summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorTim Potter <tpot@samba.org>2005-08-06 00:58:06 +0000
committerGerald (Jerry) Carter <jerry@samba.org>2007-10-10 13:31:25 -0500
commitf18657aa59749fe85bfe1cc4fc2a49db2685eea6 (patch)
treead3f394776d728106432c7fee35d31775e586c2a
parent865319a0ec76ce9281ce141487bd926d5480830f (diff)
downloadsamba-f18657aa59749fe85bfe1cc4fc2a49db2685eea6.tar.gz
samba-f18657aa59749fe85bfe1cc4fc2a49db2685eea6.tar.bz2
samba-f18657aa59749fe85bfe1cc4fc2a49db2685eea6.zip
r9156: Add IDL and test for FlushEventLog() but it always seems to return
NT_STATUS_ACCESS_DENIED. (This used to be commit f18d1f539e4fd434dfc519e45f4c356c5cd4d73a)
-rw-r--r--source4/librpc/idl/eventlog.idl4
-rw-r--r--source4/torture/rpc/eventlog.c50
2 files changed, 43 insertions, 11 deletions
diff --git a/source4/librpc/idl/eventlog.idl b/source4/librpc/idl/eventlog.idl
index ab0f2a1ff0..0d34579327 100644
--- a/source4/librpc/idl/eventlog.idl
+++ b/source4/librpc/idl/eventlog.idl
@@ -172,5 +172,7 @@
/*****************/
/* Function 0x17 */
- NTSTATUS eventlog_FlushEventLog();
+ NTSTATUS eventlog_FlushEventLog(
+ [in,ref] policy_handle *handle
+ );
}
diff --git a/source4/torture/rpc/eventlog.c b/source4/torture/rpc/eventlog.c
index 69ed683bc4..5ce0652729 100644
--- a/source4/torture/rpc/eventlog.c
+++ b/source4/torture/rpc/eventlog.c
@@ -31,7 +31,8 @@ static void init_lsa_String(struct lsa_String *name, const char *s)
name->size = name->length;
}
-static BOOL test_GetNumRecords(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle)
+static BOOL test_GetNumRecords(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
+ struct policy_handle *handle)
{
NTSTATUS status;
struct eventlog_GetNumRecords r;
@@ -52,7 +53,8 @@ static BOOL test_GetNumRecords(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struc
return True;
}
-static BOOL test_ReadEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t offset)
+static BOOL test_ReadEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
+ struct policy_handle *handle, uint32_t offset)
{
NTSTATUS status;
struct eventlog_ReadEventLogW r;
@@ -91,7 +93,7 @@ static BOOL test_ReadEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct
}
static BOOL test_CloseEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
- struct policy_handle *handle)
+ struct policy_handle *handle)
{
NTSTATUS status;
struct eventlog_CloseEventLog r;
@@ -101,6 +103,7 @@ static BOOL test_CloseEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
printf("Testing CloseEventLog\n");
status = dcerpc_eventlog_CloseEventLog(p, mem_ctx, &r);
+
if (!NT_STATUS_IS_OK(status)) {
printf("CloseEventLog failed - %s\n", nt_errstr(status));
return False;
@@ -109,6 +112,28 @@ static BOOL test_CloseEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
return True;
}
+static BOOL test_FlushEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
+ struct policy_handle *handle)
+{
+ NTSTATUS status;
+ struct eventlog_FlushEventLog r;
+
+ r.in.handle = handle;
+
+ printf("Testing FlushEventLog\n");
+
+ status = dcerpc_eventlog_FlushEventLog(p, mem_ctx, &r);
+
+ /* Huh? Does this RPC always return access denied? */
+
+ if (!NT_STATUS_EQUAL(status, NT_STATUS_ACCESS_DENIED)) {
+ printf("FlushEventLog failed - %s\n", nt_errstr(status));
+ return False;
+ }
+
+ return True;
+}
+
static BOOL test_ClearEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
struct policy_handle *handle)
{
@@ -121,6 +146,7 @@ static BOOL test_ClearEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
printf("Testing ClearEventLog\n");
status = dcerpc_eventlog_ClearEventLogW(p, mem_ctx, &r);
+
if (!NT_STATUS_IS_OK(status)) {
printf("ClearEventLog failed - %s\n", nt_errstr(status));
return False;
@@ -129,7 +155,8 @@ static BOOL test_ClearEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
return True;
}
-static BOOL test_OpenEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle)
+static BOOL test_OpenEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
+ struct policy_handle *handle)
{
NTSTATUS status;
struct eventlog_OpenEventLogW r;
@@ -164,8 +191,8 @@ static BOOL test_OpenEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct
BOOL torture_rpc_eventlog(void)
{
- NTSTATUS status;
- struct dcerpc_pipe *p;
+ NTSTATUS status;
+ struct dcerpc_pipe *p;
struct policy_handle handle;
TALLOC_CTX *mem_ctx;
BOOL ret = True;
@@ -177,6 +204,7 @@ BOOL torture_rpc_eventlog(void)
DCERPC_EVENTLOG_NAME,
DCERPC_EVENTLOG_UUID,
DCERPC_EVENTLOG_VERSION);
+
if (!NT_STATUS_IS_OK(status)) {
talloc_free(mem_ctx);
return False;
@@ -188,14 +216,16 @@ BOOL torture_rpc_eventlog(void)
}
#if 0
- test_ClearEventLog(p, mem_ctx, &handle); /* Destructive test */
+ ret &= test_ClearEventLog(p, mem_ctx, &handle); /* Destructive test */
#endif
- test_GetNumRecords(p, mem_ctx, &handle);
+ ret &= test_GetNumRecords(p, mem_ctx, &handle);
+
+ ret &= test_ReadEventLog(p, mem_ctx, &handle, 0);
- test_ReadEventLog(p, mem_ctx, &handle, 0);
+ ret &= test_FlushEventLog(p, mem_ctx, &handle);
- test_CloseEventLog(p, mem_ctx, &handle);
+ ret &= test_CloseEventLog(p, mem_ctx, &handle);
talloc_free(mem_ctx);