1 | #!/usr/bin/env python
|
---|
2 |
|
---|
3 | '''automated testing library for testing Samba against windows'''
|
---|
4 |
|
---|
5 | import pexpect, subprocess
|
---|
6 | import optparse
|
---|
7 | import sys, os, time, re
|
---|
8 |
|
---|
9 | class wintest():
|
---|
10 | '''testing of Samba against windows VMs'''
|
---|
11 |
|
---|
12 | def __init__(self):
|
---|
13 | self.vars = {}
|
---|
14 | self.list_mode = False
|
---|
15 | self.vms = None
|
---|
16 | os.environ['PYTHONUNBUFFERED'] = '1'
|
---|
17 | self.parser = optparse.OptionParser("wintest")
|
---|
18 |
|
---|
19 | def check_prerequesites(self):
|
---|
20 | self.info("Checking prerequesites")
|
---|
21 | self.setvar('HOSTNAME', self.cmd_output("hostname -s").strip())
|
---|
22 | if os.getuid() != 0:
|
---|
23 | raise Exception("You must run this script as root")
|
---|
24 | self.run_cmd('ifconfig ${INTERFACE} ${INTERFACE_NET} up')
|
---|
25 | if self.getvar('INTERFACE_IPV6'):
|
---|
26 | self.run_cmd('ifconfig ${INTERFACE} inet6 del ${INTERFACE_IPV6}/64', checkfail=False)
|
---|
27 | self.run_cmd('ifconfig ${INTERFACE} inet6 add ${INTERFACE_IPV6}/64 up')
|
---|
28 |
|
---|
29 | self.run_cmd('ifconfig ${NAMED_INTERFACE} ${NAMED_INTERFACE_NET} up')
|
---|
30 | if self.getvar('NAMED_INTERFACE_IPV6'):
|
---|
31 | self.run_cmd('ifconfig ${NAMED_INTERFACE} inet6 del ${NAMED_INTERFACE_IPV6}/64', checkfail=False)
|
---|
32 | self.run_cmd('ifconfig ${NAMED_INTERFACE} inet6 add ${NAMED_INTERFACE_IPV6}/64 up')
|
---|
33 |
|
---|
34 | def stop_vms(self):
|
---|
35 | '''Shut down any existing alive VMs, so they do not collide with what we are doing'''
|
---|
36 | self.info('Shutting down any of our VMs already running')
|
---|
37 | vms = self.get_vms()
|
---|
38 | for v in vms:
|
---|
39 | self.vm_poweroff(v, checkfail=False)
|
---|
40 |
|
---|
41 | def setvar(self, varname, value):
|
---|
42 | '''set a substitution variable'''
|
---|
43 | self.vars[varname] = value
|
---|
44 |
|
---|
45 | def getvar(self, varname):
|
---|
46 | '''return a substitution variable'''
|
---|
47 | if not varname in self.vars:
|
---|
48 | return None
|
---|
49 | return self.vars[varname]
|
---|
50 |
|
---|
51 | def setwinvars(self, vm, prefix='WIN'):
|
---|
52 | '''setup WIN_XX vars based on a vm name'''
|
---|
53 | for v in ['VM', 'HOSTNAME', 'USER', 'PASS', 'SNAPSHOT', 'REALM', 'DOMAIN', 'IP']:
|
---|
54 | vname = '%s_%s' % (vm, v)
|
---|
55 | if vname in self.vars:
|
---|
56 | self.setvar("%s_%s" % (prefix,v), self.substitute("${%s}" % vname))
|
---|
57 | else:
|
---|
58 | self.vars.pop("%s_%s" % (prefix,v), None)
|
---|
59 |
|
---|
60 | if self.getvar("WIN_REALM"):
|
---|
61 | self.setvar("WIN_REALM", self.getvar("WIN_REALM").upper())
|
---|
62 | self.setvar("WIN_LCREALM", self.getvar("WIN_REALM").lower())
|
---|
63 | dnsdomain = self.getvar("WIN_REALM")
|
---|
64 | self.setvar("WIN_BASEDN", "DC=" + dnsdomain.replace(".", ",DC="))
|
---|
65 | if self.getvar("WIN_USER") is None:
|
---|
66 | self.setvar("WIN_USER", "administrator")
|
---|
67 |
|
---|
68 | def info(self, msg):
|
---|
69 | '''print some information'''
|
---|
70 | if not self.list_mode:
|
---|
71 | print(self.substitute(msg))
|
---|
72 |
|
---|
73 | def load_config(self, fname):
|
---|
74 | '''load the config file'''
|
---|
75 | f = open(fname)
|
---|
76 | for line in f:
|
---|
77 | line = line.strip()
|
---|
78 | if len(line) == 0 or line[0] == '#':
|
---|
79 | continue
|
---|
80 | colon = line.find(':')
|
---|
81 | if colon == -1:
|
---|
82 | raise RuntimeError("Invalid config line '%s'" % line)
|
---|
83 | varname = line[0:colon].strip()
|
---|
84 | value = line[colon+1:].strip()
|
---|
85 | self.setvar(varname, value)
|
---|
86 |
|
---|
87 | def list_steps_mode(self):
|
---|
88 | '''put wintest in step listing mode'''
|
---|
89 | self.list_mode = True
|
---|
90 |
|
---|
91 | def set_skip(self, skiplist):
|
---|
92 | '''set a list of tests to skip'''
|
---|
93 | self.skiplist = skiplist.split(',')
|
---|
94 |
|
---|
95 | def set_vms(self, vms):
|
---|
96 | '''set a list of VMs to test'''
|
---|
97 | if vms is not None:
|
---|
98 | self.vms = []
|
---|
99 | for vm in vms.split(','):
|
---|
100 | vm = vm.upper()
|
---|
101 | self.vms.append(vm)
|
---|
102 |
|
---|
103 | def skip(self, step):
|
---|
104 | '''return True if we should skip a step'''
|
---|
105 | if self.list_mode:
|
---|
106 | print("\t%s" % step)
|
---|
107 | return True
|
---|
108 | return step in self.skiplist
|
---|
109 |
|
---|
110 | def substitute(self, text):
|
---|
111 | """Substitute strings of the form ${NAME} in text, replacing
|
---|
112 | with substitutions from vars.
