diff options
author | Andrew Tridgell <tridge@samba.org> | 2010-11-19 12:07:02 +1100 |
---|---|---|
committer | Andrew Tridgell <tridge@samba.org> | 2010-11-19 15:17:43 +1100 |
commit | 10c246567c002f5ae0206b44b0d240814a5eef6b (patch) | |
tree | 4aa0d8ed5f3fb8c3b1b78b5272a9355252f87ed4 /wintest/test-s4-howto.py | |
parent | 24e8bc544169eff6895d73045439ab32e7afa507 (diff) | |
download | samba-10c246567c002f5ae0206b44b0d240814a5eef6b.tar.gz samba-10c246567c002f5ae0206b44b0d240814a5eef6b.tar.xz samba-10c246567c002f5ae0206b44b0d240814a5eef6b.zip |
wintest: rename test-howto.py to test-s4-howto.py
ready for test-s3.py
Diffstat (limited to 'wintest/test-s4-howto.py')
-rwxr-xr-x | wintest/test-s4-howto.py | 618 |
1 files changed, 618 insertions, 0 deletions
diff --git a/wintest/test-s4-howto.py b/wintest/test-s4-howto.py new file mode 100755 index 00000000000..6afea1a89bb --- /dev/null +++ b/wintest/test-s4-howto.py @@ -0,0 +1,618 @@ +#!/usr/bin/env python + +'''automated testing of the steps of the Samba4 HOWTO''' + +import sys, os +import optparse +import wintest + +vars = {} + +def check_prerequesites(t): + t.info("Checking prerequesites") + t.setvar('HOSTNAME', t.cmd_output("hostname -s").strip()) + if os.getuid() != 0: + raise Exception("You must run this script as root") + t.cmd_contains("grep 127.0.0.1 /etc/resolv.conf", ["nameserver 127.0.0.1"]) + + +def build_s4(t): + '''build samba4''' + t.info('Building s4') + t.chdir('${SOURCETREE}/source4') + t.putenv('CC', 'ccache gcc') + t.run_cmd('make reconfigure || ./configure --enable-auto-reconfigure --enable-developer --prefix=${PREFIX} -C') + t.run_cmd('make -j') + t.run_cmd('rm -rf ${PREFIX}') + t.run_cmd('make -j install') + +def provision_s4(t, func_level="2008", interfaces=None): + '''provision s4 as a DC''' + t.info('Provisioning s4') + t.chdir('${PREFIX}') + t.run_cmd("rm -rf etc private") + t.run_cmd("find var -type f | xargs rm -f") + options=' --function-level=%s -d${DEBUGLEVEL}' % func_level + if interfaces: + options += ' --option=interfaces=%s' % interfaces + t.run_cmd('sbin/provision --realm=${LCREALM} --domain=${DOMAIN} --adminpass=${PASSWORD1} --server-role="domain controller"' + options) + t.run_cmd('bin/samba-tool newuser testallowed ${PASSWORD1}') + t.run_cmd('bin/samba-tool newuser testdenied ${PASSWORD1}') + t.run_cmd('bin/samba-tool group addmembers "Allowed RODC Password Replication Group" testallowed') + +def start_s4(t, interfaces=None): + t.info('Starting Samba4') + t.chdir("${PREFIX}") + t.run_cmd('killall -9 -q samba smbd nmbd winbindd', checkfail=False) + t.run_cmd(['sbin/samba', + '--option', 'panic action=gnome-terminal -e "gdb --pid %PID%"', + '--option', 'interfaces=%s' % interfaces]) + t.port_wait("localhost", 139) + +def test_smbclient(t): + t.info('Testing smbclient') + t.chdir('${PREFIX}') + t.cmd_contains("bin/smbclient --version", ["Version 4.0"]) + t.retry_cmd('bin/smbclient -L localhost -U%', ["netlogon", "sysvol", "IPC Service"]) + child = t.pexpect_spawn('bin/smbclient //localhost/netlogon -Uadministrator%${PASSWORD1}') + child.expect("smb:") + child.sendline("dir") + child.expect("blocks available") + child.sendline("mkdir