diff options
author | Tim Potter <tpot@samba.org> | 2005-08-06 00:58:06 +0000 |
---|---|---|
committer | Gerald (Jerry) Carter <jerry@samba.org> | 2007-10-10 13:31:25 -0500 |
commit | f18657aa59749fe85bfe1cc4fc2a49db2685eea6 (patch) | |
tree | ad3f394776d728106432c7fee35d31775e586c2a | |
parent | 865319a0ec76ce9281ce141487bd926d5480830f (diff) | |
download | samba-f18657aa59749fe85bfe1cc4fc2a49db2685eea6.tar.gz samba-f18657aa59749fe85bfe1cc4fc2a49db2685eea6.tar.bz2 samba-f18657aa59749fe85bfe1cc4fc2a49db2685eea6.zip |
r9156: Add IDL and test for FlushEventLog() but it always seems to return
NT_STATUS_ACCESS_DENIED.
(This used to be commit f18d1f539e4fd434dfc519e45f4c356c5cd4d73a)
-rw-r--r-- | source4/librpc/idl/eventlog.idl | 4 | ||||
-rw-r--r-- | source4/torture/rpc/eventlog.c | 50 |
2 files changed, 43 insertions, 11 deletions
diff --git a/source4/librpc/idl/eventlog.idl b/source4/librpc/idl/eventlog.idl index ab0f2a1ff0..0d34579327 100644 --- a/source4/librpc/idl/eventlog.idl +++ b/source4/librpc/idl/eventlog.idl @@ -172,5 +172,7 @@ /*****************/ /* Function 0x17 */ - NTSTATUS eventlog_FlushEventLog(); + NTSTATUS eventlog_FlushEventLog( + [in,ref] policy_handle *handle + ); } diff --git a/source4/torture/rpc/eventlog.c b/source4/torture/rpc/eventlog.c index 69ed683bc4..5ce0652729 100644 --- a/source4/torture/rpc/eventlog.c +++ b/source4/torture/rpc/eventlog.c @@ -31,7 +31,8 @@ static void init_lsa_String(struct lsa_String *name, const char *s) name->size = name->length; } -static BOOL test_GetNumRecords(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) +static BOOL test_GetNumRecords(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, + struct policy_handle *handle) { NTSTATUS status; struct eventlog_GetNumRecords r; @@ -52,7 +53,8 @@ static BOOL test_GetNumRecords(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struc return True; } -static BOOL test_ReadEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t offset) +static BOOL test_ReadEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, + struct policy_handle *handle, uint32_t offset) { NTSTATUS status; struct eventlog_ReadEventLogW r; @@ -91,7 +93,7 @@ static BOOL test_ReadEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct } static BOOL test_CloseEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, - struct policy_handle *handle) + struct policy_handle *handle) { NTSTATUS status; struct eventlog_CloseEventLog r; @@ -101,6 +103,7 @@ static BOOL test_CloseEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, printf("Testing CloseEventLog\n"); status = dcerpc_eventlog_CloseEventLog(p, mem_ctx, &r); + if (!NT_STATUS_IS_OK(status)) { printf("CloseEventLog failed - %s\n", nt_errstr(status)); return False; @@ -109,6 +112,28 @@ static BOOL test_CloseEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, return True; } +static BOOL test_FlushEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, + struct policy_handle *handle) +{ + NTSTATUS status; + struct eventlog_FlushEventLog r; + + r.in.handle = handle; + + printf("Testing FlushEventLog\n"); + + status = dcerpc_eventlog_FlushEventLog(p, mem_ctx, &r); + + /* Huh? Does this RPC always return access denied? */ + + if (!NT_STATUS_EQUAL(status, NT_STATUS_ACCESS_DENIED)) { + printf("FlushEventLog failed - %s\n", nt_errstr(status)); + return False; + } + + return True; +} + static BOOL test_ClearEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { @@ -121,6 +146,7 @@ static BOOL test_ClearEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, printf("Testing ClearEventLog\n"); status = dcerpc_eventlog_ClearEventLogW(p, mem_ctx, &r); + if (!NT_STATUS_IS_OK(status)) { printf("ClearEventLog failed - %s\n", nt_errstr(status)); return False; @@ -129,7 +155,8 @@ static BOOL test_ClearEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, return True; } -static BOOL test_OpenEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) +static BOOL test_OpenEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, + struct policy_handle *handle) { NTSTATUS status; struct eventlog_OpenEventLogW r; @@ -164,8 +191,8 @@ static BOOL test_OpenEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct BOOL torture_rpc_eventlog(void) { - NTSTATUS status; - struct dcerpc_pipe *p; + NTSTATUS status; + struct dcerpc_pipe *p; struct policy_handle handle; TALLOC_CTX *mem_ctx; BOOL ret = True; @@ -177,6 +204,7 @@ BOOL torture_rpc_eventlog(void) DCERPC_EVENTLOG_NAME, DCERPC_EVENTLOG_UUID, DCERPC_EVENTLOG_VERSION); + if (!NT_STATUS_IS_OK(status)) { talloc_free(mem_ctx); return False; @@ -188,14 +216,16 @@ BOOL torture_rpc_eventlog(void) } #if 0 - test_ClearEventLog(p, mem_ctx, &handle); /* Destructive test */ + ret &= test_ClearEventLog(p, mem_ctx, &handle); /* Destructive test */ #endif - test_GetNumRecords(p, mem_ctx, &handle); + ret &= test_GetNumRecords(p, mem_ctx, &handle); + + ret &= test_ReadEventLog(p, mem_ctx, &handle, 0); - test_ReadEventLog(p, mem_ctx, &handle, 0); + ret &= test_FlushEventLog(p, mem_ctx, &handle); - test_CloseEventLog(p, mem_ctx, &handle); + ret &= test_CloseEventLog(p, mem_ctx, &handle); talloc_free(mem_ctx); |