summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authortrasz <trasz@FreeBSD.org>2010-12-12 13:04:30 +0000
committertrasz <trasz@FreeBSD.org>2010-12-12 13:04:30 +0000
commitdf80d2ec057cb6c459e80ab3fea64ca589a76c6e (patch)
tree4581f394a90ee068f4ea80015accefd2c08eda6f
parentbb9ca91194363731e3daf811eb010cbcbdda2c3f (diff)
downloadFreeBSD-src-df80d2ec057cb6c459e80ab3fea64ca589a76c6e.zip
FreeBSD-src-df80d2ec057cb6c459e80ab3fea64ca589a76c6e.tar.gz
Add regression test for new NFSv4 ACL semantics, verified with ZFSv28.
Note that to run it, you need not only ZFSv28, but also a modified setfacl(1), which is not in the tree yet.
-rw-r--r--tools/regression/acltools/tools-nfs4-psarc.test562
1 files changed, 562 insertions, 0 deletions
diff --git a/tools/regression/acltools/tools-nfs4-psarc.test b/tools/regression/acltools/tools-nfs4-psarc.test
new file mode 100644
index 0000000..e1e8ffc
--- /dev/null
+++ b/tools/regression/acltools/tools-nfs4-psarc.test
@@ -0,0 +1,562 @@
+# Copyright (c) 2008, 2009 Edward Tomasz NapieraƂa <trasz@FreeBSD.org>
+# All rights reserved.
+#
+# Redistribution and use in source and binary forms, with or without
+# modification, are permitted provided that the following conditions
+# are met:
+# 1. Redistributions of source code must retain the above copyright
+# notice, this list of conditions and the following disclaimer.
+# 2. Redistributions in binary form must reproduce the above copyright
+# notice, this list of conditions and the following disclaimer in the
+# documentation and/or other materials provided with the distribution.
+#
+# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+# ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+# SUCH DAMAGE.
+#
+# $FreeBSD$
+#
+
+# This is a tools-level test for NFSv4 ACL functionality with PSARC/2010/029
+# semantics. Run it as root using ACL-enabled kernel:
+#
+# /usr/src/tools/regression/acltools/run /usr/src/tools/regression/acltools/tools-nfs4-psarc.test
+#
+# WARNING: Creates files in unsafe way.
+
+$ whoami
+> root
+$ umask 022
+
+# Smoke test for getfacl(1).
+$ touch xxx
+$ getfacl xxx
+> # file: xxx
+> # owner: root
+> # group: wheel
+> owner@:rw-p--aARWcCos:------:allow
+> group@:r-----a-R-c--s:------:allow
+> everyone@:r-----a-R-c--s:------:allow
+
+$ getfacl -q xxx
+> owner@:rw-p--aARWcCos:------:allow
+> group@:r-----a-R-c--s:------:allow
+> everyone@:r-----a-R-c--s:------:allow
+
+# Check verbose mode formatting.
+$ getfacl -v xxx
+> # file: xxx
+> # owner: root
+> # group: wheel
+> owner@:read_data/write_data/append_data/read_attributes/write_attributes/read_xattr/write_xattr/read_acl/write_acl/write_owner/synchronize::allow
+> group@:read_data/read_attributes/read_xattr/read_acl/synchronize::allow
+> everyone@:read_data/read_attributes/read_xattr/read_acl/synchronize::allow
+
+# Test setfacl -a.
+$ setfacl -a2 u:0:write_acl:allow,g:1:read_acl:deny xxx
+$ getfacl -n xxx
+> # file: xxx
+> # owner: root
+> # group: wheel
+> owner@:rw-p--aARWcCos:------:allow
+> group@:r-----a-R-c--s:------:allow
+> user:0:-----------C--:------:allow
+> group:1:----------c---:------:deny
+> everyone@:r-----a-R-c--s:------:allow
+
+# Test user and group name resolving.
