diff options
| author | Andrew Tridgell <tridge@samba.org> | 2010-11-18 10:56:05 +1100 | 
|---|---|---|
| committer | Andrew Tridgell <tridge@samba.org> | 2010-11-18 10:59:26 +1100 | 
| commit | f6c66cd6eee6dbaf34b9cb0c38aa83934104a867 (patch) | |
| tree | 15440aaddfd248f8992b30e4c77a70e226cffb0a /source4/scripting | |
| parent | 63029eb24b9a9b57fbf85b611a66b39b8100a5e3 (diff) | |
| download | samba-f6c66cd6eee6dbaf34b9cb0c38aa83934104a867.tar.gz samba-f6c66cd6eee6dbaf34b9cb0c38aa83934104a867.tar.bz2 samba-f6c66cd6eee6dbaf34b9cb0c38aa83934104a867.zip | |
s4-wintest: added wintest.py library
converted test-howto.py to use the wintest library.
The idea is for us to create other tests that test lots of different
interactions with windows
Diffstat (limited to 'source4/scripting')
| -rwxr-xr-x | source4/scripting/devel/howto/test-howto.py | 662 | ||||
| -rw-r--r-- | source4/scripting/devel/howto/wintest.py | 220 | 
2 files changed, 462 insertions, 420 deletions
| diff --git a/source4/scripting/devel/howto/test-howto.py b/source4/scripting/devel/howto/test-howto.py index 955509f343..e08595a865 100755 --- a/source4/scripting/devel/howto/test-howto.py +++ b/source4/scripting/devel/howto/test-howto.py @@ -2,226 +2,59 @@  '''automated testing of the steps of the Samba4 HOWTO''' -import pexpect, subprocess -import sys, os, time +import sys, os  import optparse +import wintest  vars = {}  parser = optparse.OptionParser("samba_dnsupdate")  parser.add_option("--conf", type='string', default='', help='config file') -def load_config(fname): -    '''load the config file''' -    f = open(fname) -    for line in f: -        line = line.strip() -        if len(line) == 0 or line[0] == '#': -            continue -        colon = line.find(':') -        if colon == -1: -            raise Exception("Invalid config line '%s'" % line) -        varname = line[0:colon].strip() -        value   = line[colon+1:].strip() -        vars[varname] = value - -def substitute(text): -    """Substitute strings of the form ${NAME} in text, replacing -    with substitutions from vars. -    """ -    if isinstance(text, list): -        ret = text[:] -        for i in range(len(ret)): -            ret[i] = substitute(ret[i]) -        return ret -    while True: -        var_start = text.find("${") -        if var_start == -1: -            return text -        var_end = text.find("}", var_start) -        if var_end == -1: -            return text -        var_name = text[var_start+2:var_end] -        if not var_name in vars: -            raise Exception("Unknown substitution variable ${%s}" % var_name) -        text = text.replace("${%s}" % var_name, vars[var_name]) -    return text - - - -def putenv(key, value): -    os.putenv(key, substitute(value)) - -def chdir(dir): -    os.chdir(substitute(dir)) - - -def run_cmd(cmd, dir=".", show=None, output=False, checkfail=True): -    cmd = substitute(cmd) -    if isinstance(cmd, list): -        print('$ ' + " ".join(cmd)) -    else: -        print('$ ' + cmd) -    if output: -        return subprocess.Popen([cmd], shell=True, stdout=subprocess.PIPE, stderr=subprocess.STDOUT, cwd=dir).communicate()[0] -    if isinstance(cmd, list): -        shell=False -    else: -        shell=True -    if checkfail: -        return subprocess.check_call(cmd, shell=shell, cwd=dir) -    else: -        return subprocess.call(cmd, shell=shell, cwd=dir) - - -def cmd_output(cmd): -    '''return output from and command''' -    cmd = substitute(cmd) -    return run_cmd(cmd, output=True) - -def cmd_contains(cmd, contains, nomatch=False, ordered=False): -    '''check that command output contains the listed strings''' -    out = cmd_output(cmd) -    print out -    for c in substitute(contains): -        ofs = out.find(c) -        if nomatch: -            if ofs != -1: -                raise Exception("Expected to not see %s in %s" % (c, cmd)) -        else: -            if ofs == -1: -                raise Exception("Expected to see %s in %s" % (c, cmd)) -        if ordered and ofs != -1: -            ofs += len(c) -            out = out[ofs:] - -def retry_cmd(cmd, contains, retries=30, delay=2, wait_for_fail=False): -    '''retry a command a number of times''' -    while retries > 0: -        try: -            cmd_contains(cmd, contains, nomatch=wait_for_fail) -            return -        except: -            time.sleep(delay) -            retries = retries - 1 -    raise Exception("Failed to find %s" % contains) - -def pexpect_spawn(cmd, timeout=60): -    '''wrapper around pexpect spawn''' - -    cmd = substitute(cmd) -    print("$ " + cmd) -    ret = pexpect.spawn(cmd, logfile=sys.stdout, timeout=timeout) - -    def sendline_sub(line): -        line = substitute(line).replace('\n', '\r\n') -        return ret.old_sendline(line + '\r') - -    def expect_sub(line, timeout=ret.timeout): -        line = substitute(line) -        return ret.old_expect(line, timeout=timeout) - -    ret.old_sendline = ret.sendline -    ret.sendline = sendline_sub -    ret.old_expect = ret.expect -    ret.expect = expect_sub - -    return ret - -def vm_poweroff(vmname, checkfail=True): -    '''power off a VM''' -    vars['VMNAME'] = vmname -    run_cmd("${VM_POWEROFF}", checkfail=checkfail) - -def vm_restore(vmname, snapshot): -    '''restore a VM''' -    vars['VMNAME'] = vmname -    vars['SNAPSHOT'] = snapshot -    run_cmd("${VM_RESTORE}") - -def ping_wait(hostname): -    '''wait for a hostname to come up on the network''' -    hostname=substitute(hostname) -    loops=10 -    while loops > 0: -        try: -            run_cmd("ping -c 1 -w 10 %s" % hostname) -            break -        except: -            loops = loops - 1 -    if loops == 0: -        raise Exception("Failed to ping %s" % hostname) -    print("Host %s is up" % hostname) - -def port_wait(hostname, port, retries=100, delay=2, wait_for_fail=False): -    '''wait for a host to come up on the network''' -    retry_cmd("nc -v -z -w 1 %s %u" % (hostname, port), ['succeeded'], -              retries=retries, delay=delay, wait_for_fail=wait_for_fail) - -def open_telnet(hostname, username, password, retries=30, delay=3, set_time=False): -    '''open a telnet connection to a