO_STRUCT(io);
56 io.level = RAW_OPEN_SMB2;
57 io.in.create_flags = 0;
58 io.in.desired_access =
59 SEC_STD_READ_CONTROL |
60 SEC_STD_WRITE_DAC |
61 SEC_STD_WRITE_OWNER;
62 io.in.create_options = NTCREATEX_OPTIONS_DIRECTORY;
63 io.in.file_attributes = FILE_ATTRIBUTE_DIRECTORY;
64 io.in.share_access =
65 NTCREATEX_SHARE_ACCESS_READ |
66 NTCREATEX_SHARE_ACCESS_WRITE;
67 io.in.alloc_size = 0;
68 io.in.create_disposition = NTCREATEX_DISP_OPEN_IF;
69 io.in.impersonation_level = NTCREATEX_IMPERSONATION_ANONYMOUS;
70 io.in.security_flags = 0;
71 io.in.fname = DNAME;
72 status = smb2_create(tree, tctx, &io);
73 CHECK_STATUS(status, NT_STATUS_OK);
74 handle = io.out.file.handle;
76 torture_comment(tctx, "get the original sd\n");
77 q.query_secdesc.level = RAW_FILEINFO_SEC_DESC;
78 q.query_secdesc.in.file.handle = handle;
79 q.query_secdesc.in.secinfo_flags = SECINFO_DACL | SECINFO_OWNER;
80 status = smb2_getinfo_file(tree, tctx, &q);
81 CHECK_STATUS(status, NT_STATUS_OK);
82 sd_orig = q.query_secdesc.out.sd;
84 owner_sid = dom_sid_string(tctx, sd_orig->owner_sid);
87 * We create an SD that allows us to do most things but we do not
88 * get DELETE and DELETE CHILD access!
91 perms = SEC_STD_SYNCHRONIZE | SEC_STD_WRITE_OWNER |
92 SEC_STD_WRITE_DAC | SEC_STD_READ_CONTROL |
93 SEC_DIR_WRITE_ATTRIBUTE | SEC_DIR_READ_ATTRIBUTE |
94 SEC_DIR_TRAVERSE | SEC_DIR_WRITE_EA |
95 SEC_FILE_READ_EA | SEC_FILE_APPEND_DATA |
96 SEC_FILE_WRITE_DATA | SEC_FILE_READ_DATA;
98 torture_comment(tctx, "Setting permissions on dir to 0x1e01bf\n");
99 sd = security_descriptor_dacl_create(tctx,
100 0, owner_sid, NULL,
101 owner_sid,
102 SEC_ACE_TYPE_ACCESS_ALLOWED,
103 perms,
104 SEC_ACE_FLAG_OBJECT_INHERIT,
105 NULL);
107 set.set_secdesc.level = RAW_SFILEINFO_SEC_DESC;
108 set.set_secdesc.in.file.handle = handle;
109 set.set_secdesc.in.secinfo_flags = SECINFO_DACL | SECINFO_OWNER;
110 set.set_secdesc.in.sd = sd;
112 status = smb2_setinfo_file(tree, &set);
113 CHECK_STATUS(status, NT_STATUS_OK);
115 status = smb2_util_close(tree, handle);
117 return true;
120 static bool set_dir_delete_perms(struct torture_context *tctx, struct smb2_tree *tree)
122 NTSTATUS status;
123 struct smb2_create io;
124 struct smb2_handle handle;
125 union smb_fileinfo q;
126 union smb_setfileinfo set;
127 struct security_descriptor *sd, *sd_orig;
128 const char *owner_sid;
129 uint32_t perms = 0;
131 torture_comment(tctx, "Opening Directory for setting new SD: %s\n", DNAME);
133 ZERO_STRUCT(io);
134 io.level = RAW_OPEN_SMB2;
135 io.in.create_flags = 0;
136 io.in.desired_access =
137 SEC_STD_READ_CONTROL |
138 SEC_STD_WRITE_DAC |
139 SEC_STD_WRITE_OWNER;
140 io.in.create_options = NTCREATEX_OPTIONS_DIRECTORY;
141 io.in.file_attributes = FILE_ATTRIBUTE_DIRECTORY;
142 io.in.share_access =
143 NTCREATEX_SHARE_ACCESS_READ |