|
---|
113 | """
|
---|
114 | if isinstance(text, list):
|
---|
115 | ret = text[:]
|
---|
116 | for i in range(len(ret)):
|
---|
117 | ret[i] = self.substitute(ret[i])
|
---|
118 | return ret
|
---|
119 |
|
---|
120 | """We may have objects such as pexpect.EOF that are not strings"""
|
---|
121 | if not isinstance(text, str):
|
---|
122 | return text
|
---|
123 | while True:
|
---|
124 | var_start = text.find("${")
|
---|
125 | if var_start == -1:
|
---|
126 | return text
|
---|
127 | var_end = text.find("}", var_start)
|
---|
128 | if var_end == -1:
|
---|
129 | return text
|
---|
130 | var_name = text[var_start+2:var_end]
|
---|
131 | if not var_name in self.vars:
|
---|
132 | raise RuntimeError("Unknown substitution variable ${%s}" % var_name)
|
---|
133 | text = text.replace("${%s}" % var_name, self.vars[var_name])
|
---|
134 | return text
|
---|
135 |
|
---|
136 | def have_var(self, varname):
|
---|
137 | '''see if a variable has been set'''
|
---|
138 | return varname in self.vars
|
---|
139 |
|
---|
140 | def have_vm(self, vmname):
|
---|
141 | '''see if a VM should be used'''
|
---|
142 | if not self.have_var(vmname + '_VM'):
|
---|
143 | return False
|
---|
144 | if self.vms is None:
|
---|
145 | return True
|
---|
146 | return vmname in self.vms
|
---|
147 |
|
---|
148 | def putenv(self, key, value):
|
---|
149 | '''putenv with substitution'''
|
---|
150 | os.environ[key] = self.substitute(value)
|
---|
151 |
|
---|
152 | def chdir(self, dir):
|
---|
153 | '''chdir with substitution'''
|
---|
154 | os.chdir(self.substitute(dir))
|
---|
155 |
|
---|
156 | def del_files(self, dirs):
|
---|
157 | '''delete all files in the given directory'''
|
---|
158 | for d in dirs:
|
---|
159 | self.run_cmd("find %s -type f | xargs rm -f" % d)
|
---|
160 |
|
---|
161 | def write_file(self, filename, text, mode='w'):
|
---|
162 | '''write to a file'''
|
---|
163 | f = open(self.substitute(filename), mode=mode)
|
---|
164 | f.write(self.substitute(text))
|
---|
165 | f.close()
|
---|
166 |
|
---|
167 | def run_cmd(self, cmd, dir=".", show=None, output=False, checkfail=True):
|
---|
168 | '''run a command'''
|
---|
169 | cmd = self.substitute(cmd)
|
---|
170 | if isinstance(cmd, list):
|
---|
171 | self.info('$ ' + " ".join(cmd))
|
---|
172 | else:
|
---|
173 | self.info('$ ' + cmd)
|
---|
174 | if output:
|
---|
175 | return subprocess.Popen([cmd], shell=True, stdout=subprocess.PIPE, stderr=subprocess.STDOUT, cwd=dir).communicate()[0]
|
---|
176 | if isinstance(cmd, list):
|
---|
177 | shell=False
|
---|
178 | else:
|
---|
179 | shell=True
|
---|
180 | if checkfail:
|
---|
181 | return subprocess.check_call(cmd, shell=shell, cwd=dir)
|
---|
182 | else:
|
---|
183 | return subprocess.call(cmd, shell=shell, cwd=dir)
|
---|
184 |
|
---|
185 |
|
---|
186 | def run_child(self, cmd, dir="."):
|
---|
187 | '''create a child and return the Popen handle to it'''
|
---|
188 | cwd = os.getcwd()
|
---|
189 | cmd = self.substitute(cmd)
|
---|
190 | if isinstance(cmd, list):
|
---|
191 | self.info('$ ' + " ".join(cmd))
|
---|
192 | else:
|
---|
193 | self.info('$ ' + cmd)
|
---|
194 | if isinstance(cmd, list):
|
---|
195 | shell=False
|
---|
196 | else:
|
---|
197 | shell=True
|
---|
198 | os.chdir(dir)
|
---|
199 | ret = subprocess.Popen(cmd, shell=shell, stderr=subprocess.STDOUT)
|
---|
200 | os.chdir(cwd)
|
---|
201 | return ret
|
---|
202 |
|
---|
203 | def cmd_output(self, cmd):
|
---|
204 | '''return output from and command'''
|
---|
205 | cmd = self.substitute(cmd)
|
---|
206 | return self.run_cmd(cmd, output=True)
|
---|
207 |
|
---|
208 | def cmd_contains(self, cmd, contains, nomatch=False, ordered=False, regex=False,
|
---|
209 | casefold=True):
|
---|
210 | '''check that command output contains the listed strings'''
|
---|
211 |
|
---|
212 | if isinstance(contains, str):
|
---|
213 | contains = [contains]
|
---|
214 |
|
---|
215 | out = self.cmd_output(cmd)
|
---|
216 | self.info(out)
|
---|
217 | for c in self.substitute(contains):
|
---|
218 | if regex:
|
---|
219 | if casefold:
|
---|
220 | c = c.upper()
|
---|
221 | out = out.upper()
|
---|
222 | m = re.search(c, out)
|
---|
223 | if m is None:
|
---|
224 | start = -1
|
---|
225 | end = -1
|
---|
226 | else:
|
---|
227 | start = m.start()
|
---|
228 | end = m.end()
|
---|
229 | elif casefold:
|
---|
230 | start = out.upper().find(c.upper())
|
---|
231 | end = start + len(c)
|
---|
232 | else:
|
---|
233 | start = out.find(c)
|
---|
234 | end = start + len(c)
|
---|
235 | if nomatch:
|
---|
236 | if start != -1:
|
---|