windows server, return the pexpect child''' -    while retries > 0: -        child = pexpect_spawn("telnet " + hostname + " -l '" + username + "'") -        i = child.expect(["Welcome to Microsoft Telnet Service", -                          "No more connections are allowed to telnet server"]) -        if i != 0: -            time.sleep(delay) -            retries -= 1 -            continue -        child.expect("password:") -        child.sendline(password) -        child.expect("C:") -        if set_time: -            child.sendline("net time \\\\${HOSTNAME} /set") -            child.expect("Do you want to set the local computer") -            child.sendline("Y") -            child.expect("The command completed successfully") -        return child - - -def check_prerequesites(): +def check_prerequesites(t):      print("Checking prerequesites") -    vars['HOSTNAME'] = cmd_output("hostname -s").strip() +    t.setvar('HOSTNAME', t.cmd_output("hostname -s").strip())      if os.getuid() != 0:          raise Exception("You must run this script as root") -    cmd_contains("grep 127.0.0.1 /etc/resolv.conf", ["nameserver 127.0.0.1"]) +    t.cmd_contains("grep 127.0.0.1 /etc/resolv.conf", ["nameserver 127.0.0.1"]) -def build_s4(prefix=None): + +def build_s4(t):      '''build samba4'''      print('Building s4') -    chdir('${SOURCETREE}/source4') -    putenv('CC', 'ccache gcc') -    run_cmd('make reconfigure || ./configure --enable-auto-reconfigure --enable-developer --prefix=${PREFIX} -C') -    run_cmd('make -j') -    run_cmd('rm -rf ${PREFIX}') -    run_cmd('make -j install') - -def provision_s4(): +    t.chdir('${SOURCETREE}/source4') +    t.putenv('CC', 'ccache gcc') +    t.run_cmd('make reconfigure || ./configure --enable-auto-reconfigure --enable-developer --prefix=${PREFIX} -C') +    t.run_cmd('make -j') +    t.run_cmd('rm -rf ${PREFIX}') +    t.run_cmd('make -j install') + +def provision_s4(t):      '''provision s4 as a DC'''      print('Provisioning s4') -    chdir('${PREFIX}') -    run_cmd("rm -rf etc private") -    run_cmd('sbin/provision --realm=${LCREALM} --domain=${DOMAIN} --adminpass=${PASSWORD1} --server-role="domain controller" --function-level=2008 -d${DEBUGLEVEL}') -    run_cmd('bin/samba-tool newuser testallowed ${PASSWORD1}') -    run_cmd('bin/samba-tool newuser testdenied ${PASSWORD1}') -    run_cmd('bin/samba-tool group addmembers "Allowed RODC Password Replication Group" testallowed') - -def start_s4(prefix=None, interfaces=None): +    t.chdir('${PREFIX}') +    t.run_cmd("rm -rf etc private") +    t.run_cmd('sbin/provision --realm=${LCREALM} --domain=${DOMAIN} --adminpass=${PASSWORD1} --server-role="domain controller" --function-level=2008 -d${DEBUGLEVEL}') +    t.run_cmd('bin/samba-tool newuser testallowed ${PASSWORD1}') +    t.run_cmd('bin/samba-tool newuser testdenied ${PASSWORD1}') +    t.run_cmd('bin/samba-tool group addmembers "Allowed RODC Password Replication Group" testallowed') + +def start_s4(t, interfaces=None):      print('Starting Samba4') -    chdir(prefix) -    run_cmd('killall -9 -q samba smbd nmbd winbindd', checkfail=False) -    run_cmd(['sbin/samba', +    t.chdir("${PREFIX}") +    t.run_cmd('killall -9 -q samba smbd nmbd winbindd', checkfail=False) +    t.run_cmd(['sbin/samba',               '--option', 'panic action=gnome-terminal -e "gdb --pid %PID%"',               '--option', 'interfaces=%s' % interfaces]) -    port_wait("localhost", 445) +    t.port_wait("localhost", 445) -def test_smbclient(): +def test_smbclient(t):      print('Testing smbclient') -    chdir('${PREFIX}') -    cmd_contains("bin/smbclient --version", ["Version 4.0"]) -    retry_cmd('bin/smbclient -L localhost -U%', ["netlogon", "sysvol", "IPC Service"]) -    child = pexpect_spawn('bin/smbclient //localhost/netlogon -Uadministrator%${PASSWORD1}') +    t.chdir('${PREFIX}') +    t.cmd_contains("bin/smbclient --version", ["Version 4.0"]) +    t.retry_cmd('bin/smbclient -L localhost -U%', ["netlogon", "sysvol", "IPC Service"]) +    child = t.pexpect_spawn('bin/smbclient //localhost/netlogon -Uadministrator%${PASSWORD1}')      child.expect("smb:")      child.sendline("dir")      child.expect("blocks available") @@ -232,11 +65,11 @@ def test_smbclient():      child.sendline("cd ..")      child.sendline("rmdir testdir") -def create_shares(): +def create_shares(t):      print("Adding test shares") -    chdir('${PREFIX}') +    t.chdir('${PREFIX}')      f = open("etc/smb.conf", mode='a') -    f.write(substitute(''' +    f.write(t.substitute('''  [test]         path = ${PREFIX}/test         read only = no @@ -245,96 +78,82 @@ def create_shares():         read only = no      '''))      f.close() -    run_cmd("mkdir -p test") -    run_cmd("mkdir -p var/profiles") +    t.run_cmd("mkdir -p test") +    t.run_cmd("mkdir -p var/profiles") -def restart_bind(): +def restart_bind(t):      print("Restarting bind9") -    putenv('KEYTAB_FILE', '${PREFIX}/private/dns.keytab') -    putenv('KRB5_KTNAME', '${PREFIX}/private/dns.keytab') -    run_cmd('killall -9 -q named', checkfail=False) -    port_wait("localhost", 53, wait_for_fail=True) -    run_cmd("${BIND9}") -    port_wait("localhost", 53) -    run_cmd("${RNDC} flush") -    run_cmd("${RNDC} freeze") -    run_cmd("${RNDC} thaw") - -def test_dns(): +    t.putenv('KEYTAB_FILE', '${PREFIX}/private/dns.keytab') +    t.putenv('KRB5_KTNAME', '${PREFIX}/private/dns.keytab') +    t.run_cmd('killall -9 -q named', checkfail=False) +    t.port_wait("localhost", 53, wait_for_fail=True) +    t.run_cmd("${BIND9}") +    t.port_wait("localhost", 53) +    t.run_cmd("${RNDC} flush") +    t.run_cmd("${RNDC} freeze") +    t.run_cmd("${RNDC} thaw") + +def test_dns(t):      print("Testing DNS") -    cmd_contains("host -t SRV _ldap._tcp.${LCREALM}.", +    t.cmd_contains("host -t SRV _ldap._tcp.${LCREALM}.",                   ['_ldap._tcp.${LCREALM} has SRV record 0 100 389 ${HOSTNAME}.${LCREALM}']) -    cmd_contains("host -t SRV  _kerberos._udp.${LCREALM}.", +    t.cmd_contains("host -t SRV  _kerberos._udp.${LCREALM}.",                   ['_kerberos._udp.${LCREALM} has SRV record 0 100 88 ${HOSTNAME}.${LCREALM}']) -    cmd_contains("host -t A ${HOSTNAME}.