+$ rm xxx
+$ touch xxx
+$ setfacl -a2 u:root:write_acl:allow,g:daemon:read_acl:deny xxx
+$ getfacl xxx
+> # file: xxx
+> # owner: root
+> # group: wheel
+> owner@:rw-p--aARWcCos:------:allow
+> group@:r-----a-R-c--s:------:allow
+> user:root:-----------C--:------:allow
+> group:daemon:----------c---:------:deny
+> everyone@:r-----a-R-c--s:------:allow
+
+# Check whether ls correctly marks files with "+".
+$ ls -l xxx | cut -d' ' -f1
+> -rw-r--r--+
+
+# Test removing entries by number.
+$ setfacl -x 1 xxx
+$ getfacl -n xxx
+> # file: xxx
+> # owner: root
+> # group: wheel
+> owner@:rw-p--aARWcCos:------:allow
+> user:0:-----------C--:------:allow
+> group:1:----------c---:------:deny
+> everyone@:r-----a-R-c--s:------:allow
+
+# Test setfacl -m.
+$ setfacl -a0 everyone@:rwx:deny xxx
+$ setfacl -a0 everyone@:rwx:deny xxx
+$ setfacl -a0 everyone@:rwx:deny xxx
+$ setfacl -m everyone@::deny xxx
+$ getfacl -n xxx
+> # file: xxx
+> # owner: root
+> # group: wheel
+> everyone@:--------------:------:deny
+> everyone@:--------------:------:deny
+> everyone@:--------------:------:deny
+> owner@:rw-p--aARWcCos:------:allow
+> user:0:-----------C--:------:allow
+> group:1:----------c---:------:deny
+> everyone@:r-----a-R-c--s:------:allow
+
+# Test getfacl -i.
+$ getfacl -i xxx
+> # file: xxx
+> # owner: root
+> # group: wheel
+> everyone@:--------------:------:deny
+> everyone@:--------------:------:deny
+> everyone@:--------------:------:deny
+> owner@:rw-p--aARWcCos:------:allow
+> user:root:-----------C--:------:allow:0
+> group:daemon:----------c---:------:deny:1
+> everyone@:r-----a-R-c--s:------:allow
+
+# Make sure cp without any flags does not copy copy the ACL.
+$ cp xxx yyy
+$ ls -l yyy | cut -d' ' -f1
+> -rw-r--r--
+
+# Make sure it does with the "-p" flag.
+$ rm yyy
+$ cp -p xxx yyy
+$ getfacl -n yyy
+> # file: yyy
+> # owner: root
+> # group: wheel
+> everyone@:--------------:------:deny
+> everyone@:--------------:------:deny
+> everyone@:--------------:------:deny
+> owner@:rw-p--aARWcCos:------:allow
+> user:0:-----------C--:------:allow
+> group:1:----------c---:------:deny
+> everyone@:r-----a-R-c--s:------:allow
+
+$ rm yyy
+
+# Test removing entries by... by example?
+$ setfacl -x everyone@::deny xxx
+$ getfacl -n xxx
+> # file: xxx
+> # owner: root
+> # group: wheel
+> owner@:rw-p--aARWcCos:------:allow
+> user:0:-----------C--:------:allow
+> group:1:----------c---:------:deny
+> everyone@:r-----a-R-c--s:------:allow
+
+# Test setfacl -b.
+$ setfacl -b xxx
+$ getfacl -n xxx
+> # file: xxx
+> # owner: root
+> # group: wheel
+> owner@:rw-p--aARWcCos:------:allow
+> group@:r-----a-R-c--s:------:allow
+> everyone@:r-----a-R-c--s:------:allow
+
+$ ls -l xxx | cut -d' ' -f1
+> -rw-r--r--
+
+# Check setfacl(1) and getfacl(1) with multiple files.