144 NTCREATEX_SHARE_ACCESS_WRITE;
145 io.in.alloc_size = 0;
146 io.in.create_disposition = NTCREATEX_DISP_OPEN_IF;
147 io.in.impersonation_level = NTCREATEX_IMPERSONATION_ANONYMOUS;
148 io.in.security_flags = 0;
149 io.in.fname = DNAME;
150 status = smb2_create(tree, tctx, &io);
151 CHECK_STATUS(status, NT_STATUS_OK);
152 handle = io.out.file.handle;
154 torture_comment(tctx, "get the original sd\n");
155 q.query_secdesc.level = RAW_FILEINFO_SEC_DESC;
156 q.query_secdesc.in.file.handle = handle;
157 q.query_secdesc.in.secinfo_flags = SECINFO_DACL | SECINFO_OWNER;
158 status = smb2_getinfo_file(tree, tctx, &q);
159 CHECK_STATUS(status, NT_STATUS_OK);
160 sd_orig = q.query_secdesc.out.sd;
162 owner_sid = dom_sid_string(tctx, sd_orig->owner_sid);
165 * We create an SD that allows us to do most things including
166 * get DELETE and DELETE CHILD access!
169 perms = SEC_STD_SYNCHRONIZE | SEC_STD_WRITE_OWNER |
170 SEC_STD_WRITE_DAC | SEC_STD_READ_CONTROL |
171 SEC_DIR_WRITE_ATTRIBUTE | SEC_DIR_READ_ATTRIBUTE |
172 SEC_DIR_TRAVERSE | SEC_DIR_WRITE_EA |
173 SEC_FILE_READ_EA | SEC_FILE_APPEND_DATA |
174 SEC_DIR_DELETE_CHILD | SEC_STD_DELETE |
175 SEC_FILE_WRITE_DATA | SEC_FILE_READ_DATA;
177 torture_comment(tctx, "Setting permissions on dir to 0x%0x\n", perms);
178 sd = security_descriptor_dacl_create(tctx,
179 0, owner_sid, NULL,
180 owner_sid,
181 SEC_ACE_TYPE_ACCESS_ALLOWED,
182 perms,
184 NULL);
186 set.set_secdesc.level = RAW_SFILEINFO_SEC_DESC;
187 set.set_secdesc.in.file.handle = handle;
188 set.set_secdesc.in.secinfo_flags = SECINFO_DACL | SECINFO_OWNER;
189 set.set_secdesc.in.sd = sd;
191 status = smb2_setinfo_file(tree, &set);
192 CHECK_STATUS(status, NT_STATUS_OK);
194 status = smb2_util_close(tree, handle);
196 return true;
199 static bool test_doc_overwrite_if(struct torture_context *tctx, struct smb2_tree *tree)
201 struct smb2_create io;
202 NTSTATUS status;
203 uint32_t perms = 0;
205 /* File should not exist for this first test, so make sure */
206 set_dir_delete_perms(tctx, tree);
208 smb2_deltree(tree, DNAME);
210 create_dir(tctx, tree);
212 torture_comment(tctx, "Create file with DeleteOnClose on non-existent file (OVERWRITE_IF)\n");
213 torture_comment(tctx, "We expect NT_STATUS_OK\n");
215 perms = SEC_STD_SYNCHRONIZE | SEC_STD_READ_CONTROL | SEC_STD_DELETE |
216 SEC_DIR_WRITE_ATTRIBUTE | SEC_DIR_READ_ATTRIBUTE |
217 SEC_DIR_WRITE_EA | SEC_FILE_APPEND_DATA |
218 SEC_FILE_WRITE_DATA;
220 ZERO_STRUCT(io);
221 io.in.desired_access = perms;
222 io.in.file_attributes = 0;
223 io.in.create_disposition = NTCREATEX_DISP_OVERWRITE_IF;
224 io.in.share_access = NTCREATEX_SHARE_ACCESS_DELETE;
225 io.in.create_options = NTCREATEX_OPTIONS_DELETE_ON_CLOSE |
226 NTCREATEX_OPTIONS_NON_DIRECTORY_FILE;
227 io.in.fname = FNAME;