${LCREALM}", +    t.cmd_contains("host -t A ${HOSTNAME}.${LCREALM}",                   ['${HOSTNAME}.${LCREALM} has address']) -def do_kinit(username, password): -    '''use kinit to setup a credentials cache''' -    run_cmd("kdestroy") -    putenv('KRB5CCNAME', "${PREFIX}/ccache.test") -    username = substitute(username) -    s = username.split('@') -    if len(s) > 0: -        s[1] = s[1].upper() -    username = '@'.join(s) -    child = pexpect_spawn('kinit -V ' + username) -    child.expect("Password for") -    child.sendline(password) -    child.expect("Authenticated to Kerberos") - -def test_kerberos(): +def test_kerberos(t):      print("Testing kerberos") -    run_cmd("kdestroy") -    do_kinit("administrator@${REALM}", "${PASSWORD1}") -    cmd_contains("klist -e", ["Ticket cache", "Default principal", "Valid starting"]) +    t.run_cmd("kdestroy") +    t.kinit("administrator@${REALM}", "${PASSWORD1}") +    t.cmd_contains("klist -e", ["Ticket cache", "Default principal", "Valid starting"]) -def test_dyndns(): -    chdir('${PREFIX}') -    cmd_contains("sbin/samba_dnsupdate", []) -    run_cmd("${RNDC} flush") -    cmd_contains("sbin/samba_dnsupdate --verbose", ["No DNS updates needed"]) +def test_dyndns(t): +    t.chdir('${PREFIX}') +    t.cmd_contains("sbin/samba_dnsupdate", []) +    t.run_cmd("${RNDC} flush") +    t.cmd_contains("sbin/samba_dnsupdate --verbose", ["No DNS updates needed"]) -def join_win7(): +def join_win7(t):      print("Joining a Win7 box to the domain") -    vm_poweroff("${WINDOWS7_VM}", checkfail=False) -    vm_restore("${WINDOWS7_VM}", "${WINDOWS7_SNAPSHOT}") -    ping_wait("${WINDOWS7}") -    port_wait("${WINDOWS7}", 23) -    child = open_telnet("${WINDOWS7}", "administrator", "${PASSWORD1}") +    t.vm_poweroff("${WINDOWS7_VM}", checkfail=False) +    t.vm_restore("${WINDOWS7_VM}", "${WINDOWS7_SNAPSHOT}") +    t.ping_wait("${WINDOWS7}") +    t.port_wait("${WINDOWS7}", 23) +    child = t.open_telnet("${WINDOWS7}", "administrator", "${PASSWORD1}", set_time=True)      child.sendline("netdom join ${WINDOWS7} /Domain:${LCREALM} /PasswordD:${PASSWORD1} /UserD:administrator")      child.expect("The computer needs to be restarted in order to complete the operation")      child.expect("The command completed successfully")      child.sendline("shutdown /r -t 0") -    port_wait("${WINDOWS7}", 23, wait_for_fail=True) -    port_wait("${WINDOWS7}", 23) +    t.port_wait("${WINDOWS7}", 23, wait_for_fail=True) +    t.port_wait("${WINDOWS7}", 23) -def test_win7(): +def test_win7(t):      print("Checking the win7 join is OK") -    chdir('${PREFIX}') -    port_wait("${WINDOWS7}", 445) -    retry_cmd('bin/smbclient -L ${WINDOWS7}.${LCREALM} -Uadministrator@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"]) -    cmd_contains("host -t A ${WINDOWS7}.${LCREALM}.", ['has address']) -    cmd_contains('bin/smbclient -L ${WINDOWS7}.${LCREALM} -Utestallowed@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"]) -    cmd_contains('bin/smbclient -L ${WINDOWS7}.${LCREALM} -k no -Utestallowed@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"]) -    cmd_contains('bin/smbclient -L ${WINDOWS7}.${LCREALM} -k yes -Utestallowed@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"]) -    port_wait("${WINDOWS7}", 23) -    child = open_telnet("${WINDOWS7}", "${DOMAIN}\\administrator", "${PASSWORD1}") +    t.chdir('${PREFIX}') +    t.port_wait("${WINDOWS7}", 445) +    t.retry_cmd('bin/smbclient -L ${WINDOWS7}.${LCREALM} -Uadministrator@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"]) +    t.cmd_contains("host -t A ${WINDOWS7}.${LCREALM}.", ['has address']) +    t.cmd_contains('bin/smbclient -L ${WINDOWS7}.${LCREALM} -Utestallowed@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"]) +    t.cmd_contains('bin/smbclient -L ${WINDOWS7}.${LCREALM} -k no -Utestallowed@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"]) +    t.cmd_contains('bin/smbclient -L ${WINDOWS7}.${LCREALM} -k yes -Utestallowed@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"]) +    t.port_wait("${WINDOWS7}", 23) +    child = t.open_telnet("${WINDOWS7}", "${DOMAIN}\\administrator", "${PASSWORD1}")      child.sendline("net use t: \\\\${HOSTNAME}.${LCREALM}\\test")      child.expect("The command completed successfully") -    vm_poweroff("${WINDOWS7_VM}") +    t.vm_poweroff("${WINDOWS7_VM}") -def join_w2k8(): +def join_w2k8(t):      print("Joining a w2k8 box to the domain as a DC") -    vm_poweroff("${WINDOWS_DC1_VM}", checkfail=False) -    vm_restore("${WINDOWS_DC1_VM}", "${WINDOWS_DC1_SNAPSHOT}") -    ping_wait("${WINDOWS_DC1}") -    port_wait("${WINDOWS_DC1}", 23) -    child = open_telnet("${WINDOWS_DC1}", "administrator", "${WINDOWS_DC1_PASS}") +    t.vm_poweroff("${WINDOWS_DC1_VM}", checkfail=False) +    t.vm_restore("${WINDOWS_DC1_VM}", "${WINDOWS_DC1_SNAPSHOT}") +    t.ping_wait("${WINDOWS_DC1}") +    t.port_wait("${WINDOWS_DC1}", 23) +    child = t.open_telnet("${WINDOWS_DC1}", "administrator", "${WINDOWS_DC1_PASS}")      child.sendline("copy /Y con answers.txt")      child.sendline('''  [DCInstall] @@ -360,28 +179,28 @@ RebootOnCompletion=No      if i != 0:          raise Exception("dcpromo failed")      child.sendline("shutdown -r -t 0") -    port_wait("${WINDOWS_DC1}", 23, wait_for_fail=True) -    port_wait("${WINDOWS_DC1}", 23) +    t.port_wait("${WINDOWS_DC1}", 23, wait_for_fail=True) +    t.port_wait("${WINDOWS_DC1}", 23) -def test_w2k8(): +def test_w2k8(t):      print("Checking the w2k8 join is OK") -    chdir('${PREFIX}') -    port_wait("${WINDOWS_DC1}", 445) -    retry_cmd('bin/smbclient -L ${WINDOWS_DC1}.${LCREALM} -Uadministrator@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"]) -    cmd_contains("host -t A ${WINDOWS_DC1}.${LCREALM}.", ['has address']) -    cmd_contains('bin/smbclient -L ${WINDOWS_DC1}.${LCREALM} -Utestallowed@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"]) -    port_wait("${WINDOWS_DC1}", 23) +    t.chdir('${PREFIX}') +    t.port_wait("${WINDOWS_DC1}", 445) +    t.retry_cmd('bin/smbclient -L ${WINDOWS_DC1}.${LCREALM} -Uadministrator@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"]) +    t.cmd_contains("host -t A ${WINDOWS_DC1}.${LCREALM}.", ['has address']) +    t.cmd_contains('bin/smbclient -L ${WINDOWS_DC1}.