+$ touch xxx yyy zzz
+
+$ ls -l xxx yyy zzz | cut -d' ' -f1
+> -rw-r--r--
+> -rw-r--r--
+> -rw-r--r--
+
+$ setfacl -m u:42:x:allow,g:43:w:allow nnn xxx yyy zzz
+> setfacl: nnn: stat() failed: No such file or directory
+
+$ ls -l nnn xxx yyy zzz | cut -d' ' -f1
+> ls: nnn: No such file or directory
+> -rw-r--r--+
+> -rw-r--r--+
+> -rw-r--r--+
+
+$ getfacl -nq nnn xxx yyy zzz
+> getfacl: nnn: stat() failed: No such file or directory
+> user:42:--x-----------:------:allow
+> group:43:-w------------:------:allow
+> owner@:rw-p--aARWcCos:------:allow
+> group@:r-----a-R-c--s:------:allow
+> everyone@:r-----a-R-c--s:------:allow
+>
+> user:42:--x-----------:------:allow
+> group:43:-w------------:------:allow
+> owner@:rw-p--aARWcCos:------:allow
+> group@:r-----a-R-c--s:------:allow
+> everyone@:r-----a-R-c--s:------:allow
+>
+> user:42:--x-----------:------:allow
+> group:43:-w------------:------:allow
+> owner@:rw-p--aARWcCos:------:allow
+> group@:r-----a-R-c--s:------:allow
+> everyone@:r-----a-R-c--s:------:allow
+
+$ setfacl -b nnn xxx yyy zzz
+> setfacl: nnn: stat() failed: No such file or directory
+
+$ ls -l nnn xxx yyy zzz | cut -d' ' -f1
+> ls: nnn: No such file or directory
+> -rw-r--r--
+> -rw-r--r--
+> -rw-r--r--
+
+$ rm xxx yyy zzz
+
+# Test applying mode to an ACL.
+$ touch xxx
+$ setfacl -a0 user:42:r:allow,user:43:w:deny,user:43:w:allow,user:44:x:allow -x everyone@::allow xxx
+$ chmod 600 xxx
+$ getfacl -n xxx
+> # file: xxx
+> # owner: root
+> # group: wheel
+> owner@:rw-p--aARWcCos:------:allow
+> group@:------a-R-c--s:------:allow
+> everyone@:------a-R-c--s:------:allow
+
+$ ls -l xxx | cut -d' ' -f1
+> -rw-------
+
+$ rm xxx
+$ touch xxx
+$ chown 42 xxx
+$ setfacl -a0 user:42:r:allow,user:43:w:deny,user:43:w:allow,user:44:x:allow xxx
+$ chmod 600 xxx
+$ getfacl -n xxx
+> # file: xxx
+> # owner: 42
+> # group: wheel
+> owner@:rw-p--aARWcCos:------:allow
+> group@:------a-R-c--s:------:allow
+> everyone@:------a-R-c--s:------:allow
+$ ls -l xxx | cut -d' ' -f1
+> -rw-------
+
+$ rm xxx
+$ touch xxx
+$ chown 43 xxx
+$ setfacl -a0 user:42:r:allow,user:43:w:deny,user:43:w:allow,user:44:x:allow xxx
+$ chmod 124 xxx
+$ getfacl -n xxx
+> # file: xxx
+> # owner: 43
+> # group: wheel
+> owner@:rw-p----------:------:deny
