s4-torture: Add handlers to block channels for testing
authorSachin Prabhu <sprabhu@redhat.com>
Thu, 28 Feb 2019 12:51:02 +0000 (12:51 +0000)
committerJeremy Allison <jra@samba.org>
Fri, 19 Apr 2019 17:27:13 +0000 (17:27 +0000)
commit3dc532cbe0fd2b3314b832f5d73d09a86e241fe7
treec4e4e2e8483dc4fe746961ebe3028fd57efc6b15
parent018845d49cd29c392127f84364698ea1722dba8b
s4-torture: Add handlers to block channels for testing

We use two methods to block channels

1) Simply ignore incoming oplock break requests and do not respond to
them.
This method doesn't work against Microsoft Windows based servers which
rely on the tcp stack for confirmation that the oplock break command was
sent to the client machine. This is meant to be used with samba servers
and is the default method.

2) Use iptables to block the channel.
The method requires the use of a privileged account and can only be used
on Linux systems with iptables installed. To use this blocking method,
pass the option
--option=torture:use_iptables=true

Signed-off-by: Guenther Deschner <gd@samba.org>
Signed-off-by: Sachin Prabhu <sprabhu@redhat.com>
Reviewed-by: Jeremy Allison <jra@samba.org>
source4/torture/smb2/multichannel.c