${LCREALM} -Utestallowed@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"]) +    t.port_wait("${WINDOWS_DC1}", 23) -    cmd_contains("bin/samba-tool drs kcc ${HOSTNAME} -Uadministrator@${LCREALM}%${PASSWORD1}", ['Consistency check', 'successful']) -    cmd_contains("bin/samba-tool drs kcc ${WINDOWS_DC1} -Uadministrator@${LCREALM}%${PASSWORD1}", ['Consistency check', 'successful']) +    t.cmd_contains("bin/samba-tool drs kcc ${HOSTNAME} -Uadministrator@${LCREALM}%${PASSWORD1}", ['Consistency check', 'successful']) +    t.cmd_contains("bin/samba-tool drs kcc ${WINDOWS_DC1} -Uadministrator@${LCREALM}%${PASSWORD1}", ['Consistency check', 'successful']) -    do_kinit("administrator@${REALM}", "${PASSWORD1}") +    t.kinit("administrator@${REALM}", "${PASSWORD1}")      for nc in [ '${BASEDN}', 'CN=Configuration,${BASEDN}', 'CN=Schema,CN=Configuration,${BASEDN}' ]: -        cmd_contains("bin/samba-tool drs replicate ${HOSTNAME} ${WINDOWS_DC1} %s -k yes" % nc, ["was successful"]) -        cmd_contains("bin/samba-tool drs replicate ${WINDOWS_DC1} ${HOSTNAME} %s -k yes" % nc, ["was successful"]) +        t.cmd_contains("bin/samba-tool drs replicate ${HOSTNAME} ${WINDOWS_DC1} %s -k yes" % nc, ["was successful"]) +        t.cmd_contains("bin/samba-tool drs replicate ${WINDOWS_DC1} ${HOSTNAME} %s -k yes" % nc, ["was successful"]) -    cmd_contains("bin/samba-tool drs showrepl ${HOSTNAME} -k yes", +    t.cmd_contains("bin/samba-tool drs showrepl ${HOSTNAME} -k yes",                   [ "INBOUND NEIGHBORS",                     "${BASEDN}",                     "Last attempt", "was successful", @@ -394,7 +213,7 @@ def test_w2k8():                     "Last success"],                   ordered=True) -    cmd_contains("bin/samba-tool drs showrepl ${WINDOWS_DC1} -k yes", +    t.cmd_contains("bin/samba-tool drs showrepl ${WINDOWS_DC1} -k yes",                   [ "INBOUND NEIGHBORS",                     "${BASEDN}",                     "Last attempt", "was successful", @@ -407,10 +226,11 @@ def test_w2k8():                     "Last success" ],                   ordered=True) -    child = open_telnet("${WINDOWS_DC1}", "${DOMAIN}\\administrator", "${PASSWORD1}", set_time=True) +    child = t.open_telnet("${WINDOWS_DC1}", "${DOMAIN}\\administrator", "${PASSWORD1}", set_time=True)      child.sendline("net use t: \\\\${HOSTNAME}.${LCREALM}\\test")      child.expect("The command completed successfully") +    t.run_net_time(child)      print("Checking if showrepl is happy")      child.sendline("repadmin /showrepl") @@ -422,9 +242,9 @@ def test_w2k8():      child.expect("was successful")      print("Checking if new users propogate to windows") -    run_cmd('bin/samba-tool newuser test2 ${PASSWORD2}') -    retry_cmd("bin/smbclient -L ${WINDOWS_DC1} -Utest2%${PASSWORD2} -k no", ['Sharename', 'Remote IPC']) -    retry_cmd("bin/smbclient -L ${WINDOWS_DC1} -Utest2%${PASSWORD2} -k yes", ['Sharename', 'Remote IPC']) +    t.run_cmd('bin/samba-tool newuser test2 ${PASSWORD2}') +    t.retry_cmd("bin/smbclient -L ${WINDOWS_DC1} -Utest2%${PASSWORD2} -k no", ['Sharename', 'Remote IPC']) +    t.retry_cmd("bin/smbclient -L ${WINDOWS_DC1} -Utest2%${PASSWORD2} -k yes", ['Sharename', 'Remote IPC'])      print("Checking if new users on windows propogate to samba")      child.sendline("net user test3 ${PASSWORD3} /add") @@ -435,28 +255,28 @@ def test_w2k8():              break          time.sleep(2) -    retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest3%${PASSWORD3} -k no", ['Sharename', 'IPC']) -    retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest3%${PASSWORD3} -k yes", ['Sharename', 'IPC']) +    t.retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest3%${PASSWORD3} -k no", ['Sharename', 'IPC']) +    t.retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest3%${PASSWORD3} -k yes", ['Sharename', 'IPC'])      print("Checking propogation of user deletion") -    run_cmd('bin/samba-tool user delete test2 -Uadministrator@${LCREALM}%${PASSWORD1}') +    t.run_cmd('bin/samba-tool user delete test2 -Uadministrator@${LCREALM}%${PASSWORD1}')      child.sendline("net user test3 /del")      child.expect("The command completed successfully") -    retry_cmd("bin/smbclient -L ${WINDOWS_DC1} -Utest2%${PASSWORD2} -k no", ['LOGON_FAILURE']) -    retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest3%${PASSWORD3} -k no", ['LOGON_FAILURE']) -    retry_cmd("bin/smbclient -L ${WINDOWS_DC1} -Utest2%${PASSWORD2} -k yes", ['LOGON_FAILURE']) -    retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest3%${PASSWORD3} -k yes", ['LOGON_FAILURE']) -    vm_poweroff("${WINDOWS_DC1_VM}") +    t.retry_cmd("bin/smbclient -L ${WINDOWS_DC1} -Utest2%${PASSWORD2} -k no", ['LOGON_FAILURE']) +    t.retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest3%${PASSWORD3} -k no", ['LOGON_FAILURE']) +    t.retry_cmd("bin/smbclient -L ${WINDOWS_DC1} -Utest2%${PASSWORD2} -k yes", ['LOGON_FAILURE']) +    t.retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest3%${PASSWORD3} -k yes", ['LOGON_FAILURE']) +    t.vm_poweroff("${WINDOWS_DC1_VM}") -def join_w2k8_rodc(): +def join_w2k8_rodc(t):      print("Joining a w2k8 box to the domain as a RODC") -    vm_poweroff("${WINDOWS_DC2_VM}", checkfail=False) -    vm_restore("${WINDOWS_DC2_VM}", "${WINDOWS_DC2_SNAPSHOT}") -    ping_wait("${WINDOWS_DC2}") -    port_wait("${WINDOWS_DC2}", 23) -    child = open_telnet("${WINDOWS_DC2}", "administrator", "${WINDOWS_DC2_PASS}") +    t.vm_poweroff("${WINDOWS_DC2_VM}", checkfail=False) +    t.vm_restore("${WINDOWS_DC2_VM}", "${WINDOWS_DC2_SNAPSHOT}") +    t.ping_wait("${WINDOWS_DC2}") +    t.port_wait("${WINDOWS_DC2}", 23) +    child = t.open_telnet("${WINDOWS_DC2}", "administrator", "${WINDOWS_DC2_PASS}")      child.sendline("copy /Y con answers.txt")      child.sendline('''  [DCInstall] @@ -489,20 +309,20 @@ RebootOnCompletion=No      if i != 0:          raise Exception("dcpromo failed")      child.sendline("shutdown -r -t 0") -    port_wait("${WINDOWS_DC2}", 23, wait_for_fail=True) -    port_wait("${WINDOWS_DC2}", 23) +    t.port_wait("${WINDOWS_DC2}", 23, wait_for_fail=True) +    t.port_wait("${WINDOWS_DC2}", 23) -def test_w2k8_rodc(): +def test_w2k8_rodc(t):      print("Checking the w2k8 RODC join is OK") -    chdir('${PREFIX}') -    port_wait("${WINDOWS_DC2}", 445) -    retry_cmd('bin/smbclient -L ${WINDOWS_DC2}.