237 | raise RuntimeError("Expected to not see %s in %s" % (c, cmd))
|
---|
238 | else:
|
---|
239 | if start == -1:
|
---|
240 | raise RuntimeError("Expected to see %s in %s" % (c, cmd))
|
---|
241 | if ordered and start != -1:
|
---|
242 | out = out[end:]
|
---|
243 |
|
---|
244 | def retry_cmd(self, cmd, contains, retries=30, delay=2, wait_for_fail=False,
|
---|
245 | ordered=False, regex=False, casefold=True):
|
---|
246 | '''retry a command a number of times'''
|
---|
247 | while retries > 0:
|
---|
248 | try:
|
---|
249 | self.cmd_contains(cmd, contains, nomatch=wait_for_fail,
|
---|
250 | ordered=ordered, regex=regex, casefold=casefold)
|
---|
251 | return
|
---|
252 | except:
|
---|
253 | time.sleep(delay)
|
---|
254 | retries -= 1
|
---|
255 | self.info("retrying (retries=%u delay=%u)" % (retries, delay))
|
---|
256 | raise RuntimeError("Failed to find %s" % contains)
|
---|
257 |
|
---|
258 | def pexpect_spawn(self, cmd, timeout=60, crlf=True, casefold=True):
|
---|
259 | '''wrapper around pexpect spawn'''
|
---|
260 | cmd = self.substitute(cmd)
|
---|
261 | self.info("$ " + cmd)
|
---|
262 | ret = pexpect.spawn(cmd, logfile=sys.stdout, timeout=timeout)
|
---|
263 |
|
---|
264 | def sendline_sub(line):
|
---|
265 | line = self.substitute(line)
|
---|
266 | if crlf:
|
---|
267 | line = line.replace('\n', '\r\n') + '\r'
|
---|
268 | return ret.old_sendline(line)
|
---|
269 |
|
---|
270 | def expect_sub(line, timeout=ret.timeout, casefold=casefold):
|
---|
271 | line = self.substitute(line)
|
---|
272 | if casefold:
|
---|
273 | if isinstance(line, list):
|
---|
274 | for i in range(len(line)):
|
---|
275 | if isinstance(line[i], str):
|
---|
276 | line[i] = '(?i)' + line[i]
|
---|
277 | elif isinstance(line, str):
|
---|
278 | line = '(?i)' + line
|
---|
279 | return ret.old_expect(line, timeout=timeout)
|
---|
280 |
|
---|
281 | ret.old_sendline = ret.sendline
|
---|
282 | ret.sendline = sendline_sub
|
---|
283 | ret.old_expect = ret.expect
|
---|
284 | ret.expect = expect_sub
|
---|
285 |
|
---|
286 | return ret
|
---|
287 |
|
---|
288 | def get_nameserver(self):
|
---|
289 | '''Get the current nameserver from /etc/resolv.conf'''
|
---|
290 | child = self.pexpect_spawn('cat /etc/resolv.conf', crlf=False)
|
---|
291 | i = child.expect(['Generated by wintest', 'nameserver'])
|
---|
292 | if i == 0:
|
---|
293 | child.expect('your original resolv.conf')
|
---|
294 | child.expect('nameserver')
|
---|
295 | child.expect('\d+.\d+.\d+.\d+')
|
---|
296 | return child.after
|
---|
297 |
|
---|
298 | def rndc_cmd(self, cmd, checkfail=True):
|
---|
299 | '''run a rndc command'''
|
---|
300 | self.run_cmd("${RNDC} -c ${PREFIX}/etc/rndc.conf %s" % cmd, checkfail=checkfail)
|
---|
301 |
|
---|
302 | def named_supports_gssapi_keytab(self):
|
---|
303 | '''see if named supports tkey-gssapi-keytab'''
|
---|
304 | self.write_file("${PREFIX}/named.conf.test",
|
---|
305 | 'options { tkey-gssapi-keytab "test"; };')
|
---|
306 | try:
|
---|
307 | self.run_cmd("${NAMED_CHECKCONF} ${PREFIX}/named.conf.test")
|
---|
308 | except subprocess.CalledProcessError:
|
---|
309 | return False
|
---|
310 | return True
|
---|
311 |
|
---|
312 | def set_nameserver(self, nameserver):
|
---|
313 | '''set the nameserver in resolv.conf'''
|
---|
314 | self.write_file("/etc/resolv.conf.wintest", '''
|
---|
315 | # Generated by wintest, the Samba v Windows automated testing system
|
---|
316 | nameserver %s
|
---|
317 |
|
---|
318 | # your original resolv.conf appears below:
|
---|
319 | ''' % self.substitute(nameserver))
|
---|
320 | child = self.pexpect_spawn("cat /etc/resolv.conf", crlf=False)
|
---|
321 | i = child.expect(['your original resolv.conf appears below:', pexpect.EOF])
|
---|
322 | if i == 0:
|
---|
323 | child.expect(pexpect.EOF)
|
---|
324 | contents = child.before.lstrip().replace('\r', '')
|
---|
325 | self.write_file('/etc/resolv.conf.wintest', contents, mode='a')
|
---|
326 | self.write_file('/etc/resolv.conf.wintest-bak', contents)
|
---|
327 | self.run_cmd("mv -f /etc/resolv.conf.wintest /etc/resolv.conf")
|
---|
328 | self.resolv_conf_backup = '/etc/resolv.conf.wintest-bak';
|
---|
329 |
|
---|
330 | def configure_bind(self, kerberos_support=False, include=None):
|
---|
331 | self.chdir('${PREFIX}')
|
---|
332 |
|
---|
333 | if self.getvar('NAMED_INTERFACE_IPV6'):
|
---|
334 | ipv6_listen = 'listen-on-v6 port 53 { ${NAMED_INTERFACE_IPV6}; };'
|
---|
335 | else:
|
---|
336 | ipv6_listen = ''
|
---|
337 | self.setvar('BIND_LISTEN_IPV6', ipv6_listen)
|
---|
338 |
|
---|
339 | if not kerberos_support:
|
---|