229 status = smb2_create(tree, tctx, &io);
230 CHECK_STATUS(status, NT_STATUS_OK);
232 status = smb2_util_close(tree, io.out.file.handle);
234 /* Check it was deleted */
235 ZERO_STRUCT(io);
236 io.in.desired_access = perms;
237 io.in.file_attributes = 0;
238 io.in.create_disposition = NTCREATEX_DISP_OPEN;
239 io.in.share_access = NTCREATEX_SHARE_ACCESS_DELETE;
240 io.in.create_options = 0;
241 io.in.fname = FNAME;
243 torture_comment(tctx, "Testing if the file was deleted when closed\n");
244 torture_comment(tctx, "We expect NT_STATUS_OBJECT_NAME_NOT_FOUND\n");
246 status = smb2_create(tree, tctx, &io);
247 CHECK_STATUS(status, NT_STATUS_OBJECT_NAME_NOT_FOUND);
249 return true;
252 static bool test_doc_overwrite_if_exist(struct torture_context *tctx, struct smb2_tree *tree)
254 struct smb2_create io;
255 NTSTATUS status;
256 uint32_t perms = 0;
258 /* File should not exist for this first test, so make sure */
259 /* And set the SEC Descriptor appropriately */
260 set_dir_delete_perms(tctx, tree);
262 smb2_deltree(tree, DNAME);
264 create_dir(tctx, tree);
266 torture_comment(tctx, "Create file with DeleteOnClose on existing file (OVERWRITE_IF)\n");
267 torture_comment(tctx, "We expect NT_STATUS_ACCESS_DENIED\n");
269 perms = SEC_STD_SYNCHRONIZE | SEC_STD_READ_CONTROL | SEC_STD_DELETE |
270 SEC_DIR_WRITE_ATTRIBUTE | SEC_DIR_READ_ATTRIBUTE |
271 SEC_DIR_WRITE_EA | SEC_FILE_APPEND_DATA |
272 SEC_FILE_WRITE_DATA;
274 /* First, create this file ... */
275 ZERO_STRUCT(io);
276 io.in.desired_access = perms;
277 io.in.file_attributes = 0;
278 io.in.create_disposition = NTCREATEX_DISP_OVERWRITE_IF;
279 io.in.share_access = NTCREATEX_SHARE_ACCESS_DELETE;
280 io.in.create_options = 0x0;
281 io.in.fname = FNAME;
283 status = smb2_create(tree, tctx, &io);
284 CHECK_STATUS(status, NT_STATUS_OK);
286 status = smb2_util_close(tree, io.out.file.handle);
288 /* Next, try to open it for Delete On Close */
289 ZERO_STRUCT(io);
290 io.in.desired_access = perms;
291 io.in.file_attributes = 0;
292 io.in.create_disposition = NTCREATEX_DISP_OVERWRITE_IF;
293 io.in.share_access = NTCREATEX_SHARE_ACCESS_DELETE;
294 io.in.create_options = NTCREATEX_OPTIONS_DELETE_ON_CLOSE |
295 NTCREATEX_OPTIONS_NON_DIRECTORY_FILE;
296 io.in.fname = FNAME;
298 status = smb2_create(tree, tctx, &io);
299 CHECK_STATUS(status, NT_STATUS_ACCESS_DENIED);
301 status = smb2_util_close(tree, io.out.file.handle);
303 return true;
306 static bool test_doc_create(struct torture_context *tctx, struct smb2_tree *tree)
308 struct smb2_create io;
309 NTSTATUS status;
310 uint32_t perms = 0;
312 /* File should not exist for this first test, so make sure */
313 set_dir_delete_perms(tctx, tree);
315 smb2_deltree(tree, DNAME);
317 create_dir(tctx, tree);
319 torture_comment(tctx, "Create file with DeleteOnClose on non-existent file (CREATE) \n");