${LCREALM} -Uadministrator@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"]) -    cmd_contains("host -t A ${WINDOWS_DC2}.${LCREALM}.", ['has address']) -    cmd_contains('bin/smbclient -L ${WINDOWS_DC2}.${LCREALM} -Utestallowed@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"]) -    port_wait("${WINDOWS_DC2}", 23) -    child = open_telnet("${WINDOWS_DC2}", "${DOMAIN}\\administrator", "${PASSWORD1}", set_time=True) +    t.chdir('${PREFIX}') +    t.port_wait("${WINDOWS_DC2}", 445) +    t.retry_cmd('bin/smbclient -L ${WINDOWS_DC2}.${LCREALM} -Uadministrator@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"]) +    t.cmd_contains("host -t A ${WINDOWS_DC2}.${LCREALM}.", ['has address']) +    t.cmd_contains('bin/smbclient -L ${WINDOWS_DC2}.${LCREALM} -Utestallowed@${LCREALM}%${PASSWORD1}', ["C$", "IPC$", "Sharename"]) +    t.port_wait("${WINDOWS_DC2}", 23) +    child = t.open_telnet("${WINDOWS_DC2}", "${DOMAIN}\\administrator", "${PASSWORD1}", set_time=True)      child.sendline("net use t: \\\\${HOSTNAME}.${LCREALM}\\test")      child.expect("The command completed successfully") @@ -516,43 +336,44 @@ def test_w2k8_rodc():      child.expect("was successful")      print("Checking if new users are available on windows") -    run_cmd('bin/samba-tool newuser test2 ${PASSWORD2}') -    retry_cmd("bin/smbclient -L ${WINDOWS_DC2} -Utest2%${PASSWORD2} -k no", ['Sharename', 'Remote IPC']) -    retry_cmd("bin/smbclient -L ${WINDOWS_DC2} -Utest2%${PASSWORD2} -k yes", ['Sharename', 'Remote IPC']) -    run_cmd('bin/samba-tool user delete test2 -Uadministrator@${LCREALM}%${PASSWORD1}') -    retry_cmd("bin/smbclient -L ${WINDOWS_DC2} -Utest2%${PASSWORD2}", ['LOGON_FAILURE']) -    vm_poweroff("${WINDOWS_DC2_VM}") +    t.run_cmd('bin/samba-tool newuser test2 ${PASSWORD2}') +    t.retry_cmd("bin/smbclient -L ${WINDOWS_DC2} -Utest2%${PASSWORD2} -k no", ['Sharename', 'Remote IPC']) +    t.retry_cmd("bin/smbclient -L ${WINDOWS_DC2} -Utest2%${PASSWORD2} -k yes", ['Sharename', 'Remote IPC']) +    t.run_cmd('bin/samba-tool user delete test2 -Uadministrator@${LCREALM}%${PASSWORD1}') +    t.retry_cmd("bin/smbclient -L ${WINDOWS_DC2} -Utest2%${PASSWORD2}", ['LOGON_FAILURE']) +    t.vm_poweroff("${WINDOWS_DC2_VM}") -def vampire_w2k8(): +def vampire_w2k8(t):      print("Joining w2k8 as a second DC") -    chdir('${PREFIX}') -    run_cmd('killall -9 -q samba smbd nmbd winbindd', checkfail=False) -    vm_poweroff("${WINDOWS_DC3_VM}", checkfail=False) -    vm_restore("${WINDOWS_DC3_VM}", "${WINDOWS_DC3_SNAPSHOT}") -    run_cmd('${RNDC} flush') -    run_cmd("rm -rf etc private") -    retry_cmd("bin/samba-tool drs showrepl ${WINDOWS_DC3} -Uadministrator%${WINDOWS_DC3_PASS}", ['INBOUND NEIGHBORS'] ) -    run_cmd('bin/samba-tool join ${WINDOWS_DC3_REALM} DC -Uadministrator%${WINDOWS_DC3_PASS} -d${DEBUGLEVEL}') -    run_cmd('bin/samba-tool drs kcc ${WINDOWS_DC3} -Uadministrator@${WINDOWS_DC3_REALM}%${WINDOWS_DC3_PASS}') - - -def test_vampire(): +    t.chdir('${PREFIX}') +    t.run_cmd('killall -9 -q samba smbd nmbd winbindd', checkfail=False) +    t.vm_poweroff("${WINDOWS_DC3_VM}", checkfail=False) +    t.vm_restore("${WINDOWS_DC3_VM}", "${WINDOWS_DC3_SNAPSHOT}") +    t.run_cmd('${RNDC} flush') +    t.run_cmd("rm -rf etc private") +    t.open_telnet("${WINDOWS_DC3}", "${WINDOWS_DC3_DOMAIN}\\administrator", "${WINDOWS_DC3_PASS}", set_time=True) +    t.retry_cmd("bin/samba-tool drs showrepl ${WINDOWS_DC3} -Uadministrator%${WINDOWS_DC3_PASS}", ['INBOUND NEIGHBORS'] ) +    t.run_cmd('bin/samba-tool join ${WINDOWS_DC3_REALM} DC -Uadministrator%${WINDOWS_DC3_PASS} -d${DEBUGLEVEL}') +    t.run_cmd('bin/samba-tool drs kcc ${WINDOWS_DC3} -Uadministrator@${WINDOWS_DC3_REALM}%${WINDOWS_DC3_PASS}') + + +def test_vampire(t):      print("Checking the DC join is OK") -    chdir('${PREFIX}') -    retry_cmd('bin/smbclient -L ${HOSTNAME}.${WINDOWS_DC3_REALM} -Uadministrator@${WINDOWS_DC3_REALM}%${WINDOWS_DC3_PASS}', ["C$", "IPC$", "Sharename"]) -    cmd_contains("host -t A ${HOSTNAME}.${WINDOWS_DC3_REALM}.", ['has address']) -    port_wait("${WINDOWS_DC3}", 23) -    child = open_telnet("${WINDOWS_DC3}", "${WINDOWS_DC3_DOMAIN}\\administrator", "${WINDOWS_DC3_PASS}", set_time=True) +    t.chdir('${PREFIX}') +    t.retry_cmd('bin/smbclient -L ${HOSTNAME}.${WINDOWS_DC3_REALM} -Uadministrator@${WINDOWS_DC3_REALM}%${WINDOWS_DC3_PASS}', ["C$", "IPC$", "Sharename"]) +    t.cmd_contains("host -t A ${HOSTNAME}.${WINDOWS_DC3_REALM}.", ['has address']) +    t.port_wait("${WINDOWS_DC3}", 23) +    child = t.open_telnet("${WINDOWS_DC3}", "${WINDOWS_DC3_DOMAIN}\\administrator", "${WINDOWS_DC3_PASS}", set_time=True)      print("Forcing kcc runs, and replication") -    run_cmd('bin/samba-tool drs kcc ${WINDOWS_DC3} -Uadministrator@${WINDOWS_DC3_REALM}%${WINDOWS_DC3_PASS}') -    run_cmd('bin/samba-tool drs kcc ${HOSTNAME} -Uadministrator@${WINDOWS_DC3_REALM}%${WINDOWS_DC3_PASS}') +    t.run_cmd('bin/samba-tool drs kcc ${WINDOWS_DC3} -Uadministrator@${WINDOWS_DC3_REALM}%${WINDOWS_DC3_PASS}') +    t.run_cmd('bin/samba-tool drs kcc ${HOSTNAME} -Uadministrator@${WINDOWS_DC3_REALM}%${WINDOWS_DC3_PASS}') -    do_kinit("administrator@${WINDOWS_DC3_REALM}", "${WINDOWS_DC3_PASS}") +    t.kinit("administrator@${WINDOWS_DC3_REALM}", "${WINDOWS_DC3_PASS}")      for nc in [ '${WINDOWS_DC3_BASEDN}', 'CN=Configuration,${WINDOWS_DC3_BASEDN}', 'CN=Schema,CN=Configuration,${WINDOWS_DC3_BASEDN}' ]: -        cmd_contains("bin/samba-tool drs replicate ${HOSTNAME} ${WINDOWS_DC3} %s -k yes" % nc, ["was successful"]) -        cmd_contains("bin/samba-tool drs replicate ${WINDOWS_DC3} ${HOSTNAME} %s -k yes" % nc, ["was successful"]) +        t.cmd_contains("bin/samba-tool drs replicate ${HOSTNAME} ${WINDOWS_DC3} %s -k yes" % nc, ["was successful"]) +        t.cmd_contains("bin/samba-tool drs replicate ${WINDOWS_DC3} ${HOSTNAME} %s -k yes" % nc, ["was successful"])      child.sendline("net use t: \\\\${HOSTNAME}.