340 | self.setvar("NAMED_TKEY_OPTION", "")
|
---|
341 | elif self.getvar('NAMESERVER_BACKEND') != 'SAMBA_INTERNAL':
|
---|
342 | if self.named_supports_gssapi_keytab():
|
---|
343 | self.setvar("NAMED_TKEY_OPTION",
|
---|
344 | 'tkey-gssapi-keytab "${PREFIX}/private/dns.keytab";')
|
---|
345 | else:
|
---|
346 | self.info("LCREALM=${LCREALM}")
|
---|
347 | self.setvar("NAMED_TKEY_OPTION",
|
---|
348 | '''tkey-gssapi-credential "DNS/${LCREALM}";
|
---|
349 | tkey-domain "${LCREALM}";
|
---|
350 | ''')
|
---|
351 | self.putenv('KEYTAB_FILE', '${PREFIX}/private/dns.keytab')
|
---|
352 | self.putenv('KRB5_KTNAME', '${PREFIX}/private/dns.keytab')
|
---|
353 | else:
|
---|
354 | self.setvar("NAMED_TKEY_OPTION", "")
|
---|
355 |
|
---|
356 | if include and self.getvar('NAMESERVER_BACKEND') != 'SAMBA_INTERNAL':
|
---|
357 | self.setvar("NAMED_INCLUDE", 'include "%s";' % include)
|
---|
358 | else:
|
---|
359 | self.setvar("NAMED_INCLUDE", '')
|
---|
360 |
|
---|
361 | self.run_cmd("mkdir -p ${PREFIX}/etc")
|
---|
362 |
|
---|
363 | self.write_file("etc/named.conf", '''
|
---|
364 | options {
|
---|
365 | listen-on port 53 { ${NAMED_INTERFACE_IP}; };
|
---|
366 | ${BIND_LISTEN_IPV6}
|
---|
367 | directory "${PREFIX}/var/named";
|
---|
368 | dump-file "${PREFIX}/var/named/data/cache_dump.db";
|
---|
369 | pid-file "${PREFIX}/var/named/named.pid";
|
---|
370 | statistics-file "${PREFIX}/var/named/data/named_stats.txt";
|
---|
371 | memstatistics-file "${PREFIX}/var/named/data/named_mem_stats.txt";
|
---|
372 | allow-query { any; };
|
---|
373 | recursion yes;
|
---|
374 | ${NAMED_TKEY_OPTION}
|
---|
375 | max-cache-ttl 10;
|
---|
376 | max-ncache-ttl 10;
|
---|
377 |
|
---|
378 | forward only;
|
---|
379 | forwarders {
|
---|
380 | ${DNSSERVER};
|
---|
381 | };
|
---|
382 |
|
---|
383 | };
|
---|
384 |
|
---|
385 | key "rndc-key" {
|
---|
386 | algorithm hmac-md5;
|
---|
387 | secret "lA/cTrno03mt5Ju17ybEYw==";
|
---|
388 | };
|
---|
389 |
|
---|
390 | controls {
|
---|
391 | inet ${NAMED_INTERFACE_IP} port 953
|
---|
392 | allow { any; } keys { "rndc-key"; };
|
---|
393 | };
|
---|
394 |
|
---|
395 | ${NAMED_INCLUDE}
|
---|
396 | ''')
|
---|
397 |
|
---|
398 | if self.getvar('NAMESERVER_BACKEND') == 'SAMBA_INTERNAL':
|
---|
399 | self.write_file('etc/named.conf',
|
---|
400 | '''
|
---|
401 | zone "%s" IN {
|
---|
402 | type forward;
|
---|
403 | forward only;
|
---|
404 | forwarders {
|
---|
405 | %s;
|
---|
406 | };
|
---|
407 | };
|
---|
408 | ''' % (self.getvar('LCREALM'), self.getvar('INTERFACE_IP')),
|
---|
409 | mode='a')
|
---|
410 |
|
---|
411 |
|
---|
412 | # add forwarding for the windows domains
|
---|
413 | domains = self.get_domains()
|
---|
414 |
|
---|
415 | for d in domains:
|
---|
416 | self.write_file('etc/named.conf',
|
---|
417 | '''
|
---|
418 | zone "%s" IN {
|
---|
419 | type forward;
|
---|
420 | forward only;
|
---|
421 | forwarders {
|
---|
422 | %s;
|
---|
423 | };
|
---|
424 | };
|
---|
425 | ''' % (d, domains[d]),
|
---|
426 | mode='a')
|
---|
427 |
|
---|
428 |
|
---|
429 | self.write_file("etc/rndc.conf", '''
|
---|
430 | # Start of rndc.conf
|
---|
431 | key "rndc-key" {
|
---|
432 | algorithm hmac-md5;
|
---|
433 | secret "lA/cTrno03mt5Ju17ybEYw==";
|
---|
434 | };
|
---|
435 |
|
---|
436 | options {
|
---|
437 | default-key "rndc-key";
|
---|
438 | default-server ${NAMED_INTERFACE_IP};
|
---|
439 | default-port 953;
|
---|
440 | };
|
---|
441 | ''')
|
---|
442 |
|
---|
443 |
|
---|
444 | def stop_bind(self):
|
---|
445 | '''Stop our private BIND from listening and operating'''
|
---|
446 | self.rndc_cmd("stop", checkfail=False)
|
---|
447 | self.port_wait("${NAMED_INTERFACE_IP}", 53, wait_for_fail=True)
|
---|
448 |
|
---|
449 | self.run_cmd("rm -rf var/named")
|
---|
450 |
|
---|
451 |
|
---|
452 | def start_bind(self):
|
---|
453 | '''restart the test environment version of bind'''
|
---|
454 | self.info("Restarting bind9")
|
---|
455 | self.chdir('${PREFIX}')
|
---|
456 |
|
---|
457 | self.set_nameserver(self.getvar('NAMED_INTERFACE_IP'))
|
---|
458 |
|
---|
459 | self.run_cmd("mkdir -p var/named/data")
|
---|
460 | self.run_cmd("chown -R ${BIND_USER} var/named")
|
---|
461 |
|
---|
462 | self.bind_child = self.run_child("${BIND9} -u ${BIND_USER} -n 1 -c ${PREFIX}/etc/named.conf -g")
|
---|
463 |
|
---|
464 | self.port_wait("${NAMED_INTERFACE_IP}", 53)
|
---|
465 | self.rndc_cmd("flush")
|
---|
466 |
|
---|
467 | def restart_bind(self, kerberos_support=False, include=None):
|
---|
468 | self.configure_bind(kerberos_support=kerberos_support, include=include)
|
---|
469 | self.stop_bind()