testdir") + child.expect("smb:") + child.sendline("cd testdir") + child.expect('testdir') + child.sendline("cd ..") + child.sendline("rmdir testdir") + +def create_shares(t): + t.info("Adding test shares") + t.chdir('${PREFIX}') + f = open("etc/smb.conf", mode='a') + f.write(t.substitute(''' +[test] + path = ${PREFIX}/test + read only = no +[profiles] + path = ${PREFIX}/var/profiles + read only = no + ''')) + f.close() + t.run_cmd("mkdir -p test") + t.run_cmd("mkdir -p var/profiles") + + +def restart_bind(t): + t.info("Restarting bind9") + t.putenv('KEYTAB_FILE', '${PREFIX}/private/dns.keytab') + t.putenv('KRB5_KTNAME', '${PREFIX}/private/dns.keytab') + t.run_cmd('killall -9 -q named', checkfail=False) + t.port_wait("localhost", 53, wait_for_fail=True) + t.run_cmd("${BIND9}") + t.port_wait("localhost", 53) + t.run_cmd("${RNDC} flush") + t.run_cmd("${RNDC} freeze") + t.run_cmd("${RNDC} thaw") + +def test_dns(t): + t.info("Testing DNS") + t.cmd_contains("host -t SRV _ldap._tcp.${LCREALM}.", + ['_ldap._tcp.${LCREALM} has SRV record 0 100 389 ${HOSTNAME}.${LCREALM}']) + t.cmd_contains("host -t SRV _kerberos._udp.${LCREALM}.", + ['_kerberos._udp.${LCREALM} has SRV record 0 100 88 ${HOSTNAME}.${LCREALM}']) + t.cmd_contains("host -t A ${HOSTNAME}.${LCREALM}", + ['${HOSTNAME}.${LCREALM} has address']) + +def test_kerberos(t): + t.info("Testing kerberos") + t.run_cmd("kdestroy") + t.kinit("administrator@${REALM}", "${PASSWORD1}") + t.cmd_contains("klist -e", ["Ticket cache", "Default principal", "Valid starting"]) + + +def test_dyndns(t): + t.chdir('${PREFIX}') + t.run_cmd("sbin/samba_dnsupdate --fail-immediately") + t.run_cmd("${RNDC} flush") + + +def run_winjoin(t, vm): + t.setwinvars(vm) + + t.info("Joining a windows box to the domain") + t.vm_poweroff("${WIN_VM}", checkfail=False) + t.vm_restore("${WIN_VM}", "${WIN_SNAPSHOT}") + t.ping_wait("${WIN_HOSTNAME}") + child = t.open_telnet("${WIN_HOSTNAME}", "${WIN_USER}", "${WIN_PASS}", set_time=True) + child.sendline("netdom join ${WIN_HOSTNAME} /Domain:${LCREALM} /PasswordD:${PASSWORD1} /UserD:administrator") + child.expect("The command completed successfully") + child.sendline("shutdown /r -t 0") + t.port_wait("${WIN_HOSTNAME}", 139, wait_for_fail=True) + t.port_wait("${WIN_HOSTNAME}", 139) + + +def test_winjoin(t, vm): + t.setwinvars(vm) + t.info("Checking the windows join is OK") + t.chdir('${PREFIX}') + t.port_wait("${WIN_HOSTNAME}", 139) + t.retry_cmd('bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -Uadministrator@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"]) + t.cmd_contains("host -t A ${WIN_HOSTNAME}.${LCREALM}.", ['has address']) + t.cmd_contains('bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -Utestallowed@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"]) + t.cmd_contains('bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -k no -Utestallowed@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"]) + t.cmd_contains('bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -k yes -Utestallowed@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"]) + child = t.open_telnet("${WIN_HOSTNAME}", "${DOMAIN}\\administrator", "${PASSWORD1}") + child.sendline("net use t: \\\\${HOSTNAME}.