${WINDOWS_DC3_REALM}\\test")      child.expect("The command completed successfully") @@ -567,57 +388,58 @@ def test_vampire():      child.expect("was successful")      print("Checking if new users propogate to windows") -    run_cmd('bin/samba-tool newuser test2 ${PASSWORD2}') -    retry_cmd("bin/smbclient -L ${WINDOWS_DC3} -Utest2%${PASSWORD2} -k no", ['Sharename', 'Remote IPC']) -    retry_cmd("bin/smbclient -L ${WINDOWS_DC3} -Utest2%${PASSWORD2} -k yes", ['Sharename', 'Remote IPC']) +    t.run_cmd('bin/samba-tool newuser test2 ${PASSWORD2}') +    t.retry_cmd("bin/smbclient -L ${WINDOWS_DC3} -Utest2%${PASSWORD2} -k no", ['Sharename', 'Remote IPC']) +    t.retry_cmd("bin/smbclient -L ${WINDOWS_DC3} -Utest2%${PASSWORD2} -k yes", ['Sharename', 'Remote IPC'])      print("Checking if new users on windows propogate to samba")      child.sendline("net user test3 ${PASSWORD3} /add")      child.expect("The command completed successfully") -    retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest2%${PASSWORD2} -k no", ['Sharename', 'IPC']) -    retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest2%${PASSWORD2} -k yes", ['Sharename', 'IPC']) +    t.retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest2%${PASSWORD2} -k no", ['Sharename', 'IPC']) +    t.retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest2%${PASSWORD2} -k yes", ['Sharename', 'IPC'])      print("Checking propogation of user deletion") -    run_cmd('bin/samba-tool user delete test2 -Uadministrator@${WINDOWS_DC3_REALM}%${WINDOWS_DC3_PASS}') +    t.run_cmd('bin/samba-tool user delete test2 -Uadministrator@${WINDOWS_DC3_REALM}%${WINDOWS_DC3_PASS}')      child.sendline("net user test3 /del")      child.expect("The command completed successfully") -    retry_cmd("bin/smbclient -L ${WINDOWS_DC3} -Utest2%${PASSWORD2} -k no", ['LOGON_FAILURE']) -    retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest2%${PASSWORD2} -k no", ['LOGON_FAILURE']) -    retry_cmd("bin/smbclient -L ${WINDOWS_DC3} -Utest2%${PASSWORD2} -k yes", ['LOGON_FAILURE']) -    retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest2%${PASSWORD2} -k yes", ['LOGON_FAILURE']) -    vm_poweroff("${WINDOWS_DC3_VM}") +    t.retry_cmd("bin/smbclient -L ${WINDOWS_DC3} -Utest2%${PASSWORD2} -k no", ['LOGON_FAILURE']) +    t.retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest2%${PASSWORD2} -k no", ['LOGON_FAILURE']) +    t.retry_cmd("bin/smbclient -L ${WINDOWS_DC3} -Utest2%${PASSWORD2} -k yes", ['LOGON_FAILURE']) +    t.retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest2%${PASSWORD2} -k yes", ['LOGON_FAILURE']) +    t.vm_poweroff("${WINDOWS_DC3_VM}") -def vampire_w2k3(): +def vampire_w2k3(t):      print("Joining w2k3 as a second DC") -    chdir('${PREFIX}') -    run_cmd('killall -9 -q samba smbd nmbd winbindd', checkfail=False) -    vm_poweroff("${WINDOWS_DC4_VM}", checkfail=False) -    vm_restore("${WINDOWS_DC4_VM}", "${WINDOWS_DC4_SNAPSHOT}") -    run_cmd('${RNDC} flush') -    run_cmd("rm -rf etc private") -    retry_cmd("bin/samba-tool drs showrepl ${WINDOWS_DC4} -Uadministrator%${WINDOWS_DC4_PASS}", ['INBOUND NEIGHBORS'] ) -    run_cmd('bin/samba-tool join ${WINDOWS_DC4_REALM} DC -Uadministrator%${WINDOWS_DC4_PASS} -d${DEBUGLEVEL}') -    run_cmd('bin/samba-tool drs kcc ${WINDOWS_DC4} -Uadministrator@${WINDOWS_DC4_REALM}%${WINDOWS_DC4_PASS}') - - -def test_vampire_w2k3(): +    t.chdir('${PREFIX}') +    t.run_cmd('killall -9 -q samba smbd nmbd winbindd', checkfail=False) +    t.vm_poweroff("${WINDOWS_DC4_VM}", checkfail=False) +    t.vm_restore("${WINDOWS_DC4_VM}", "${WINDOWS_DC4_SNAPSHOT}") +    t.run_cmd('${RNDC} flush') +    t.run_cmd("rm -rf etc private") +    t.open_telnet("${WINDOWS_DC4}", "${WINDOWS_DC4_DOMAIN}\\administrator", "${WINDOWS_DC4_PASS}", set_time=True) +    t.retry_cmd("bin/samba-tool drs showrepl ${WINDOWS_DC4} -Uadministrator%${WINDOWS_DC4_PASS}", ['INBOUND NEIGHBORS'] ) +    t.run_cmd('bin/samba-tool join ${WINDOWS_DC4_REALM} DC -Uadministrator%${WINDOWS_DC4_PASS} -d${DEBUGLEVEL}') +    t.run_cmd('bin/samba-tool drs kcc ${WINDOWS_DC4} -Uadministrator@${WINDOWS_DC4_REALM}%${WINDOWS_DC4_PASS}') + + +def test_vampire_w2k3(t):      print("Checking the DC join is OK") -    chdir('${PREFIX}') -    retry_cmd('bin/smbclient -L ${HOSTNAME}.${WINDOWS_DC4_REALM} -Uadministrator@${WINDOWS_DC4_REALM}%${WINDOWS_DC4_PASS}', ["C$", "IPC$", "Sharename"]) -    cmd_contains("host -t A ${HOSTNAME}.${WINDOWS_DC4_REALM}.", ['has address']) -    port_wait("${WINDOWS_DC4}", 23) -    child = open_telnet("${WINDOWS_DC4}", "${WINDOWS_DC4_DOMAIN}\\administrator", "${WINDOWS_DC4_PASS}", set_time=True) +    t.chdir('${PREFIX}') +    t.retry_cmd('bin/smbclient -L ${HOSTNAME}.${WINDOWS_DC4_REALM} -Uadministrator@${WINDOWS_DC4_REALM}%${WINDOWS_DC4_PASS}', ["C$", "IPC$", "Sharename"]) +    t.cmd_contains("host -t A ${HOSTNAME}.${WINDOWS_DC4_REALM}.", ['has address']) +    t.port_wait("${WINDOWS_DC4}", 23) +    child = t.open_telnet("${WINDOWS_DC4}", "${WINDOWS_DC4_DOMAIN}\\administrator", "${WINDOWS_DC4_PASS}", set_time=True)      print("Forcing kcc runs, and replication") -    run_cmd('bin/samba-tool drs kcc ${WINDOWS_DC4} -Uadministrator@${WINDOWS_DC4_REALM}%${WINDOWS_DC4_PASS}') -    run_cmd('bin/samba-tool drs kcc ${HOSTNAME} -Uadministrator@${WINDOWS_DC4_REALM}%${WINDOWS_DC4_PASS}') +    t.run_cmd('bin/samba-tool drs kcc ${WINDOWS_DC4} -Uadministrator@${WINDOWS_DC4_REALM}%${WINDOWS_DC4_PASS}') +    t.run_cmd('bin/samba-tool drs kcc ${HOSTNAME} -Uadministrator@${WINDOWS_DC4_REALM}%${WINDOWS_DC4_PASS}') -    do_kinit("administrator@${WINDOWS_DC4_REALM}", "${WINDOWS_DC4_PASS}") +    t.kinit("administrator@${WINDOWS_DC4_REALM}", "${WINDOWS_DC4_PASS}")      for nc in [ '${WINDOWS_DC4_BASEDN}', 'CN=Configuration,${WINDOWS_DC4_BASEDN}', 'CN=Schema,CN=Configuration,${WINDOWS_DC4_BASEDN}' ]: -        cmd_contains("bin/samba-tool drs replicate ${HOSTNAME} ${WINDOWS_DC4} %s -k yes" % nc, ["was successful"]) -        cmd_contains("bin/samba-tool drs replicate ${WINDOWS_DC4} ${HOSTNAME} %s -k yes" % nc, ["was successful"]) +        t.cmd_contains("bin/samba-tool drs replicate ${HOSTNAME} ${WINDOWS_DC4} %s -k yes" % nc, ["was successful"]) +        t.cmd_contains("bin/samba-tool drs replicate ${WINDOWS_DC4} ${HOSTNAME} %s -k yes" % nc, ["was successful"])      child.sendline("net use t: \\\\${HOSTNAME}.