320 torture_comment(tctx, "We expect NT_STATUS_OK\n");
322 perms = SEC_STD_SYNCHRONIZE | SEC_STD_READ_CONTROL | SEC_STD_DELETE |
323 SEC_DIR_WRITE_ATTRIBUTE | SEC_DIR_READ_ATTRIBUTE |
324 SEC_DIR_WRITE_EA | SEC_FILE_APPEND_DATA |
325 SEC_FILE_WRITE_DATA;
327 ZERO_STRUCT(io);
328 io.in.desired_access = perms;
329 io.in.file_attributes = 0;
330 io.in.create_disposition = NTCREATEX_DISP_CREATE;
331 io.in.share_access = NTCREATEX_SHARE_ACCESS_DELETE;
332 io.in.create_options = NTCREATEX_OPTIONS_DELETE_ON_CLOSE |
333 NTCREATEX_OPTIONS_NON_DIRECTORY_FILE;
334 io.in.fname = FNAME;
336 status = smb2_create(tree, tctx, &io);
337 CHECK_STATUS(status, NT_STATUS_OK);
339 status = smb2_util_close(tree, io.out.file.handle);
341 /* Check it was deleted */
342 ZERO_STRUCT(io);
343 io.in.desired_access = perms;
344 io.in.file_attributes = 0;
345 io.in.create_disposition = NTCREATEX_DISP_OPEN;
346 io.in.share_access = NTCREATEX_SHARE_ACCESS_DELETE;
347 io.in.create_options = 0;
348 io.in.fname = FNAME;
350 torture_comment(tctx, "Testing if the file was deleted when closed\n");
351 torture_comment(tctx, "We expect NT_STATUS_OBJECT_NAME_NOT_FOUND\n");
353 status = smb2_create(tree, tctx, &io);
354 CHECK_STATUS(status, NT_STATUS_OBJECT_NAME_NOT_FOUND);
356 return true;
359 static bool test_doc_create_exist(struct torture_context *tctx, struct smb2_tree *tree)
361 struct smb2_create io;
362 NTSTATUS status;
363 uint32_t perms = 0;
365 /* File should not exist for this first test, so make sure */
366 set_dir_delete_perms(tctx, tree);
368 smb2_deltree(tree, DNAME);
370 create_dir(tctx, tree);
372 torture_comment(tctx, "Create file with DeleteOnClose on non-existent file (CREATE) \n");
373 torture_comment(tctx, "We expect NT_STATUS_OBJECT_NAME_COLLISION\n");
375 perms = SEC_STD_SYNCHRONIZE | SEC_STD_READ_CONTROL | SEC_STD_DELETE |
376 SEC_DIR_WRITE_ATTRIBUTE | SEC_DIR_READ_ATTRIBUTE |
377 SEC_DIR_WRITE_EA | SEC_FILE_APPEND_DATA |
378 SEC_FILE_WRITE_DATA;
380 /* First, create the file */
381 ZERO_STRUCT(io);
382 io.in.desired_access = perms;
383 io.in.file_attributes = 0;
384 io.in.create_disposition = NTCREATEX_DISP_CREATE;
385 io.in.share_access = NTCREATEX_SHARE_ACCESS_DELETE;
386 io.in.create_options = 0x0;
387 io.in.fname = FNAME;
389 status = smb2_create(tree, tctx, &io);
390 CHECK_STATUS(status, NT_STATUS_OK);
392 status = smb2_util_close(tree, io.out.file.handle);
394 /* Next, try to open it for Delete on Close */
395 status = smb2_util_close(tree, io.out.file.handle);
396 ZERO_STRUCT(io);
397 io.in.desired_access = perms;
398 io.in.file_attributes = 0;
399 io.in.create_disposition = NTCREATEX_DISP_CREATE;
400 io.in.share_access = NTCREATEX_SHARE_ACCESS_DELETE;
401 io.in.create_options = NTCREATEX_OPTIONS_DELETE_ON_CLOSE |