|
---|
470 | self.start_bind()
|
---|
471 |
|
---|
472 | def restore_resolv_conf(self):
|
---|
473 | '''restore the /etc/resolv.conf after testing is complete'''
|
---|
474 | if getattr(self, 'resolv_conf_backup', False):
|
---|
475 | self.info("restoring /etc/resolv.conf")
|
---|
476 | self.run_cmd("mv -f %s /etc/resolv.conf" % self.resolv_conf_backup)
|
---|
477 |
|
---|
478 |
|
---|
479 | def vm_poweroff(self, vmname, checkfail=True):
|
---|
480 | '''power off a VM'''
|
---|
481 | self.setvar('VMNAME', vmname)
|
---|
482 | self.run_cmd("${VM_POWEROFF}", checkfail=checkfail)
|
---|
483 |
|
---|
484 | def vm_reset(self, vmname):
|
---|
485 | '''reset a VM'''
|
---|
486 | self.setvar('VMNAME', vmname)
|
---|
487 | self.run_cmd("${VM_RESET}")
|
---|
488 |
|
---|
489 | def vm_restore(self, vmname, snapshot):
|
---|
490 | '''restore a VM'''
|
---|
491 | self.setvar('VMNAME', vmname)
|
---|
492 | self.setvar('SNAPSHOT', snapshot)
|
---|
493 | self.run_cmd("${VM_RESTORE}")
|
---|
494 |
|
---|
495 | def ping_wait(self, hostname):
|
---|
496 | '''wait for a hostname to come up on the network'''
|
---|
497 | hostname = self.substitute(hostname)
|
---|
498 | loops=10
|
---|
499 | while loops > 0:
|
---|
500 | try:
|
---|
501 | self.run_cmd("ping -c 1 -w 10 %s" % hostname)
|
---|
502 | break
|
---|
503 | except:
|
---|
504 | loops = loops - 1
|
---|
505 | if loops == 0:
|
---|
506 | raise RuntimeError("Failed to ping %s" % hostname)
|
---|
507 | self.info("Host %s is up" % hostname)
|
---|
508 |
|
---|
509 | def port_wait(self, hostname, port, retries=200, delay=3, wait_for_fail=False):
|
---|
510 | '''wait for a host to come up on the network'''
|
---|
511 |
|
---|
512 | while retries > 0:
|
---|
513 | child = self.pexpect_spawn("nc -v -z -w 1 %s %u" % (hostname, port), crlf=False, timeout=1)
|
---|
514 | child.expect([pexpect.EOF, pexpect.TIMEOUT])
|
---|
515 | child.close()
|
---|
516 | i = child.exitstatus
|
---|
517 | if wait_for_fail:
|
---|
518 | #wait for timeout or fail
|
---|
519 | if i == None or i > 0:
|
---|
520 | return
|
---|
521 | else:
|
---|
522 | if i == 0:
|
---|
523 | return
|
---|
524 |
|
---|
525 | time.sleep(delay)
|
---|
526 | retries -= 1
|
---|
527 | self.info("retrying (retries=%u delay=%u)" % (retries, delay))
|
---|
528 |
|
---|
529 | raise RuntimeError("gave up waiting for %s:%d" % (hostname, port))
|
---|
530 |
|
---|
531 | def run_net_time(self, child):
|
---|
532 | '''run net time on windows'''
|
---|
533 | child.sendline("net time \\\\${HOSTNAME} /set")
|
---|
534 | child.expect("Do you want to set the local computer")
|
---|
535 | child.sendline("Y")
|
---|
536 | child.expect("The command completed successfully")
|
---|
537 |
|
---|
538 | def run_date_time(self, child, time_tuple=None):
|
---|
539 | '''run date and time on windows'''
|
---|
540 | if time_tuple is None:
|
---|
541 | time_tuple = time.localtime()
|
---|
542 | child.sendline("date")
|
---|
543 | child.expect("Enter the new date:")
|
---|
544 | i = child.expect(["dd-mm-yy", "mm-dd-yy"])
|
---|
545 | if i == 0:
|
---|
546 | child.sendline(time.strftime("%d-%m-%y", time_tuple))
|
---|
547 | else:
|
---|
548 | child.sendline(time.strftime("%m-%d-%y", time_tuple))
|
---|
549 | child.expect("C:")
|
---|
550 | child.sendline("time")
|
---|
551 | child.expect("Enter the new time:")
|
---|
552 | child.sendline(time.strftime("%H:%M:%S", time_tuple))
|
---|
553 | child.expect("C:")
|
---|
554 |
|
---|
555 | def get_ipconfig(self, child):
|
---|
556 | '''get the IP configuration of the child'''
|
---|
557 | child.sendline("ipconfig /all")
|
---|
558 | child.expect('Ethernet adapter ')
|
---|
559 | child.expect("[\w\s]+")
|
---|
560 | self.setvar("WIN_NIC", child.after)
|
---|
561 | child.expect(['IPv4 Address', 'IP Address'])
|
---|
562 | child.expect('\d+.\d+.\d+.\d+')
|
---|
563 | self.setvar('WIN_IPV4_ADDRESS', child.after)
|
---|
564 | child.expect('Subnet Mask')
|
---|
565 | child.expect('\d+.\d+.\d+.\d+')
|
---|
566 | self.setvar('WIN_SUBNET_MASK', child.after)
|
---|
567 | child.expect('Default Gateway')
|
---|
568 | i = child.expect(['\d+.\d+.\d+.\d+', "C:"])
|
---|
569 | if i == 0:
|
---|
570 | self.setvar('WIN_DEFAULT_GATEWAY', child.after)
|
---|
571 | child.expect("C:")
|
---|
572 |
|
---|
573 | def get_is_dc(self, child):
|
---|
574 | '''check if a windows machine is a domain controller'''
|
---|
575 | child.sendline("dcdiag")
|
---|
576 | i = child.expect(["is not a [Directory Server|DC]",
|
---|
577 | "is not recognized as an internal or external command",
|
---|
578 | "Home Server = ",
|
