s4: torture: Add a TALLOC_CTX * to torture_smb2_read_init().
[kai/samba-autobuild/.git] / source4 / torture / smb2 / read.c
index c1105a9d26226ad3a45fd481c32a14b3c9113d88..4bf3bb74be0a39ca2f05e6cf329975717f4d980c 100644 (file)
@@ -226,17 +226,91 @@ done:
        return ret;
 }
 
+static bool test_read_access(struct torture_context *torture,
+                            struct smb2_tree *tree)
+{
+       bool ret = true;
+       NTSTATUS status;
+       struct smb2_handle h;
+       uint8_t buf[64 * 1024];
+       struct smb2_read rd;
+       TALLOC_CTX *tmp_ctx = talloc_new(tree);
+
+       ZERO_STRUCT(buf);
+
+       /* create a file */
+       smb2_util_unlink(tree, FNAME);
+
+       status = torture_smb2_testfile(tree, FNAME, &h);
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       status = smb2_util_write(tree, h, buf, 0, ARRAY_SIZE(buf));
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       status = smb2_util_close(tree, h);
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       /* open w/ READ access - success */
+       status = torture_smb2_testfile_access(
+           tree, FNAME, &h, SEC_FILE_READ_ATTRIBUTE | SEC_FILE_READ_DATA);
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       ZERO_STRUCT(rd);
+       rd.in.file.handle = h;
+       rd.in.length = 5;
+       rd.in.offset = 0;
+       status = smb2_read(tree, tree, &rd);
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       status = smb2_util_close(tree, h);
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       /* open w/ EXECUTE access - success */
+       status = torture_smb2_testfile_access(
+           tree, FNAME, &h, SEC_FILE_READ_ATTRIBUTE | SEC_FILE_EXECUTE);
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       ZERO_STRUCT(rd);
+       rd.in.file.handle = h;
+       rd.in.length = 5;
+       rd.in.offset = 0;
+       status = smb2_read(tree, tree, &rd);
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       status = smb2_util_close(tree, h);
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       /* open without READ or EXECUTE access - access denied */
+       status = torture_smb2_testfile_access(tree, FNAME, &h,
+                                             SEC_FILE_READ_ATTRIBUTE);
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+       ZERO_STRUCT(rd);
+       rd.in.file.handle = h;
+       rd.in.length = 5;
+       rd.in.offset = 0;
+       status = smb2_read(tree, tree, &rd);
+       CHECK_STATUS(status, NT_STATUS_ACCESS_DENIED);
+
+       status = smb2_util_close(tree, h);
+       CHECK_STATUS(status, NT_STATUS_OK);
+
+done:
+       talloc_free(tmp_ctx);
+       return ret;
+}
 
 /* 
    basic testing of SMB2 read
 */
-struct torture_suite *torture_smb2_read_init(void)
+struct torture_suite *torture_smb2_read_init(TALLOC_CTX *ctx)
 {
-       struct torture_suite *suite = torture_suite_create(talloc_autofree_context(), "read");
+       struct torture_suite *suite = torture_suite_create(ctx, "read");
 
        torture_suite_add_1smb2_test(suite, "eof", test_read_eof);
        torture_suite_add_1smb2_test(suite, "position", test_read_position);
        torture_suite_add_1smb2_test(suite, "dir", test_read_dir);
+       torture_suite_add_1smb2_test(suite, "access", test_read_access);
 
        suite->description = talloc_strdup(suite, "SMB2-READ tests");