402 NTCREATEX_OPTIONS_NON_DIRECTORY_FILE;
403 io.in.fname = FNAME;
405 status = smb2_create(tree, tctx, &io);
406 CHECK_STATUS(status, NT_STATUS_OBJECT_NAME_COLLISION);
408 status = smb2_util_close(tree, io.out.file.handle);
410 return true;
413 static bool test_doc_create_if(struct torture_context *tctx, struct smb2_tree *tree)
415 struct smb2_create io;
416 NTSTATUS status;
417 uint32_t perms = 0;
419 /* File should not exist for this first test, so make sure */
420 set_dir_delete_perms(tctx, tree);
422 smb2_deltree(tree, DNAME);
424 create_dir(tctx, tree);
426 torture_comment(tctx, "Create file with DeleteOnClose on non-existent file (OPEN_IF)\n");
427 torture_comment(tctx, "We expect NT_STATUS_OK\n");
429 perms = SEC_STD_SYNCHRONIZE | SEC_STD_READ_CONTROL | SEC_STD_DELETE |
430 SEC_DIR_WRITE_ATTRIBUTE | SEC_DIR_READ_ATTRIBUTE |
431 SEC_DIR_WRITE_EA | SEC_FILE_APPEND_DATA |
432 SEC_FILE_WRITE_DATA;
434 ZERO_STRUCT(io);
435 io.in.desired_access = perms;
436 io.in.file_attributes = 0;
437 io.in.create_disposition = NTCREATEX_DISP_OPEN_IF;
438 io.in.share_access = NTCREATEX_SHARE_ACCESS_DELETE;
439 io.in.create_options = NTCREATEX_OPTIONS_DELETE_ON_CLOSE |
440 NTCREATEX_OPTIONS_NON_DIRECTORY_FILE;
441 io.in.fname = FNAME;
443 status = smb2_create(tree, tctx, &io);
444 CHECK_STATUS(status, NT_STATUS_OK);
446 status = smb2_util_close(tree, io.out.file.handle);
448 /* Check it was deleted */
449 ZERO_STRUCT(io);
450 io.in.desired_access = perms;
451 io.in.file_attributes = 0;
452 io.in.create_disposition = NTCREATEX_DISP_OPEN;
453 io.in.share_access = NTCREATEX_SHARE_ACCESS_DELETE;
454 io.in.create_options = 0;
455 io.in.fname = FNAME;
457 torture_comment(tctx, "Testing if the file was deleted when closed\n");
458 torture_comment(tctx, "We expect NT_STATUS_OBJECT_NAME_NOT_FOUND\n");
460 status = smb2_create(tree, tctx, &io);
461 CHECK_STATUS(status, NT_STATUS_OBJECT_NAME_NOT_FOUND);
463 return true;
466 static bool test_doc_create_if_exist(struct torture_context *tctx, struct smb2_tree *tree)
468 struct smb2_create io;
469 NTSTATUS status;
470 uint32_t perms = 0;
472 /* File should not exist for this first test, so make sure */
473 set_dir_delete_perms(tctx, tree);
475 smb2_deltree(tree, DNAME);
477 create_dir(tctx, tree);
479 torture_comment(tctx, "Create file with DeleteOnClose on existing file (OPEN_IF)\n");
480 torture_comment(tctx, "We expect NT_STATUS_ACCESS_DENIED\n");
482 perms = SEC_STD_SYNCHRONIZE | SEC_STD_READ_CONTROL | SEC_STD_DELETE |
483 SEC_DIR_WRITE_ATTRIBUTE | SEC_DIR_READ_ATTRIBUTE |
484 SEC_DIR_WRITE_EA | SEC_FILE_APPEND_DATA |
485 SEC_FILE_WRITE_DATA;
487 /* Create the file first */
488 ZERO_STRUCT(io);
489 io.in.desired_access = perms;
490 io.in.file_attributes = 0;
491 io.in.create_disposition = NTCREATEX_DISP_OPEN_IF;