---|
579 | "passed test Replications"])
|
---|
580 | if i == 0:
|
---|
581 | return False
|
---|
582 | if i == 1 or i == 3:
|
---|
583 | child.expect("C:")
|
---|
584 | child.sendline("net config Workstation")
|
---|
585 | child.expect("Workstation domain")
|
---|
586 | child.expect('[\S]+')
|
---|
587 | domain = child.after
|
---|
588 | i = child.expect(["Workstation Domain DNS Name", "Logon domain"])
|
---|
589 | '''If we get the Logon domain first, we are not in an AD domain'''
|
---|
590 | if i == 1:
|
---|
591 | return False
|
---|
592 | if domain.upper() == self.getvar("WIN_DOMAIN").upper():
|
---|
593 | return True
|
---|
594 |
|
---|
595 | child.expect('[\S]+')
|
---|
596 | hostname = child.after
|
---|
597 | if hostname.upper() == self.getvar("WIN_HOSTNAME").upper():
|
---|
598 | return True
|
---|
599 |
|
---|
600 | def set_noexpire(self, child, username):
|
---|
601 | """Ensure this user's password does not expire"""
|
---|
602 | child.sendline('wmic useraccount where name="%s" set PasswordExpires=FALSE' % username)
|
---|
603 | child.expect("update successful")
|
---|
604 | child.expect("C:")
|
---|
605 |
|
---|
606 | def run_tlntadmn(self, child):
|
---|
607 | '''remove the annoying telnet restrictions'''
|
---|
608 | child.sendline('tlntadmn config maxconn=1024')
|
---|
609 | child.expect(["The settings were successfully updated", "Access is denied"])
|
---|
610 | child.expect("C:")
|
---|
611 |
|
---|
612 | def disable_firewall(self, child):
|
---|
613 | '''remove the annoying firewall'''
|
---|
614 | child.sendline('netsh advfirewall set allprofiles state off')
|
---|
615 | i = child.expect(["Ok", "The following command was not found: advfirewall set allprofiles state off", "The requested operation requires elevation", "Access is denied"])
|
---|
616 | child.expect("C:")
|
---|
617 | if i == 1:
|
---|
618 | child.sendline('netsh firewall set opmode mode = DISABLE profile = ALL')
|
---|
619 | i = child.expect(["Ok", "The following command was not found", "Access is denied"])
|
---|
620 | if i != 0:
|
---|
621 | self.info("Firewall disable failed - ignoring")
|
---|
622 | child.expect("C:")
|
---|
623 |
|
---|
624 | def set_dns(self, child):
|
---|
625 | child.sendline('netsh interface ip set dns "${WIN_NIC}" static ${NAMED_INTERFACE_IP} primary')
|
---|
626 | i = child.expect(['C:', pexpect.EOF, pexpect.TIMEOUT], timeout=5)
|
---|
627 | if i > 0:
|
---|
628 | return True
|
---|
629 | else:
|
---|
630 | return False
|
---|
631 |
|
---|
632 | def set_ip(self, child):
|
---|
633 | """fix the IP address to the same value it had when we
|
---|
634 | connected, but don't use DHCP, and force the DNS server to our
|
---|
635 | DNS server. This allows DNS updates to run"""
|
---|
636 | self.get_ipconfig(child)
|
---|
637 | if self.getvar("WIN_IPV4_ADDRESS") != self.getvar("WIN_IP"):
|
---|
638 | raise RuntimeError("ipconfig address %s != nmblookup address %s" % (self.getvar("WIN_IPV4_ADDRESS"),
|
---|
639 | self.getvar("WIN_IP")))
|
---|
640 | child.sendline('netsh')
|
---|
641 | child.expect('netsh>')
|
---|
642 | child.sendline('offline')
|
---|
643 | child.expect('netsh>')
|
---|
644 | child.sendline('routing ip add persistentroute dest=0.0.0.0 mask=0.0.0.0 name="${WIN_NIC}" nhop=${WIN_DEFAULT_GATEWAY}')
|
---|
645 | child.expect('netsh>')
|
---|
646 | child.sendline('interface ip set address "${WIN_NIC}" static ${WIN_IPV4_ADDRESS} ${WIN_SUBNET_MASK} ${WIN_DEFAULT_GATEWAY} 1 store=persistent')
|
---|
647 | i = child.expect(['The syntax supplied for this command is not valid. Check help for the correct syntax', 'netsh>', pexpect.EOF, pexpect.TIMEOUT], timeout=5)
|
---|
648 | if i == 0:
|
---|
649 | child.sendline('interface ip set address "${WIN_NIC}" static ${WIN_IPV4_ADDRESS} ${WIN_SUBNET_MASK} ${WIN_DEFAULT_GATEWAY} 1')
|
---|
650 | child.expect('netsh>')
|
---|
651 | child.sendline('commit')
|
---|
652 | child.sendline('online')
|
---|
653 | child.sendline('exit')
|
---|
654 |
|
---|
655 | child.expect([pexpect.EOF, pexpect.TIMEOUT], timeout=5)
|
---|
656 | return True
|
---|
657 |
|
---|
658 |
|
---|
659 | def resolve_ip(self, hostname, retries=60, delay=5):
|
---|
660 | '''resolve an IP given a hostname, assuming NBT'''
|
---|
661 | while retries > 0:
|
---|
662 | child = self.pexpect_spawn("bin/nmblookup %s" % hostname)
|
---|
663 | i = 0
|
---|
664 | while i == 0:
|
---|
665 | i = child.expect(["querying", '\d+.\d+.\d+.\d+', hostname, "Lookup failed"])
|
---|
666 | if i == 0:
|
---|
667 | child.expect("\r")
|
---|
668 | if i == 1:
|
---|
669 | return child.after
|
---|
