summaryrefslogtreecommitdiff
path: root/lib/nss_wrapper
diff options
context:
space:
mode:
authorGünther Deschner <gd@samba.org>2009-05-28 16:13:33 +0200
committerGünther Deschner <gd@samba.org>2009-05-29 13:50:09 +0200
commit36fc0b961f32d6fd978f293731a5e2cb01a6154f (patch)
tree54f7994ab1fd9894e8081e91a3e3e9c9721e24eb /lib/nss_wrapper
parentbff54b90c353920ba058cc53a6cc0464f0939424 (diff)
downloadsamba-36fc0b961f32d6fd978f293731a5e2cb01a6154f.tar.gz
samba-36fc0b961f32d6fd978f293731a5e2cb01a6154f.tar.bz2
samba-36fc0b961f32d6fd978f293731a5e2cb01a6154f.zip
s4-smbtorture: add a very basic NSS-WRAPPER testsuite.
Guenther
Diffstat (limited to 'lib/nss_wrapper')
-rw-r--r--lib/nss_wrapper/testsuite.c219
1 files changed, 219 insertions, 0 deletions
diff --git a/lib/nss_wrapper/testsuite.c b/lib/nss_wrapper/testsuite.c
new file mode 100644
index 0000000000..2a9cfaa391
--- /dev/null
+++ b/lib/nss_wrapper/testsuite.c
@@ -0,0 +1,219 @@
+/*
+ Unix SMB/CIFS implementation.
+
+ local testing of the nss wrapper
+
+ Copyright (C) Guenther Deschner 2009
+
+ This program is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 3 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see <http://www.gnu.org/licenses/>.
+*/
+
+#include "includes.h"
+#include "torture/torture.h"
+#include "lib/replace/system/passwd.h"
+#include "lib/nss_wrapper/nss_wrapper.h"
+
+static void print_passwd(struct passwd *pwd)
+{
+ printf("%s:%s:%lu:%lu:%s:%s:%s\n",
+ pwd->pw_name,
+ pwd->pw_passwd,
+ (unsigned long)pwd->pw_uid,
+ (unsigned long)pwd->pw_gid,
+ pwd->pw_gecos,
+ pwd->pw_dir,
+ pwd->pw_shell);
+}
+
+
+static bool test_nwrap_getpwnam(struct torture_context *tctx,
+ const char *name)
+{
+ struct passwd *pwd;
+
+ torture_comment(tctx, "Testing getpwnam: %s\n", name);
+
+ pwd = getpwnam(name);
+ if (pwd) {
+ print_passwd(pwd);
+ }
+
+ return pwd ? true : false;
+}
+
+static bool test_nwrap_getpwuid(struct torture_context *tctx,
+ uid_t uid)
+{
+ struct passwd *pwd;
+
+ torture_comment(tctx, "Testing getpwuid: %lu\n", (unsigned long)uid);
+
+ pwd = getpwuid(uid);
+ if (pwd) {
+ print_passwd(pwd);
+ }
+
+ return pwd ? true : false;
+}
+
+static void print_group(struct group *grp)
+{
+ int i;
+ printf("%s:%s:%lu:",
+ grp->gr_name,
+ grp->gr_passwd,
+ (unsigned long)grp->gr_gid);
+
+ if (!grp->gr_mem[0]) {
+ printf("\n");
+ return;
+ }
+
+ for (i=0; grp->gr_mem[i+1]; i++) {
+ printf("%s,", grp->gr_mem[i]);
+ }
+ printf("%s\n", grp->gr_mem[i]);
+}
+
+static bool test_nwrap_getgrnam(struct torture_context *tctx,
+ const char *name)
+{
+ struct group *grp;
+
+ torture_comment(tctx, "Testing getgrnam: %s\n", name);
+
+ grp = getgrnam(name);
+ if (grp) {
+ print_group(grp);
+ }
+
+ return grp ? true : false;
+}
+
+static bool test_nwrap_getgrgid(struct torture_context *tctx,
+ gid_t gid)
+{
+ struct group *grp;
+
+ torture_comment(tctx, "Testing getgrgid: %lu\n", (unsigned long)gid);
+
+ grp = getgrgid(gid);
+ if (grp) {
+ print_group(grp);
+ }
+
+ return grp ? true : false;
+}
+
+
+static bool test_nwrap_passwd(struct torture_context *tctx)
+{
+ struct passwd *pwd;
+ const char **names = NULL;
+ uid_t *uids = NULL;
+ int num_names = 0;
+ size_t num_uids = 0;
+ int i;
+
+ torture_comment(tctx, "Testing setpwent\n");
+ setpwent();
+
+ while ((pwd = getpwent())) {
+ torture_comment(tctx, "Testing getpwent\n");
+
+ if (pwd) {
+ print_passwd(pwd);
+ add_string_to_array(tctx, pwd->pw_name, &names, &num_names);
+ add_uid_to_array_unique(tctx, pwd->pw_uid, &uids, &num_uids);
+ }
+ }
+
+ torture_comment(tctx, "Testing endpwent\n");
+ endpwent();
+
+ torture_assert_int_equal(tctx, num_names, num_uids, "invalid results");
+
+ for (i=0; i < num_names; i++) {
+ torture_assert(tctx, test_nwrap_getpwnam(tctx, names[i]),
+ "failed to call getpwnam for enumerated user");
+ torture_assert(tctx, test_nwrap_getpwuid(tctx, uids[i]),
+ "failed to call getpwuid for enumerated user");
+ }
+
+ return true;
+}
+
+static bool test_nwrap_group(struct torture_context *tctx)
+{
+ struct group *grp;
+ const char **names = NULL;
+ gid_t *gids = NULL;
+ int num_names = 0;
+ size_t num_gids = 0;
+ int i;
+
+ torture_comment(tctx, "Testing setgrent\n");
+ setgrent();
+
+ do {
+ torture_comment(tctx, "Testing getgrent\n");
+ grp = getgrent();
+ if (grp) {
+ print_group(grp);
+ add_string_to_array(tctx, grp->gr_name, &names, &num_names);
+ add_gid_to_array_unique(tctx, grp->gr_gid, &gids, &num_gids);
+ }
+ } while (grp);
+
+ torture_comment(tctx, "Testing endgrent\n");
+ endgrent();
+
+ torture_assert_int_equal(tctx, num_names, num_gids, "invalid results");
+
+ for (i=0; i < num_names; i++) {
+ torture_assert(tctx, test_nwrap_getgrnam(tctx, names[i]),
+ "failed to call getgrnam for enumerated user");
+ torture_assert(tctx, test_nwrap_getgrgid(tctx, gids[i]),
+ "failed to call getgrgid for enumerated user");
+ }
+
+ return true;
+}
+
+static bool test_nwrap_env(struct torture_context *tctx)
+{
+ const char *old_pwd = getenv("NSS_WRAPPER_PASSWD");
+ const char *old_group = getenv("NSS_WRAPPER_GROUP");
+
+ if (!old_pwd || !old_group) {
+ torture_skip(tctx, "nothing to test\n");
+ return true;
+ }
+
+ torture_assert(tctx, test_nwrap_passwd(tctx),
+ "failed to test users");
+ torture_assert(tctx, test_nwrap_group(tctx),
+ "failed to test groups");
+
+ return true;
+}
+
+struct torture_suite *torture_local_nss_wrapper(TALLOC_CTX *mem_ctx)
+{
+ struct torture_suite *suite = torture_suite_create(mem_ctx, "NSS-WRAPPER");
+
+ torture_suite_add_simple_test(suite, "env", test_nwrap_env);
+
+ return suite;
+}