${LCREALM}\\test") + child.expect("The command completed successfully") + t.vm_poweroff("${WIN_VM}") + + +def run_dcpromo(t, vm): + '''run a dcpromo on windows''' + t.setwinvars(vm) + + t.info("Joining a windows VM ${WIN_VM} to the domain as a DC using dcpromo") + t.vm_poweroff("${WIN_VM}", checkfail=False) + t.vm_restore("${WIN_VM}", "${WIN_SNAPSHOT}") + t.ping_wait("${WIN_HOSTNAME}") + child = t.open_telnet("${WIN_HOSTNAME}", "administrator", "${WIN_PASS}") + child.sendline("copy /Y con answers.txt") + child.sendline(''' +[DCINSTALL] +RebootOnSuccess=Yes +RebootOnCompletion=Yes +ReplicaOrNewDomain=Replica +ReplicaDomainDNSName=${LCREALM} +SiteName=Default-First-Site-Name +InstallDNS=No +ConfirmGc=Yes +CreateDNSDelegation=No +UserDomain=${LCREALM} +UserName=${LCREALM}\\administrator +Password=${PASSWORD1} +DatabasePath="C:\Windows\NTDS" +LogPath="C:\Windows\NTDS" +SYSVOLPath="C:\Windows\SYSVOL" +SafeModeAdminPassword=${PASSWORD1} + +''') + child.expect("copied.") + child.expect("C:") + child.expect("C:") + child.sendline("dcpromo /answer:answers.txt") + i = child.expect(["You must restart this computer", "failed", "C:"], timeout=120) + if i == 1: + raise Exception("dcpromo failed") + t.port_wait("${WIN_HOSTNAME}", 139, wait_for_fail=True) + t.port_wait("${WIN_HOSTNAME}", 139) + + +def test_dcpromo(t, vm): + t.setwinvars(vm) + t.info("Checking the dcpromo join is OK") + t.chdir('${PREFIX}') + t.port_wait("${WIN_HOSTNAME}", 139) + t.retry_cmd('bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -Uadministrator@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"]) + t.cmd_contains("host -t A ${WIN_HOSTNAME}.${LCREALM}.", ['has address']) + t.cmd_contains('bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -Utestallowed@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"]) + + t.cmd_contains("bin/samba-tool drs kcc ${HOSTNAME} -Uadministrator@${LCREALM}%${PASSWORD1}", ['Consistency check', 'successful']) + t.cmd_contains("bin/samba-tool drs kcc ${WIN_HOSTNAME} -Uadministrator@${LCREALM}%${PASSWORD1}", ['Consistency check', 'successful']) + + t.kinit("administrator@${REALM}", "${PASSWORD1}") + for nc in [ '${BASEDN}', 'CN=Configuration,${BASEDN}', 'CN=Schema,CN=Configuration,${BASEDN}' ]: + t.cmd_contains("bin/samba-tool drs replicate ${HOSTNAME} ${WIN_HOSTNAME} %s -k yes" % nc, ["was successful"]) + t.cmd_contains("bin/samba-tool drs replicate ${WIN_HOSTNAME} ${HOSTNAME} %s -k yes" % nc, ["was successful"]) + + t.cmd_contains("bin/samba-tool drs showrepl ${HOSTNAME} -k yes", + [ "INBOUND NEIGHBORS", + "${BASEDN}", + "Last attempt .* was successful", + "CN=Configuration,${BASEDN}", + "Last attempt .* was successful", + "CN=Configuration,${BASEDN}", # cope with either order + "Last attempt .* was successful", + "OUTBOUND NEIGHBORS", + "${BASEDN}", + "Last success", + "CN=Configuration,${BASEDN}", + "Last success", + "CN=Configuration,${BASEDN}", + "Last success"], + ordered=True, + regex=True) + + t.cmd_contains("bin/samba-tool drs showrepl ${WIN_HOSTNAME} -k yes", + [ "INBOUND NEIGHBORS", + "${BASEDN}", + "Last attempt .