670 | retries -= 1
|
---|
671 | time.sleep(delay)
|
---|
672 | self.info("retrying (retries=%u delay=%u)" % (retries, delay))
|
---|
673 | raise RuntimeError("Failed to resolve IP of %s" % hostname)
|
---|
674 |
|
---|
675 |
|
---|
676 | def open_telnet(self, hostname, username, password, retries=60, delay=5, set_time=False, set_ip=False,
|
---|
677 | disable_firewall=True, run_tlntadmn=True, set_noexpire=False):
|
---|
678 | '''open a telnet connection to a windows server, return the pexpect child'''
|
---|
679 | set_route = False
|
---|
680 | set_dns = False
|
---|
681 | set_telnetclients = True
|
---|
682 | start_telnet = True
|
---|
683 | if self.getvar('WIN_IP'):
|
---|
684 | ip = self.getvar('WIN_IP')
|
---|
685 | else:
|
---|
686 | ip = self.resolve_ip(hostname)
|
---|
687 | self.setvar('WIN_IP', ip)
|
---|
688 | while retries > 0:
|
---|
689 | child = self.pexpect_spawn("telnet " + ip + " -l '" + username + "'")
|
---|
690 | i = child.expect(["Welcome to Microsoft Telnet Service",
|
---|
691 | "Denying new connections due to the limit on number of connections",
|
---|
692 | "No more connections are allowed to telnet server",
|
---|
693 | "Unable to connect to remote host",
|
---|
694 | "No route to host",
|
---|
695 | "Connection refused",
|
---|
696 | pexpect.EOF])
|
---|
697 | if i != 0:
|
---|
698 | child.close()
|
---|
699 | time.sleep(delay)
|
---|
700 | retries -= 1
|
---|
701 | self.info("retrying (retries=%u delay=%u)" % (retries, delay))
|
---|
702 | continue
|
---|
703 | child.expect("password:")
|
---|
704 | child.sendline(password)
|
---|
705 | i = child.expect(["C:",
|
---|
706 | "TelnetClients",
|
---|
707 | "Denying new connections due to the limit on number of connections",
|
---|
708 | "No more connections are allowed to telnet server",
|
---|
709 | "Unable to connect to remote host",
|
---|
710 | "No route to host",
|
---|
711 | "Connection refused",
|
---|
712 | pexpect.EOF])
|
---|
713 | if i == 1:
|
---|
714 | if set_telnetclients:
|
---|
715 | self.run_cmd('bin/net rpc group add TelnetClients -S $WIN_IP -U$WIN_USER%$WIN_PASS')
|
---|
716 | self.run_cmd('bin/net rpc group addmem TelnetClients "authenticated users" -S $WIN_IP -U$WIN_USER%$WIN_PASS')
|
---|
717 | child.close()
|
---|
718 | retries -= 1
|
---|
719 | set_telnetclients = False
|
---|
720 | self.info("retrying (retries=%u delay=%u)" % (retries, delay))
|
---|
721 | continue
|
---|
722 | else:
|
---|
723 | raise RuntimeError("Failed to connect with telnet due to missing TelnetClients membership")
|
---|
724 |
|
---|
725 | if i == 6:
|
---|
726 | # This only works if it is installed and enabled, but not started. Not entirely likely, but possible
|
---|
727 | self.run_cmd('bin/net rpc service start TlntSvr -S $WIN_IP -U$WIN_USER%$WIN_PASS')
|
---|
728 | child.close()
|
---|
729 | start_telnet = False
|
---|
730 | retries -= 1
|
---|
731 | self.info("retrying (retries=%u delay=%u)" % (retries, delay))
|
---|
732 | continue
|
---|
733 |
|
---|
734 | if i != 0:
|
---|
735 | child.close()
|
---|
736 | time.sleep(delay)
|
---|
737 | retries -= 1
|
---|
738 | self.info("retrying (retries=%u delay=%u)" % (retries, delay))
|
---|
739 | continue
|
---|
740 | if set_dns:
|
---|
741 | set_dns = False
|
---|
742 | if self.set_dns(child):
|
---|
743 | continue;
|
---|
744 | if set_route:
|
---|
745 | child.sendline('route add 0.0.0.0 mask 0.0.0.0 ${WIN_DEFAULT_GATEWAY}')
|
---|
746 | child.expect("C:")
|
---|
747 | set_route = False
|
---|
748 | if set_time:
|
---|
749 | self.run_date_time(child, None)
|
---|
750 | set_time = False
|
---|
751 | if run_tlntadmn:
|
---|
752 | self.run_tlntadmn(child)
|
---|
753 | run_tlntadmn = False
|
---|
754 | if set_noexpire:
|
---|
755 | self.set_noexpire(child, username)
|
---|
756 | set_noexpire = False
|
---|
757 | if disable_firewall:
|
---|
758 | self.disable_firewall(child)
|
---|
759 | disable_firewall = False
|
---|
760 | if set_ip:
|
---|
761 | set_ip = False
|
---|
762 | if self.set_ip(child):
|
---|
763 | set_route = True
|
---|
764 | set_dns = True
|
---|
765 | continue
|
---|
766 | return child
|
---|
767 | raise RuntimeError("Failed to connect with telnet")
|
---|
768 |
|
---|
769 | def kinit(self, username, password):
|
---|
770 | '''use kinit to setup a credentials cache'''
|
---|
771 | self.run_cmd("kdestroy")
|
---|
772 | self.putenv('KRB5CCNAME', "${PREFIX}/ccache.test")
|
---|
773 | username = self.substitute(username)
|
---|
774 | s = username.split('@')
|
---|
775 | if len(s) > 0:
|
---|
776 | s[1] = s[1].upper()
|
---|
777 | username = '@'.join(s)
|
---|