492 io.in.share_access = NTCREATEX_SHARE_ACCESS_DELETE;
493 io.in.create_options = 0x0;
494 io.in.fname = FNAME;
496 status = smb2_create(tree, tctx, &io);
497 CHECK_STATUS(status, NT_STATUS_OK);
499 status = smb2_util_close(tree, io.out.file.handle);
501 /* Now try to create it for delete on close */
502 ZERO_STRUCT(io);
503 io.in.desired_access = 0x130196;
504 io.in.file_attributes = 0;
505 io.in.create_disposition = NTCREATEX_DISP_OPEN_IF;
506 io.in.share_access = NTCREATEX_SHARE_ACCESS_DELETE;
507 io.in.create_options = NTCREATEX_OPTIONS_DELETE_ON_CLOSE |
508 NTCREATEX_OPTIONS_NON_DIRECTORY_FILE;
509 io.in.fname = FNAME;
511 status = smb2_create(tree, tctx, &io);
512 CHECK_STATUS(status, NT_STATUS_ACCESS_DENIED);
514 status = smb2_util_close(tree, io.out.file.handle);
516 return true;
519 static bool test_doc_find_and_set_doc(struct torture_context *tctx, struct smb2_tree *tree)
521 struct smb2_handle dir_handle;
522 struct smb2_find find;
523 NTSTATUS status;
524 union smb_search_data *d;
525 union smb_setfileinfo sfinfo;
526 unsigned int count;
528 /* File should not exist for this first test, so make sure */
529 set_dir_delete_perms(tctx, tree);
531 smb2_deltree(tree, DNAME);
533 torture_comment(tctx, "FIND and delete directory\n");
534 torture_comment(tctx, "We expect NT_STATUS_OK\n");
536 /* create and open the directory first*/
537 status = torture_smb2_testdir(tree, DNAME, &dir_handle);
538 CHECK_STATUS(status, NT_STATUS_OK);
540 /* list directory */
541 ZERO_STRUCT(find);
542 find.in.file.handle = dir_handle;
543 find.in.pattern = "*";
544 find.in.continue_flags = SMB2_CONTINUE_FLAG_SINGLE;
545 find.in.max_response_size = 0x100;
546 find.in.level = SMB2_FIND_BOTH_DIRECTORY_INFO;
548 /* start enumeration on directory */
549 status = smb2_find_level(tree, tree, &find, &count, &d);
550 CHECK_STATUS(status, NT_STATUS_OK);
552 /* set delete-on-close */
553 ZERO_STRUCT(sfinfo);
554 sfinfo.generic.level = RAW_SFILEINFO_DISPOSITION_INFORMATION;
555 sfinfo.disposition_info.in.delete_on_close = 1;
556 sfinfo.generic.in.file.handle = dir_handle;
557 status = smb2_setinfo_file(tree, &sfinfo);
558 CHECK_STATUS(status, NT_STATUS_OK);
560 /* close directory */
561 status = smb2_util_close(tree, dir_handle);
562 CHECK_STATUS(status, NT_STATUS_OK);
563 return true;
566 static bool test_doc_read_only(struct torture_context *tctx,
567 struct smb2_tree *tree)
569 struct smb2_handle dir_handle;
570 union smb_setfileinfo sfinfo = {{0}};
571 struct smb2_create create = {0};
572 struct smb2_close close = {0};
573 NTSTATUS status, expected_status;
574 bool ret = true, delete_readonly;
577 * Allow testing of the Samba 'delete readonly' option.
579 delete_readonly = torture_setting_bool(tctx, "delete_readonly", false);
580 expected_status = delete_readonly ?