${WINDOWS_DC4_REALM}\\test")      child.expect("The command completed successfully") @@ -632,30 +454,28 @@ def test_vampire_w2k3():      child.expect("was successful")      print("Checking if new users propogate to windows") -    run_cmd('bin/samba-tool newuser test2 ${PASSWORD2}') -    retry_cmd("bin/smbclient -L ${WINDOWS_DC4} -Utest2%${PASSWORD2} -k no", ['Sharename', 'Remote IPC']) -    retry_cmd("bin/smbclient -L ${WINDOWS_DC4} -Utest2%${PASSWORD2} -k yes", ['Sharename', 'Remote IPC']) +    t.run_cmd('bin/samba-tool newuser test2 ${PASSWORD2}') +    t.retry_cmd("bin/smbclient -L ${WINDOWS_DC4} -Utest2%${PASSWORD2} -k no", ['Sharename', 'Remote IPC']) +    t.retry_cmd("bin/smbclient -L ${WINDOWS_DC4} -Utest2%${PASSWORD2} -k yes", ['Sharename', 'Remote IPC'])      print("Checking if new users on windows propogate to samba")      child.sendline("net user test3 ${PASSWORD3} /add")      child.expect("The command completed successfully") -    retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest2%${PASSWORD2} -k no", ['Sharename', 'IPC']) -    retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest2%${PASSWORD2} -k yes", ['Sharename', 'IPC']) +    t.retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest2%${PASSWORD2} -k no", ['Sharename', 'IPC']) +    t.retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest2%${PASSWORD2} -k yes", ['Sharename', 'IPC'])      print("Checking propogation of user deletion") -    run_cmd('bin/samba-tool user delete test2 -Uadministrator@${WINDOWS_DC4_REALM}%${WINDOWS_DC4_PASS}') +    t.run_cmd('bin/samba-tool user delete test2 -Uadministrator@${WINDOWS_DC4_REALM}%${WINDOWS_DC4_PASS}')      child.sendline("net user test3 /del")      child.expect("The command completed successfully") -    retry_cmd("bin/smbclient -L ${WINDOWS_DC4} -Utest2%${PASSWORD2} -k no", ['LOGON_FAILURE']) -    retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest2%${PASSWORD2} -k no", ['LOGON_FAILURE']) -    retry_cmd("bin/smbclient -L ${WINDOWS_DC4} -Utest2%${PASSWORD2} -k yes", ['LOGON_FAILURE']) -    retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest2%${PASSWORD2} -k yes", ['LOGON_FAILURE']) -    vm_poweroff("${WINDOWS_DC4_VM}") - +    t.retry_cmd("bin/smbclient -L ${WINDOWS_DC4} -Utest2%${PASSWORD2} -k no", ['LOGON_FAILURE']) +    t.retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest2%${PASSWORD2} -k no", ['LOGON_FAILURE']) +    t.retry_cmd("bin/smbclient -L ${WINDOWS_DC4} -Utest2%${PASSWORD2} -k yes", ['LOGON_FAILURE']) +    t.retry_cmd("bin/smbclient -L ${HOSTNAME} -Utest2%${PASSWORD2} -k yes", ['LOGON_FAILURE']) +    t.vm_poweroff("${WINDOWS_DC4_VM}") -os.putenv('PYTHONUNBUFFERED', '1')  opts, args = parser.parse_args() @@ -663,38 +483,40 @@ if not opts.conf:      print("Please specify a config file with --conf")      sys.exit(1) -load_config(opts.conf) - -check_prerequesites() -build_s4('${PREFIX}') -provision_s4() -create_shares() -start_s4('${PREFIX}', interfaces='${INTERFACES}') -test_smbclient() -restart_bind() -test_dns() -test_kerberos() -test_dyndns() - -join_win7() -test_win7() - -join_w2k8_rodc() -test_w2k8_rodc() - -join_w2k8() -test_w2k8() - -vampire_w2k8() -create_shares() -start_s4('${PREFIX}', interfaces='${INTERFACES}') -test_dyndns() -test_vampire() - -vampire_w2k3() -create_shares() -start_s4('${PREFIX}', interfaces='${INTERFACES}') -test_dyndns() -test_vampire_w2k3() +t = wintest.wintest() +t.load_config(opts.conf) + +check_prerequesites(t) + +build_s4(t) +provision_s4(t) +create_shares(t) +start_s4(t, interfaces='${INTERFACES}') +test_smbclient(t) +restart_bind(t) +test_dns(t) +test_kerberos(t) +test_dyndns(t) + +join_win7(t) +test_win7(t) + +join_w2k8_rodc(t) +test_w2k8_rodc(t) + +join_w2k8(t) +test_w2k8(t) + +vampire_w2k8(t) +create_shares(t) +start_s4(t, interfaces='${INTERFACES}') +test_dyndns(t) +test_vampire(t) + +vampire_w2k3(t) +create_shares(t) +start_s4(t, interfaces='${INTERFACES}') +test_dyndns(t) +test_vampire_w2k3(t)  print("All OK") diff --git a/source4/scripting/devel/howto/wintest.py b/source4/scripting/devel/howto/wintest.py new file mode 100644 index 0000000000..13424ef2f3 --- /dev/null +++ b/source4/scripting/devel/howto/wintest.py @@ -0,0 +1,220 @@ +#!/usr/bin/env python + +'''automated testing library for testing Samba against windows''' + +import pexpect, subprocess +import sys, os, time + +class wintest(): +    '''testing of Samba against windows VMs''' + +    def __init__(self): +        self.vars = {} +        os.putenv('PYTHONUNBUFFERED', '1') + +    def setvar(self, varname, value): +        '''set a substitution variable''' +        self.vars[varname] = value + +    def load_config(self, fname): +        '''load the config file''' +        f = open(fname) +        for line in f: +            line = line.strip() +            if len(line) == 0 or line[0] == '#': +                continue +            colon = line.find(':') +            if colon == -1: +                raise RuntimeError("Invalid config line '%s'" % line) +            varname = line[0:colon].strip() +            value   = line[colon+1:].strip() +            self.setvar(varname, value) + +    def substitute(self, text): +        """Substitute strings of the form ${NAME} in text, replacing +        with substitutions from vars. +        """ +        if isinstance(text, list): +            ret = text[:] +            for i in range(len(ret)): +                ret[i] = self.substitute(ret[i]) +            return ret + +        while True: +            var_start = text.find("${") +            if var_start == -1: +                return text +            var_end = text.find("}", var_start) +            if var_end == -1: +                return text +            var_name = text[var_start+2:var_end] +            if not var_name in self.vars: +                raise RuntimeError("Unknown substitution variable ${%s}" % var_name) +            text = text.replace("${%s}" % var_name, self.vars[var_name]) +        return text + +    def putenv(self, key, value): +        '''putenv with substitution''' +        os.putenv(key, self.substitute(value)) + +    def