* was successful", + "CN=Configuration,${BASEDN}", + "Last attempt .* was successful", + "CN=Configuration,${BASEDN}", + "Last attempt .* was successful", + "OUTBOUND NEIGHBORS", + "${BASEDN}", + "Last success", + "CN=Configuration,${BASEDN}", + "Last success", + "CN=Configuration,${BASEDN}", + "Last success" ], + ordered=True, + regex=True) + + child = t.open_telnet("${WIN_HOSTNAME}", "${DOMAIN}\\administrator", "${PASSWORD1}", set_time=True) + child.sendline("net use t: \\\\${HOSTNAME}.${LCREALM}\\test") + child.expect("The command completed successfully") + + t.run_net_time(child) + + t.info("Checking if showrepl is happy") + child.sendline("repadmin /showrepl") + child.expect("${BASEDN}") + child.expect("was successful") + child.expect("CN=Configuration,${BASEDN}") + child.expect("was successful") + child.expect("CN=Schema,CN=Configuration,${BASEDN}") + child.expect("was successful") + + t.info("Checking if new users propogate to windows") + t.run_cmd('bin/samba-tool newuser test2 ${PASSWORD2}') + t.retry_cmd("bin/smbclient -L ${WIN_HOSTNAME} -Utest2%${PASSWORD2} -k no", ['Sharename', 'Remote IPC']) + t.retry_cmd("bin/smbclient -L ${WIN_HOSTNAME} -Utest2%${PASSWORD2} -k yes", ['Sharename', 'Remote IPC']) + + t.info("Checking if new users on windows propogate to samba") + child.sendline("net user test3 ${PASSWORD3} /add") + while True: + i = child.expect(["The command completed successfully", + "The directory service was unable to allocate a relative identifier"]) + if i == 0: + break + time.sleep(2) + + t.retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest3%${PASSWORD3} -k no", ['Sharename', 'IPC']) + t.retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest3%${PASSWORD3} -k yes", ['Sharename', 'IPC']) + + t.info("Checking propogation of user deletion") + t.run_cmd('bin/samba-tool user delete test2 -Uadministrator@${LCREALM}%${PASSWORD1}') + child.sendline("net user test3 /del") + child.expect("The command completed successfully") + + t.retry_cmd("bin/smbclient -L ${WIN_HOSTNAME} -Utest2%${PASSWORD2} -k no", ['LOGON_FAILURE']) + t.retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest3%${PASSWORD3} -k no", ['LOGON_FAILURE']) + t.retry_cmd("bin/smbclient -L ${WIN_HOSTNAME} -Utest2%${PASSWORD2} -k yes", ['LOGON_FAILURE']) + t.retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest3%${PASSWORD3} -k yes", ['LOGON_FAILURE']) + t.vm_poweroff("${WIN_VM}") + + +def run_dcpromo_rodc(t, vm): + t.setwinvars(vm) + t.info("Joining a w2k8 box to the domain as a RODC") + t.vm_poweroff("${WIN_VM}", checkfail=False) + t.vm_restore("${WIN_VM}", "${WIN_SNAPSHOT}") + t.ping_wait("${WIN_HOSTNAME}") + child = t.open_telnet("${WIN_HOSTNAME}", "administrator", "${WIN_PASS}") + child.sendline("copy /Y con answers.txt") + child.sendline(''' +[DCInstall] +ReplicaOrNewDomain=ReadOnlyReplica +ReplicaDomainDNSName=${LCREALM} +PasswordReplicationDenied="BUILTIN\Administrators" +PasswordReplicationDenied="BUILTIN\Server Operators" +PasswordReplicationDenied="BUILTIN\Backup Operators" +PasswordReplicationDenied="BUILTIN\Account Operators" +PasswordReplicationDenied="${DOMAIN}\Denied RODC Password