+> group@:r-------------:------:deny
+> owner@:--x---aARWcCos:------:allow
+> group@:-w-p--a-R-c--s:------:allow
+> everyone@:r-----a-R-c--s:------:allow
+$ ls -l xxx | cut -d' ' -f1
+> ---x-w-r--
+
+$ rm xxx
+$ touch xxx
+$ chown 43 xxx
+$ setfacl -a0 user:42:r:allow,user:43:w:deny,user:43:w:allow,user:44:x:allow xxx
+$ chmod 412 xxx
+$ getfacl -n xxx
+> # file: xxx
+> # owner: 43
+> # group: wheel
+> owner@:-wxp----------:------:deny
+> group@:-w-p----------:------:deny
+> owner@:r-----aARWcCos:------:allow
+> group@:--x---a-R-c--s:------:allow
+> everyone@:-w-p--a-R-c--s:------:allow
+$ ls -l xxx | cut -d' ' -f1
+> -r----x-w-
+
+$ mkdir ddd
+$ setfacl -a0 group:44:rwapd:allow ddd
+$ setfacl -a0 group:43:write_data/delete_child:d:deny,group@:ad:allow ddd
+$ setfacl -a0 user:42:rx:fi:allow,group:42:write_data/delete_child:d:allow ddd
+$ setfacl -m everyone@:-w-p--a-R-c--s:fi:allow ddd
+$ getfacl -n ddd
+> # file: ddd
+> # owner: root
+> # group: wheel
+> user:42:r-x-----------:f-i---:allow
+> group:42:-w--D---------:-d----:allow
+> group:43:-w--D---------:-d----:deny
+> group@:-----da-------:------:allow
+> group:44:rw-p-da-------:------:allow
+> owner@:rwxp--aARWcCos:------:allow
+> group@:r-x---a-R-c--s:------:allow
+> everyone@:-w-p--a-R-c--s:f-i---:allow
+
+$ chmod 777 ddd
+$ getfacl -n ddd
+> # file: ddd
+> # owner: root
+> # group: wheel
+> owner@:rwxp--aARWcCos:------:allow
+> group@:rwxp--a-R-c--s:------:allow
+> everyone@:rwxp--a-R-c--s:------:allow
+
+# Test applying ACL to mode.
+$ rmdir ddd
+$ mkdir ddd
+$ setfacl -a0 u:42:rwx:fi:allow ddd
+$ ls -ld ddd | cut -d' ' -f1
+> drwxr-xr-x+
+
+$ rmdir ddd
+$ mkdir ddd
+$ chmod 0 ddd
+$ setfacl -a0 owner@:r:allow,group@:w:deny,group@:wx:allow ddd
+$ ls -ld ddd | cut -d' ' -f1
+> dr----x---+
+
+$ rmdir ddd
+$ mkdir ddd
+$ chmod 0 ddd
+$ setfacl -a0 owner@:r:allow,group@:w:fi:deny,group@:wx:allow ddd
+$ ls -ld ddd | cut -d' ' -f1
+> dr---wx---+
+
+$ rmdir ddd
+$ mkdir ddd
+$ chmod 0 ddd
+$ setfacl -a0 owner@:r:allow,group:43:w:deny,group:43:wx:allow ddd
+$ ls -ld ddd | cut -d' ' -f1
+> dr--------+
+
+$ rmdir ddd
+$ mkdir ddd
+$ chmod 0 ddd
+$ setfacl -a0 owner@:r:allow,user:43:w:deny,user:43:wx:allow ddd
+$ ls -ld ddd | cut -d' ' -f1
+> dr--------+
+
+# Test inheritance.