581 NT_STATUS_OK : NT_STATUS_CANNOT_DELETE;
583 /* File should not exist for this first test, so make sure */
584 set_dir_delete_perms(tctx, tree);
586 smb2_deltree(tree, DNAME);
588 status = torture_smb2_testdir(tree, DNAME, &dir_handle);
589 torture_assert_ntstatus_ok_goto(tctx, status, ret, done,
590 "CREATE directory failed\n");
592 create = (struct smb2_create) {0};
593 create.in.desired_access = SEC_RIGHTS_DIR_ALL;
594 create.in.create_options = NTCREATEX_OPTIONS_NON_DIRECTORY_FILE |
595 NTCREATEX_OPTIONS_DELETE_ON_CLOSE;
596 create.in.file_attributes = FILE_ATTRIBUTE_READONLY;
597 create.in.share_access = NTCREATEX_SHARE_ACCESS_READ |
598 NTCREATEX_SHARE_ACCESS_WRITE |
599 NTCREATEX_SHARE_ACCESS_DELETE;
600 create.in.create_disposition = NTCREATEX_DISP_CREATE;
601 create.in.fname = FNAME;
602 status = smb2_create(tree, tctx, &create);
603 torture_assert_ntstatus_equal_goto(tctx, status, expected_status, ret,
604 done, "Unexpected status for CREATE "
605 "of new file.\n");
607 if (delete_readonly) {
608 close.in.file.handle = create.out.file.handle;
609 status = smb2_close(tree, &close);
610 torture_assert_ntstatus_ok_goto(tctx, status, ret, done,
611 "CLOSE of READONLY file "
612 "failed.\n");
615 torture_comment(tctx, "Creating file with READ_ONLY attribute.\n");
617 create = (struct smb2_create) {0};
618 create.in.desired_access = SEC_RIGHTS_DIR_ALL;
619 create.in.create_options = NTCREATEX_OPTIONS_NON_DIRECTORY_FILE;
620 create.in.file_attributes = FILE_ATTRIBUTE_READONLY;
621 create.in.share_access = NTCREATEX_SHARE_ACCESS_READ |
622 NTCREATEX_SHARE_ACCESS_WRITE |
623 NTCREATEX_SHARE_ACCESS_DELETE;
624 create.in.create_disposition = NTCREATEX_DISP_CREATE;
625 create.in.fname = FNAME;
626 status = smb2_create(tree, tctx, &create);
627 torture_assert_ntstatus_ok_goto(tctx, status, ret, done,
628 "CREATE of READONLY file failed.\n");
630 close.in.file.handle = create.out.file.handle;
631 status = smb2_close(tree, &close);
632 torture_assert_ntstatus_ok_goto(tctx, status, ret, done,
633 "CLOSE of READONLY file failed.\n");
635 torture_comment(tctx, "Testing CREATE with DELETE_ON_CLOSE on "
636 "READ_ONLY attribute file.\n");
638 create = (struct smb2_create) {0};
639 create.in.desired_access = SEC_RIGHTS_FILE_READ | SEC_STD_DELETE;
640 create.in.create_options = NTCREATEX_OPTIONS_DELETE_ON_CLOSE;
641 create.in.file_attributes = 0;
642 create.in.share_access = NTCREATEX_SHARE_ACCESS_READ |
643 NTCREATEX_SHARE_ACCESS_WRITE |
644 NTCREATEX_SHARE_ACCESS_DELETE;
645 create.in.create_disposition = NTCREATEX_DISP_OPEN;
646 create.in.fname = FNAME;
647 status = smb2_create(tree, tctx, &create);
648 torture_assert_ntstatus_equal_goto(tctx, status,
649 expected_status, ret, done,
650 "CREATE returned unexpected "
651 "status.\n");
653 torture_comment(tctx, "Testing setting DELETE_ON_CLOSE disposition on "
654 " file with READONLY attribute.\n");
656 create = (struct smb2_create) {0};
657 create.in.desired_access = SEC_RIGHTS_FILE_READ | SEC_STD_DELETE;;
658 create.in.create_options = 0;
659 create.in.file_attributes = 0;