Replication Group" +PasswordReplicationAllowed="${DOMAIN}\Allowed RODC Password Replication Group" +DelegatedAdmin="${DOMAIN}\\Administrator" +SiteName=Default-First-Site-Name +InstallDNS=No +ConfirmGc=Yes +CreateDNSDelegation=No +UserDomain=${LCREALM} +UserName=${LCREALM}\\administrator +Password=${PASSWORD1} +DatabasePath="C:\Windows\NTDS" +LogPath="C:\Windows\NTDS" +SYSVOLPath="C:\Windows\SYSVOL" +SafeModeAdminPassword=${PASSWORD1} +RebootOnCompletion=No + +''') + child.expect("copied.") + child.sendline("dcpromo /answer:answers.txt") + i = child.expect(["You must restart this computer", "failed"], timeout=120) + if i != 0: + raise Exception("dcpromo failed") + child.sendline("shutdown -r -t 0") + t.port_wait("${WIN_HOSTNAME}", 139, wait_for_fail=True) + t.port_wait("${WIN_HOSTNAME}", 139) + + + +def test_dcpromo_rodc(t, vm): + t.setwinvars(vm) + t.info("Checking the w2k8 RODC join is OK") + t.chdir('${PREFIX}') + t.port_wait("${WIN_HOSTNAME}", 139) + t.retry_cmd('bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -Uadministrator@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"]) + t.cmd_contains("host -t A ${WIN_HOSTNAME}.${LCREALM}.", ['has address']) + t.cmd_contains('bin/smbclient -L ${WIN_HOSTNAME}.${LCREALM} -Utestallowed@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"]) + child = t.open_telnet("${WIN_HOSTNAME}", "${DOMAIN}\\administrator", "${PASSWORD1}", set_time=True) + child.sendline("net use t: \\\\${HOSTNAME}.${LCREALM}\\test") + child.expect("The command completed successfully") + + t.info("Checking if showrepl is happy") + child.sendline("repadmin /showrepl") + child.expect("${BASEDN}") + child.expect("was successful") + child.expect("CN=Configuration,${BASEDN}") + child.expect("was successful") + child.expect("CN=Configuration,${BASEDN}") + child.expect("was successful") + + t.info("Checking if new users are available on windows") + t.run_cmd('bin/samba-tool newuser test2 ${PASSWORD2}') + t.retry_cmd("bin/smbclient -L ${WIN_HOSTNAME} -Utest2%${PASSWORD2} -k no", ['Sharename', 'Remote IPC']) + t.retry_cmd("bin/smbclient -L ${WIN_HOSTNAME} -Utest2%${PASSWORD2} -k yes", ['Sharename', 'Remote IPC']) + t.run_cmd('bin/samba-tool user delete test2 -Uadministrator@${LCREALM}%${PASSWORD1}') + t.retry_cmd("bin/smbclient -L ${WIN_HOSTNAME} -Utest2%${PASSWORD2}", ['LOGON_FAILURE']) + t.vm_poweroff("${WIN_VM}") + + +def join_as_dc(t, vm): + t.setwinvars(vm) + t.info("Joining ${WIN_VM} as a second DC using samba-tool join DC") + t.chdir('${PREFIX}') + t.run_cmd('killall -9 -q samba smbd nmbd winbindd', checkfail=False) + t.vm_poweroff("${WIN_VM}", checkfail=False) + t.vm_restore("${WIN_VM}", "${WIN_SNAPSHOT}") + t.run_cmd('${RNDC} flush') + t.run_cmd("rm -rf etc private") + t.open_telnet("${WIN_HOSTNAME}", "${WIN_DOMAIN}\\administrator", "${WIN_PASS}", set_time=True) + t.retry_cmd("bin/samba-tool drs showrepl ${WIN_HOSTNAME} -Uadministrator%${WIN_PASS}", ['INBOUND NEIGHBORS'] ) + t.run_cmd('bin/samba-tool join ${WIN_REALM} DC -Uadministrator%${WIN_PASS} -d${DEBUGLEVEL}') + t.run_cmd('bin/samba-tool drs kcc ${WIN_HOSTNAME} -Uadministrator@${WIN_REALM}%${WIN_PASS}') + + +def test_join_as_dc(t, vm): + t.setwinvars(vm) + t.info("Checking the DC join is OK") + t.chdir('${PREFIX}') + t.retry_cmd('bin/smbclient -L ${HOSTNAME}.