+$ rmdir ddd
+$ mkdir ddd
+$ setfacl -a0 group:43:write_data/write_acl:fin:deny,u:43:rwxp:allow ddd
+$ setfacl -a0 user:42:rx:fi:allow,group:42:write_data/delete_child:dn:deny ddd
+$ setfacl -a0 user:42:write_acl/write_owner:fi:allow ddd
+$ setfacl -a0 group:41:read_data/read_attributes:dni:allow ddd
+$ setfacl -a0 user:41:write_data/write_attributes:fn:allow ddd
+$ getfacl -qn ddd
+> user:41:-w-----A------:f--n--:allow
+> group:41:r-----a-------:-din--:allow
+> user:42:-----------Co-:f-i---:allow
+> user:42:r-x-----------:f-i---:allow
+> group:42:-w--D---------:-d-n--:deny
+> group:43:-w---------C--:f-in--:deny
+> user:43:rwxp----------:------:allow
+> owner@:rwxp--aARWcCos:------:allow
+> group@:r-x---a-R-c--s:------:allow
+> everyone@:r-x---a-R-c--s:------:allow
+
+$ cd ddd
+$ touch xxx
+$ getfacl -qn xxx
+> user:41:--------------:------:allow
+> user:42:--------------:------:allow
+> user:42:r-------------:------:allow
+> group:43:-w---------C--:------:deny
+> owner@:rw-p--aARWcCos:------:allow
+> group@:r-----a-R-c--s:------:allow
+> everyone@:r-----a-R-c--s:------:allow
+
+$ rm xxx
+$ umask 077
+$ touch xxx
+$ getfacl -qn xxx
+> user:41:--------------:------:allow
+> user:42:--------------:------:allow
+> user:42:--------------:------:allow
+> group:43:-w---------C--:------:deny
+> owner@:rw-p--aARWcCos:------:allow
+> group@:------a-R-c--s:------:allow
+> everyone@:------a-R-c--s:------:allow
+
+$ rm xxx
+$ umask 770
+$ touch xxx
+$ getfacl -qn xxx
+> owner@:rw-p----------:------:deny
+> group@:rw-p----------:------:deny
+> user:41:--------------:------:allow
+> user:42:--------------:------:allow
+> user:42:--------------:------:allow
+> group:43:-w---------C--:------:deny
+> owner@:------aARWcCos:------:allow
+> group@:------a-R-c--s:------:allow
+> everyone@:rw-p--a-R-c--s:------:allow
+
+$ rm xxx
+$ umask 707
+$ touch xxx
+$ getfacl -qn xxx
+> owner@:rw-p----------:------:deny
+> user:41:-w------------:------:allow
+> user:42:--------------:------:allow
+> user:42:r-------------:------:allow
+> group:43:-w---------C--:------:deny
+> owner@:------aARWcCos:------:allow
+> group@:rw-p--a-R-c--s:------:allow
+> everyone@:------a-R-c--s:------:allow
+
+$ umask 077
+$ mkdir yyy
+$ getfacl -qn yyy
+> group:41:------a-------:------:allow
+> user:42:-----------Co-:f-i---:allow
+> user:42:r-x-----------:f-i---:allow
+> group:42:-w--D---------:------:deny
+> owner@:rwxp--aARWcCos:------:allow
+> group@:------a-R-c--s:------:allow
+> everyone@:------a-R-c--s:------:allow
+
+$ rmdir yyy
+$ umask 770
+$ mkdir yyy
+$ getfacl -qn yyy
+> owner@:rwxp----------:------:deny
+> group@:rwxp----------:------:deny
+> group:41:------a-------:------:allow
+> user:42:-----------Co-:f-i---:allow
+> user:42:r-x-----------:f-i---:allow
+> group:42:-w--D---------:------:deny
+> owner@:------aARWcCos:------:allow
+> group@:------a-R-c--s:------:allow
+> everyone@:rwxp--a-R-c--s:------:allow
+
+$ rmdir yyy
+$ umask 707
+$ mkdir yyy
+$ getfacl -qn yyy
+> owner@:rwxp----------:------:deny
+> group:41:r-----a-------:------:allow
+> user:42:-----------Co-:f-i---:allow
+> user:42:r-x-----------:f-i---:allow
+> group:42:-w--D---------:------:deny
+> owner@:------aARWcCos:------:allow
+> group@:rwxp--a-R-c--s:------:allow
+> everyone@:------a-R-c--s:------:allow
+
+# There is some complication regarding how write_acl and write_owner flags
+# get inherited. Make sure we got it right.
+$ setfacl -b .
+$ setfacl -a0 u:42:Co:f:allow .
+$ setfacl -a0 u:43:Co:d:allow .
+$ setfacl -a0 u:44:Co:fd:allow .
+$ setfacl -a0 u:45:Co:fi:allow .
+$ setfacl -a0 u:46:Co:di:allow .
+$ setfacl -a0 u:47:Co:fdi:allow .
+$ setfacl -a0 u:48:Co:fn:allow .