660 create.in.share_access = NTCREATEX_SHARE_ACCESS_READ |
661 NTCREATEX_SHARE_ACCESS_WRITE |
662 NTCREATEX_SHARE_ACCESS_DELETE;
663 create.in.create_disposition = NTCREATEX_DISP_OPEN;
664 create.in.fname = FNAME;
665 status = smb2_create(tree, tctx, &create);
666 torture_assert_ntstatus_ok_goto(tctx, status, ret, done,
667 "Opening file failed.\n");
669 sfinfo.disposition_info.in.delete_on_close = 1;
670 sfinfo.generic.level = RAW_SFILEINFO_DISPOSITION_INFORMATION;
671 sfinfo.generic.in.file.handle = create.out.file.handle;
673 status = smb2_setinfo_file(tree, &sfinfo);
674 torture_assert_ntstatus_equal(tctx, status, expected_status,
675 "Set DELETE_ON_CLOSE disposition "
676 "returned un expected status.\n");
678 status = smb2_util_close(tree, create.out.file.handle);
679 torture_assert_ntstatus_ok_goto(tctx, status, ret, done,
680 "CLOSE failed\n");
682 done:
683 smb2_deltree(tree, DNAME);
684 return ret;
688 * This is a regression test for
689 * https://bugzilla.samba.org/show_bug.cgi?id=14427
691 * It's not really a delete-on-close specific test.
693 static bool test_doc_bug14427(struct torture_context *tctx, struct smb2_tree *tree1)
695 struct smb2_tree *tree2 = NULL;
696 NTSTATUS status;
697 char fname[256];
698 bool ret = false;
699 bool ok;
701 /* Add some random component to the file name. */
702 snprintf(fname, sizeof(fname), "doc_bug14427_%s.dat",
703 generate_random_str(tctx, 8));
705 ok = torture_smb2_tree_connect(tctx, tree1->session, tctx, &tree2);
706 torture_assert_goto(tctx, ok, ret, done,
707 "torture_smb2_tree_connect() failed.\n");
709 status = torture_setup_simple_file(tctx, tree1, fname);
710 torture_assert_ntstatus_ok_goto(tctx, status, ret, done,
711 "torture_setup_simple_file() failed on tree1.\n");
713 status = smb2_util_unlink(tree2, fname);
714 torture_assert_ntstatus_ok_goto(tctx, status, ret, done,
715 "smb2_util_unlink() failed on tree2.\n");
716 TALLOC_FREE(tree2);
717 ret = true;
718 done:
719 if (tree2 != NULL) {
720 TALLOC_FREE(tree2);
721 smb2_util_unlink(tree1, fname);
724 TALLOC_FREE(tree1);
725 return ret;
729 * Extreme testing of Delete On Close and permissions
731 struct torture_suite *torture_smb2_doc_init(TALLOC_CTX *ctx)
733 struct torture_suite *suite = torture_suite_create(ctx, "delete-on-close-perms");
735 torture_suite_add_1smb2_test(suite, "OVERWRITE_IF", test_doc_overwrite_if);
736 torture_suite_add_1smb2_test(suite, "OVERWRITE_IF Existing", test_doc_overwrite_if_exist);
737 torture_suite_add_1smb2_test(suite, "CREATE", test_doc_create);
738 torture_suite_add_1smb2_test(suite, "CREATE Existing", test_doc_create_exist);
739 torture_suite_add_1smb2_test(suite, "CREATE_IF", test_doc_create_if);
740 torture_suite_add_1smb2_test(suite, "CREATE_IF Existing", test_doc_create_if_exist);
741 torture_suite_add_1smb2_test(suite, "FIND_and_set_DOC", test_doc_find_and_set_doc);
742 torture_suite_add_1smb2_test(suite, "READONLY", test_doc_read_only);
743 torture_suite_add_1smb2_test(suite, "BUG14427", test_doc_bug14427);
745 suite->description = talloc_strdup(suite, "SMB2-Delete-on-Close-Perms tests");
747 return suite;