${WIN_REALM} -Uadministrator@${WIN_REALM}%${WIN_PASS}', ["C$", "IPC$", "Sharename"]) + t.cmd_contains("host -t A ${HOSTNAME}.${WIN_REALM}.", ['has address']) + child = t.open_telnet("${WIN_HOSTNAME}", "${WIN_DOMAIN}\\administrator", "${WIN_PASS}", set_time=True) + + t.info("Forcing kcc runs, and replication") + t.run_cmd('bin/samba-tool drs kcc ${WIN_HOSTNAME} -Uadministrator@${WIN_REALM}%${WIN_PASS}') + t.run_cmd('bin/samba-tool drs kcc ${HOSTNAME} -Uadministrator@${WIN_REALM}%${WIN_PASS}') + + t.kinit("administrator@${WIN_REALM}", "${WIN_PASS}") + for nc in [ '${WIN_BASEDN}', 'CN=Configuration,${WIN_BASEDN}', 'CN=Schema,CN=Configuration,${WIN_BASEDN}' ]: + t.cmd_contains("bin/samba-tool drs replicate ${HOSTNAME} ${WIN_HOSTNAME} %s -k yes" % nc, ["was successful"]) + t.cmd_contains("bin/samba-tool drs replicate ${WIN_HOSTNAME} ${HOSTNAME} %s -k yes" % nc, ["was successful"]) + + child.sendline("net use t: \\\\${HOSTNAME}.${WIN_REALM}\\test") + child.expect("The command completed successfully") + + t.info("Checking if showrepl is happy") + child.sendline("repadmin /showrepl") + child.expect("${WIN_BASEDN}") + child.expect("was successful") + child.expect("CN=Configuration,${WIN_BASEDN}") + child.expect("was successful") + child.expect("CN=Configuration,${WIN_BASEDN}") + child.expect("was successful") + + t.info("Checking if new users propogate to windows") + t.run_cmd('bin/samba-tool newuser test2 ${PASSWORD2}') + t.retry_cmd("bin/smbclient -L ${WIN_HOSTNAME} -Utest2%${PASSWORD2} -k no", ['Sharename', 'Remote IPC']) + t.retry_cmd("bin/smbclient -L ${WIN_HOSTNAME} -Utest2%${PASSWORD2} -k yes", ['Sharename', 'Remote IPC']) + + t.info("Checking if new users on windows propogate to samba") + child.sendline("net user test3 ${PASSWORD3} /add") + child.expect("The command completed successfully") + t.retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest3%${PASSWORD3} -k no", ['Sharename', 'IPC']) + t.retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest3%${PASSWORD3} -k yes", ['Sharename', 'IPC']) + + t.info("Checking propogation of user deletion") + t.run_cmd('bin/samba-tool user delete test2 -Uadministrator@${WIN_REALM}%${WIN_PASS}') + child.sendline("net user test3 /del") + child.expect("The command completed successfully") + + t.retry_cmd("bin/smbclient -L ${WIN_HOSTNAME} -Utest2%${PASSWORD2} -k no", ['LOGON_FAILURE']) + t.retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest3%${PASSWORD3} -k no", ['LOGON_FAILURE']) + t.retry_cmd("bin/smbclient -L ${WIN_HOSTNAME} -Utest2%${PASSWORD2} -k yes", ['LOGON_FAILURE']) + t.retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest3%${PASSWORD3} -k yes", ['LOGON_FAILURE']) + t.vm_poweroff("${WIN_VM}") + + +def join_as_rodc(t, vm): + t.setwinvars(vm) + t.info("Joining ${WIN_VM} as a RODC using samba-tool join DC") + t.chdir('${PREFIX}') + t.run_cmd('killall -9 -q samba smbd nmbd winbindd', checkfail=False) + t.vm_poweroff("${WIN_VM}", checkfail=False) + t.vm_restore("${WIN_VM}", "${WIN_SNAPSHOT}") + t.run_cmd('${RNDC} flush') + t.run_cmd("rm -rf etc private") + t.open_telnet("${WIN_HOSTNAME}", "${WIN_DOMAIN}\\administrator", "${WIN_PASS}", set_time=True) + t.retry_cmd("bin/samba-tool drs showrepl ${WIN_HOSTNAME} -Uadministrator%${WIN_PASS}", ['INBOUND NEIGHBORS'] ) + t.run_cmd('bin/samba-tool join ${WIN_REALM} RODC -Uadministrator%${WIN_PASS} -d${DEBUGLEVEL}') + t.run_cmd('bin/samba-tool drs kcc ${WIN_HOSTNAME} -Uadministrator@${WIN_REALM}%${WIN_PASS}') + + +def test_join_as_rodc(t, vm): + t.setwinvars(vm) + t.info("Checking the RODC join is OK") + t.chdir('${PREFIX}') + t.retry_cmd('bin/smbclient -L ${HOSTNAME}.${WIN_REALM} -Uadministrator@${WIN_REALM}%${WIN_PASS}', ["C$", "IPC$", "Sharename"]) + t.cmd_contains("host -t A ${HOSTNAME}.${WIN_REALM}.", ['has address']) + child = t.open_telnet("${WIN_HOSTNAME}", "${WIN_DOMAIN}\\administrator", "${WIN_PASS}", set_time=True) + + t.info("Forcing kcc runs, and replication") + t.run_cmd('bin/samba-tool drs kcc ${HOSTNAME} -Uadministrator@${WIN_REALM}%${WIN_PASS}') + t.run_cmd('bin/samba-tool drs kcc ${WIN_HOSTNAME} -Uadministrator@${WIN_REALM}%${WIN_PASS}') + + t.kinit("administrator@${WIN_REALM}", "${WIN_PASS}") + for nc in [ '${WIN_BASEDN}', 'CN=Configuration,${WIN_BASEDN}', 'CN=Schema,CN=Configuration,${WIN_BASEDN}' ]: + t.cmd_contains("bin/samba-tool drs replicate ${HOSTNAME} ${WIN_HOSTNAME} %s -k yes" % nc, ["was successful"]) + + child.sendline("net use t: \\\\${HOSTNAME}.${WIN_REALM}\\test") + child.expect("The command completed successfully") + + t.info("Checking if showrepl is happy") + child.sendline("repadmin /showrepl") + child.expect("DSA invocationID") + + t.cmd_contains("bin/samba-tool drs showrepl ${WIN_HOSTNAME}.${WIN_REALM} -k yes", + [ "INBOUND NEIGHBORS", + "OUTBOUND NEIGHBORS", + "${WIN_BASEDN}", + "Last attempt .* was successful", + "CN=Configuration,${WIN_BASEDN}", + "Last attempt .* was successful", + "CN=Configuration,${WIN_BASEDN}", + "Last attempt .* was successful" ], + ordered=True, + regex=True) + + t.info("Checking if new users on windows propogate to samba") + child.sendline("net user test3 ${PASSWORD3} /add") + child.expect("The command completed successfully") + t.retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest3%${PASSWORD3} -k no", ['Sharename', 'IPC']) + t.retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest3%${PASSWORD3} -k yes", ['Sharename', 'IPC']) + + # should this work? + t.info("Checking if new users propogate to windows") + t.cmd_contains('bin/samba-tool newuser test2 ${PASSWORD2}', ['No RID Set DN']) + + t.info("Checking propogation of user deletion") + child.sendline("net user test3 /del") + child.expect("The command completed successfully") + + t.retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest3%${PASSWORD3} -k no", ['LOGON_FAILURE']) + t.retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest3%${PASSWORD3} -k yes", ['LOGON_FAILURE']) + t.vm_poweroff("${WIN_VM}") + + +def test_howto(t): + '''test the Samba4 howto''' + + check_prerequesites(t) + + # we don't need fsync safety in these tests + t.putenv('TDB_NO_FSYNC', '1') + + if not t.skip("build"): + build_s4(t) + + if