+$ setfacl -a0 u:49:Co:dn:allow .
+$ setfacl -a0 u:50:Co:fdn:allow .
+$ setfacl -a0 u:51:Co:fni:allow .
+$ setfacl -a0 u:52:Co:dni:allow .
+$ setfacl -a0 u:53:Co:fdni:allow .
+$ umask 022
+$ rm xxx
+$ touch xxx
+$ getfacl -nq xxx
+> user:53:--------------:------:allow
+> user:51:--------------:------:allow
+> user:50:--------------:------:allow
+> user:48:--------------:------:allow
+> user:47:--------------:------:allow
+> user:45:--------------:------:allow
+> user:44:--------------:------:allow
+> user:42:--------------:------:allow
+> owner@:rw-p--aARWcCos:------:allow
+> group@:r-----a-R-c--s:------:allow
+> everyone@:r-----a-R-c--s:------:allow
+
+$ rmdir yyy
+$ mkdir yyy
+$ getfacl -nq yyy
+> user:53:--------------:------:allow
+> user:52:--------------:------:allow
+> user:50:--------------:------:allow
+> user:49:--------------:------:allow
+> user:47:--------------:fd----:allow
+> user:46:--------------:-d----:allow
+> user:45:-----------Co-:f-i---:allow
+> user:44:--------------:fd----:allow
+> user:43:--------------:-d----:allow
+> user:42:-----------Co-:f-i---:allow
+> owner@:rwxp--aARWcCos:------:allow
+> group@:r-x---a-R-c--s:------:allow
+> everyone@:r-x---a-R-c--s:------:allow
+
+$ setfacl -b .
+$ setfacl -a0 u:42:Co:f:deny .
+$ setfacl -a0 u:43:Co:d:deny .
+$ setfacl -a0 u:44:Co:fd:deny .
+$ setfacl -a0 u:45:Co:fi:deny .
+$ setfacl -a0 u:46:Co:di:deny .
+$ setfacl -a0 u:47:Co:fdi:deny .
+$ setfacl -a0 u:48:Co:fn:deny .
+$ setfacl -a0 u:49:Co:dn:deny .
+$ setfacl -a0 u:50:Co:fdn:deny .
+$ setfacl -a0 u:51:Co:fni:deny .
+$ setfacl -a0 u:52:Co:dni:deny .
+$ setfacl -a0 u:53:Co:fdni:deny .
+$ umask 022
+$ rm xxx
+$ touch xxx
+$ getfacl -nq xxx
+> user:53:-----------Co-:------:deny
+> user:51:-----------Co-:------:deny
+> user:50:-----------Co-:------:deny
+> user:48:-----------Co-:------:deny
+> user:47:-----------Co-:------:deny
+> user:45:-----------Co-:------:deny
+> user:44:-----------Co-:------:deny
+> user:42:-----------Co-:------:deny
+> owner@:rw-p--aARWcCos:------:allow
+> group@:r-----a-R-c--s:------:allow
+> everyone@:r-----a-R-c--s:------:allow
+
+$ rmdir yyy
+$ mkdir yyy
+$ getfacl -nq yyy
+> user:53:-----------Co-:------:deny
+> user:52:-----------Co-:------:deny
+> user:50:-----------Co-:------:deny
+> user:49:-----------Co-:------:deny
+> user:47:-----------Co-:fd----:deny
+> user:46:-----------Co-:-d----:deny
+> user:45:-----------Co-:f-i---:deny
+> user:44:-----------Co-:fd----:deny
+> user:43:-----------Co-:-d----:deny
+> user:42:-----------Co-:f-i---:deny
+> owner@:rwxp--aARWcCos:------:allow
+> group@:r-x---a-R-c--s:------:allow
+> everyone@:r-x---a-R-c--s:------:allow
+
+$ rmdir yyy
+$ rm xxx
+$ cd ..
+$ rmdir ddd
+
+$ rm xxx
+
OpenPOWER on IntegriCloud