chdir(self, dir): +        '''chdir with substitution''' +        os.chdir(self.substitute(dir)) + + +    def run_cmd(self, cmd, dir=".", show=None, output=False, checkfail=True): +        cmd = self.substitute(cmd) +        if isinstance(cmd, list): +            print('$ ' + " ".join(cmd)) +        else: +            print('$ ' + cmd) +        if output: +            return subprocess.Popen([cmd], shell=True, stdout=subprocess.PIPE, stderr=subprocess.STDOUT, cwd=dir).communicate()[0] +        if isinstance(cmd, list): +            shell=False +        else: +            shell=True +        if checkfail: +            return subprocess.check_call(cmd, shell=shell, cwd=dir) +        else: +            return subprocess.call(cmd, shell=shell, cwd=dir) + + +    def cmd_output(self, cmd): +        '''return output from and command''' +        cmd = self.substitute(cmd) +        return self.run_cmd(cmd, output=True) + +    def cmd_contains(self, cmd, contains, nomatch=False, ordered=False): +        '''check that command output contains the listed strings''' +        out = self.cmd_output(cmd) +        print out +        for c in self.substitute(contains): +            ofs = out.find(c) +            if nomatch: +                if ofs != -1: +                    raise RuntimeError("Expected to not see %s in %s" % (c, cmd)) +            else: +                if ofs == -1: +                    raise RuntimeError("Expected to see %s in %s" % (c, cmd)) +            if ordered and ofs != -1: +                ofs += len(c) +                out = out[ofs:] + +    def retry_cmd(self, cmd, contains, retries=30, delay=2, wait_for_fail=False): +        '''retry a command a number of times''' +        while retries > 0: +            try: +                self.cmd_contains(cmd, contains, nomatch=wait_for_fail) +                return +            except: +                time.sleep(delay) +                retries = retries - 1 +        raise RuntimeError("Failed to find %s" % contains) + +    def pexpect_spawn(self, cmd, timeout=60): +        '''wrapper around pexpect spawn''' +        cmd = self.substitute(cmd) +        print("$ " + cmd) +        ret = pexpect.spawn(cmd, logfile=sys.stdout, timeout=timeout) + +        def sendline_sub(line): +            line = self.substitute(line).replace('\n', '\r\n') +            return ret.old_sendline(line + '\r') + +        def expect_sub(line, timeout=ret.timeout): +            line = self.substitute(line) +            return ret.old_expect(line, timeout=timeout) + +        ret.old_sendline = ret.sendline +        ret.sendline = sendline_sub +        ret.old_expect = ret.expect +        ret.expect = expect_sub + +        return ret + +    def vm_poweroff(self, vmname, checkfail=True): +        '''power off a VM''' +        self.setvar('VMNAME', vmname) +        self.run_cmd("${VM_POWEROFF}", checkfail=checkfail) + +    def vm_restore(self, vmname, snapshot): +        '''restore a VM''' +        self.setvar('VMNAME', vmname) +        self.setvar('SNAPSHOT', snapshot) +        self.run_cmd("${VM_RESTORE}") + +    def ping_wait(self, hostname): +        '''wait for a hostname to come up on the network''' +        hostname = self.substitute(hostname) +        loops=10 +        while loops > 0: +            try: +                self.run_cmd("ping -c 1 -w 10 %s" % hostname) +                break +            except: +                loops = loops - 1 +        if loops == 0: +            raise RuntimeError("Failed to ping %s" % hostname) +        print("Host %s is up" % hostname) + +    def port_wait(self, hostname, port, retries=100, delay=2, wait_for_fail=False): +        '''wait for a host to come up on the network''' +        self.retry_cmd("nc -v -z -w 1 %s %u" % (hostname, port), ['succeeded'], +                       retries=retries, delay=delay, wait_for_fail=wait_for_fail) + +    def run_net_time(self, child): +        '''run net time on windows''' +        child.sendline("net time \\\\${HOSTNAME} /set") +        child.expect("Do you want to set the local computer") +        child.sendline("Y") +        child.expect("The command completed successfully") + +    def run_date_time(self, child, time_tuple=None): +        '''run date and time on windows''' +        if time_tuple is None: +            time_tuple = time.localtime() +        child.sendline("date") +        child.expect("Enter the new date:") +        child.sendline(time.strftime("%m-%d-%y", time_tuple)) +        child.expect("C:") +        child.sendline("time") +        child.expect("Enter the new time:") +        child.sendline(time.strftime("%H:%M:%S", time_tuple)) +        child.expect("C:") + + +    def open_telnet(self, hostname, username, password, retries=30, delay=3, set_time=False): +        '''open a telnet connection to a windows server, return the pexpect child''' +        while retries > 0: +            child = self.pexpect_spawn("telnet " + hostname + " -l '" + username + "'") +            i = child.expect(["Welcome to Microsoft Telnet Service", +                              "No more connections are allowed to telnet server", +                              "Unable to connect to remote host", +                              "No route to host"]) +            if i != 0: +                child.close() +                time.sleep(delay) +                retries -= 1 +                continue +            child.expect("password:") +            child.sendline(password) +            child.expect("C:") +            if set_time: +                self.run_date_time(child, None) +            return child +        raise RuntimeError("Failed to connect with telnet") + +    def kinit(self, username, password): +        '''use kinit to setup a credentials cache''' +        self.run_cmd("kdestroy") +        self.putenv('KRB5CCNAME', "${PREFIX}/ccache.test") +        username = self.substitute(username) +        s = username.split('@') +        if len(s) > 0: +            s[1] = s[1].upper() +        username = '@'.join(s) +        child = self.pexpect_spawn('kinit -V ' + username) +        child.expect("Password for") +        child.sendline(password) +        child.expect("Authenticated to Kerberos") | 