not t.skip("provision"): + provision_s4(t) + + if not t.skip("create-shares"): + create_shares(t) + + if not t.skip("starts4"): + start_s4(t, interfaces='${INTERFACES}') + if not t.skip("smbclient"): + test_smbclient(t) + if not t.skip("startbind"): + restart_bind(t) + if not t.skip("dns"): + test_dns(t) + if not t.skip("kerberos"): + test_kerberos(t) + if not t.skip("dyndns"): + test_dyndns(t) + + if t.have_var('WINDOWS7_VM') and not t.skip("windows7"): + run_winjoin(t, "WINDOWS7") + test_winjoin(t, "WINDOWS7") + + if t.have_var('WINXP_VM') and not t.skip("winxp"): + run_winjoin(t, "WINXP") + test_winjoin(t, "WINXP") + + if t.have_var('W2K8R2C_VM') and not t.skip("dcpromo_rodc"): + t.info("Testing w2k8r2 RODC dcpromo") + run_dcpromo_rodc(t, "W2K8R2C") + test_dcpromo_rodc(t, "W2K8R2C") + + if t.have_var('W2K8R2B_VM') and not t.skip("dcpromo_w2k8r2"): + t.info("Testing w2k8r2 dcpromo") + run_dcpromo(t, "W2K8R2B") + test_dcpromo(t, "W2K8R2B") + + if t.have_var('W2K8B_VM') and not t.skip("dcpromo_w2k8"): + t.info("Testing w2k8 dcpromo") + run_dcpromo(t, "W2K8B") + test_dcpromo(t, "W2K8B") + + if t.have_var('W2K3B_VM') and not t.skip("dcpromo_w2k3"): + t.info("Testing w2k3 dcpromo") + t.info("Changing to 2003 functional level") + provision_s4(t, func_level='2003', interfaces='${INTERFACES}') + create_shares(t) + start_s4(t, interfaces='${INTERFACES}') + test_smbclient(t) + restart_bind(t) + test_dns(t) + test_kerberos(t) + test_dyndns(t) + run_dcpromo(t, "W2K3B") + test_dcpromo(t, "W2K3B") + + if t.have_var('W2K8R2A_VM') and not t.skip("join_w2k8r2"): + join_as_dc(t, "W2K8R2A") + create_shares(t) + start_s4(t, interfaces='${INTERFACES}') + test_dyndns(t) + test_join_as_dc(t, "W2K8R2A") + + if t.have_var('W2K8R2A_VM') and not t.skip("join_rodc"): + join_as_rodc(t, "W2K8R2A") + create_shares(t) + start_s4(t, interfaces='${INTERFACES}') + test_dyndns(t) + test_join_as_rodc(t, "W2K8R2A") + + if t.have_var('W2K3A_VM') and not t.skip("join_w2k3"): + join_as_dc(t, "W2K3A") + create_shares(t) + start_s4(t, interfaces='${INTERFACES}') + test_dyndns(t) + test_join_as_dc(t, "W2K3A") + + t.info("Howto test: All OK") + + +if __name__ == '__main__': + parser = optparse.OptionParser("test-howto.py") + parser.add_option("--conf", type='string', default='', help='config file') + parser.add_option("--skip", type='string', default='', help='list of steps to skip (comma separated)') + parser.add_option("--list", action='store_true', default=False, help='list the available steps') + parser.add_option("--rebase", action='store_true', default=False, help='do a git pull --rebase') + parser.add_option("--clean", action='store_true', default=False, help='clean the tree') + + opts, args = parser.parse_args() + + if not opts.conf: + t.info("Please specify a config file with --conf") + sys.exit(1) + + t = wintest.wintest() + t.load_config(opts.conf) + t.set_skip(opts.skip) + if opts.list: + t.list_steps_mode() + + if opts.rebase: + t.info('rebasing') + t.chdir('${SOURCETREE}') + t.run_cmd('git pull --rebase') + + if opts.clean: + t.info('rebasing') + t.chdir('${SOURCETREE}/source4') + t.run_cmd('rm -rf bin') + + test_howto(t) |