1 # Unix SMB/CIFS implementation.
2 # Copyright (C) Jelmer Vernooij <jelmer@samba.org> 2007
4 # This program is free software; you can redistribute it and/or modify
5 # it under the terms of the GNU General Public License as published by
6 # the Free Software Foundation; either version 3 of the License, or
7 # (at your option) any later version.
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
14 # You should have received a copy of the GNU General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
18 """Tests for samba.dcerpc.security."""
21 from samba.dcerpc import security
22 from samba.security import access_check
23 from samba import ntstatus
24 from samba import NTSTATUSError
27 class SecurityTokenTests(samba.tests.TestCase):
30 super(SecurityTokenTests, self).setUp()
31 self.token = security.token()
33 def test_is_system(self):
34 self.assertFalse(self.token.is_system())
36 def test_is_anonymous(self):
37 self.assertFalse(self.token.is_anonymous())
39 def test_has_builtin_administrators(self):
40 self.assertFalse(self.token.has_builtin_administrators())
42 def test_has_nt_authenticated_users(self):
43 self.assertFalse(self.token.has_nt_authenticated_users())
45 def test_has_priv(self):
46 self.assertFalse(self.token.has_privilege(security.SEC_PRIV_SHUTDOWN))
48 def test_set_priv(self):
49 self.assertFalse(self.token.has_privilege(security.SEC_PRIV_SHUTDOWN))
50 self.assertFalse(self.token.set_privilege(security.SEC_PRIV_SHUTDOWN))
51 self.assertTrue(self.token.has_privilege(security.SEC_PRIV_SHUTDOWN))
54 class SecurityDescriptorTests(samba.tests.TestCase):
57 super(SecurityDescriptorTests, self).setUp()
58 self.descriptor = security.descriptor()
60 def test_from_sddl(self):
61 desc = security.descriptor.from_sddl("O:AOG:DAD:(A;;RPWPCCDCLCSWRCWDWOGA;;;S-1-0-0)", security.dom_sid("S-2-0-0"))
62 self.assertEquals(desc.group_sid, security.dom_sid('S-2-0-0-512'))
63 self.assertEquals(desc.owner_sid, security.dom_sid('S-1-5-32-548'))
64 self.assertEquals(desc.revision, 1)
65 self.assertEquals(desc.sacl, None)
66 self.assertEquals(desc.type, 0x8004)
68 def test_from_sddl_invalidsddl(self):
69 self.assertRaises(TypeError, security.descriptor.from_sddl, "foo", security.dom_sid("S-2-0-0"))
71 def test_from_sddl_invalidtype1(self):
72 self.assertRaises(TypeError, security.descriptor.from_sddl, security.dom_sid('S-2-0-0-512'), security.dom_sid("S-2-0-0"))
74 def test_from_sddl_invalidtype2(self):
75 sddl = "O:AOG:DAD:(A;;RPWPCCDCLCSWRCWDWOGA;;;S-1-0-0)"
76 self.assertRaises(TypeError, security.descriptor.from_sddl, sddl,
79 def test_as_sddl(self):
80 text = "O:AOG:DAD:(A;;RPWPCCDCLCSWRCWDWOGA;;;S-1-0-0)"
81 dom = security.dom_sid("S-2-0-0")
82 desc1 = security.descriptor.from_sddl(text, dom)
83 desc2 = security.descriptor.from_sddl(desc1.as_sddl(dom), dom)
84 self.assertEquals(desc1.group_sid, desc2.group_sid)
85 self.assertEquals(desc1.owner_sid, desc2.owner_sid)
86 self.assertEquals(desc1.sacl, desc2.sacl)
87 self.assertEquals(desc1.type, desc2.type)
89 def test_as_sddl_invalid(self):
90 text = "O:AOG:DAD:(A;;RPWPCCDCLCSWRCWDWOGA;;;S-1-0-0)"
91 dom = security.dom_sid("S-2-0-0")
92 desc1 = security.descriptor.from_sddl(text, dom)
93 self.assertRaises(TypeError, desc1.as_sddl, text)
96 def test_as_sddl_no_domainsid(self):
97 dom = security.dom_sid("S-2-0-0")
98 text = "O:AOG:DAD:(A;;RPWPCCDCLCSWRCWDWOGA;;;S-1-0-0)"
99 desc1 = security.descriptor.from_sddl(text, dom)
100 desc2 = security.descriptor.from_sddl(desc1.as_sddl(), dom)
101 self.assertEquals(desc1.group_sid, desc2.group_sid)
102 self.assertEquals(desc1.owner_sid, desc2.owner_sid)
103 self.assertEquals(desc1.sacl, desc2.sacl)
104 self.assertEquals(desc1.type, desc2.type)
106 def test_domsid_nodomsid_as_sddl(self):
107 dom = security.dom_sid("S-2-0-0")
108 text = "O:AOG:DAD:(A;;RPWPCCDCLCSWRCWDWOGA;;;S-1-0-0)"
109 desc1 = security.descriptor.from_sddl(text, dom)
110 self.assertNotEqual(desc1.as_sddl(), desc1.as_sddl(dom))
112 def test_split(self):
113 dom = security.dom_sid("S-2-0-7")
114 self.assertEquals((security.dom_sid("S-2-0"), 7), dom.split())
117 class DomSidTests(samba.tests.TestCase):
119 def test_parse_sid(self):
120 sid = security.dom_sid("S-1-5-21")
121 self.assertEquals("S-1-5-21", str(sid))
123 def test_sid_equal(self):
124 sid1 = security.dom_sid("S-1-5-21")
125 sid2 = security.dom_sid("S-1-5-21")
126 self.assertEquals(sid1, sid1)
127 self.assertEquals(sid1, sid2)
129 def test_random(self):
130 sid = security.random_sid()
131 self.assertTrue(str(sid).startswith("S-1-5-21-"))
134 sid = security.random_sid()
135 self.assertTrue(repr(sid).startswith("dom_sid('S-1-5-21-"))
138 class PrivilegeTests(samba.tests.TestCase):
140 def test_privilege_name(self):
141 self.assertEquals("SeShutdownPrivilege",
142 security.privilege_name(security.SEC_PRIV_SHUTDOWN))
144 def test_privilege_id(self):
145 self.assertEquals(security.SEC_PRIV_SHUTDOWN,
146 security.privilege_id("SeShutdownPrivilege"))
149 class CheckAccessTests(samba.tests.TestCase):
151 def test_check_access(self):
152 desc = security.descriptor.from_sddl("O:AOG:DAD:(A;;RPWPCCDCLCSWRCWDWOGA;;;S-1-0-0)", security.dom_sid("S-2-0-0"))
153 token = security.token()
155 self.assertEqual(access_check(desc, token, 0), 0)
158 (security.SEC_FLAG_SYSTEM_SECURITY,
159 ntstatus.NT_STATUS_PRIVILEGE_NOT_HELD),
160 (security.SEC_STD_READ_CONTROL, ntstatus.NT_STATUS_ACCESS_DENIED)
163 for arg, num in params:
165 result = access_check(desc, token, arg)
166 except Exception as e:
167 self.assertTrue(isinstance(e, NTSTATUSError))
168 e_num, e_msg = e.args
169 self.assertEqual(num, e_num)