778 | child = self.pexpect_spawn('kinit ' + username)
|
---|
779 | child.expect("Password")
|
---|
780 | child.sendline(password)
|
---|
781 | child.expect(pexpect.EOF)
|
---|
782 | child.close()
|
---|
783 | if child.exitstatus != 0:
|
---|
784 | raise RuntimeError("kinit failed with status %d" % child.exitstatus)
|
---|
785 |
|
---|
786 | def get_domains(self):
|
---|
787 | '''return a dictionary of DNS domains and IPs for named.conf'''
|
---|
788 | ret = {}
|
---|
789 | for v in self.vars:
|
---|
790 | if v[-6:] == "_REALM":
|
---|
791 | base = v[:-6]
|
---|
792 | if base + '_IP' in self.vars:
|
---|
793 | ret[self.vars[base + '_REALM']] = self.vars[base + '_IP']
|
---|
794 | return ret
|
---|
795 |
|
---|
796 | def wait_reboot(self, retries=3):
|
---|
797 | '''wait for a VM to reboot'''
|
---|
798 |
|
---|
799 | # first wait for it to shutdown
|
---|
800 | self.port_wait("${WIN_IP}", 139, wait_for_fail=True, delay=6)
|
---|
801 |
|
---|
802 | # now wait for it to come back. If it fails to come back
|
---|
803 | # then try resetting it
|
---|
804 | while retries > 0:
|
---|
805 | try:
|
---|
806 | self.port_wait("${WIN_IP}", 139)
|
---|
807 | return
|
---|
808 | except:
|
---|
809 | retries -= 1
|
---|
810 | self.vm_reset("${WIN_VM}")
|
---|
811 | self.info("retrying reboot (retries=%u)" % retries)
|
---|
812 | raise RuntimeError(self.substitute("VM ${WIN_VM} failed to reboot"))
|
---|
813 |
|
---|
814 | def get_vms(self):
|
---|
815 | '''return a dictionary of all the configured VM names'''
|
---|
816 | ret = []
|
---|
817 | for v in self.vars:
|
---|
818 | if v[-3:] == "_VM":
|
---|
819 | ret.append(self.vars[v])
|
---|
820 | return ret
|
---|
821 |
|
---|
822 |
|
---|
823 | def run_dcpromo_as_first_dc(self, vm, func_level=None):
|
---|
824 | self.setwinvars(vm)
|
---|
825 | self.info("Configuring a windows VM ${WIN_VM} at the first DC in the domain using dcpromo")
|
---|
826 | child = self.open_telnet("${WIN_HOSTNAME}", "administrator", "${WIN_PASS}", set_time=True)
|
---|
827 | if self.get_is_dc(child):
|
---|
828 | return
|
---|
829 |
|
---|
830 | if func_level == '2008r2':
|
---|
831 | self.setvar("FUNCTION_LEVEL_INT", str(4))
|
---|
832 | elif func_level == '2003':
|
---|
833 | self.setvar("FUNCTION_LEVEL_INT", str(1))
|
---|
834 | else:
|
---|
835 | self.setvar("FUNCTION_LEVEL_INT", str(0))
|
---|
836 |
|
---|
837 | child = self.open_telnet("${WIN_HOSTNAME}", "administrator", "${WIN_PASS}", set_ip=True, set_noexpire=True)
|
---|
838 |
|
---|
839 | """This server must therefore not yet be a directory server, so we must promote it"""
|
---|
840 | child.sendline("copy /Y con answers.txt")
|
---|
841 | child.sendline('''
|
---|
842 | [DCInstall]
|
---|
843 | ; New forest promotion
|
---|
844 | ReplicaOrNewDomain=Domain
|
---|
845 | NewDomain=Forest
|
---|
846 | NewDomainDNSName=${WIN_REALM}
|
---|
847 | ForestLevel=${FUNCTION_LEVEL_INT}
|
---|
848 | DomainNetbiosName=${WIN_DOMAIN}
|
---|
849 | DomainLevel=${FUNCTION_LEVEL_INT}
|
---|
850 | InstallDNS=Yes
|
---|
851 | ConfirmGc=Yes
|
---|
852 | CreateDNSDelegation=No
|
---|
853 | DatabasePath="C:\Windows\NTDS"
|
---|
854 | LogPath="C:\Windows\NTDS"
|
---|
855 | SYSVOLPath="C:\Windows\SYSVOL"
|
---|
856 | ; Set SafeModeAdminPassword to the correct value prior to using the unattend file
|
---|
857 | SafeModeAdminPassword=${WIN_PASS}
|
---|
858 | ; Run-time flags (optional)
|
---|
859 | RebootOnCompletion=No
|
---|
860 |
|
---|
861 | ''')
|
---|
862 | child.expect("copied.")
|
---|
863 | child.expect("C:")
|
---|
864 | child.expect("C:")
|
---|
865 | child.sendline("dcpromo /answer:answers.txt")
|
---|
866 | i = child.expect(["You must restart this computer", "failed", "Active Directory Domain Services was not installed", "C:", pexpect.TIMEOUT], timeout=240)
|
---|
867 | if i == 1 or i == 2:
|
---|
868 | raise Exception("dcpromo failed")
|
---|
869 | if i == 4: # timeout
|
---|
870 | child = self.open_telnet("${WIN_HOSTNAME}", "administrator", "${WIN_PASS}")
|
---|
871 |
|
---|
872 | child.sendline("shutdown -r -t 0")
|
---|
873 | self.port_wait("${WIN_IP}", 139, wait_for_fail=True)
|
---|
874 | self.port_wait("${WIN_IP}", 139)
|
---|
875 |
|
---|
876 | child = self.open_telnet("${WIN_HOSTNAME}", "administrator", "${WIN_PASS}")
|
---|
877 | # Check if we became a DC by now
|
---|
878 | if not self.get_is_dc(child):
|
---|
879 | raise Exception("dcpromo failed (and wasn't a DC even after rebooting)")
|
---|
880 | # Give DNS registration a kick
|
---|
881 | child.sendline("ipconfig /registerdns")
|
---|
882 |
|
---|
883 | self.retry_cmd("host -t SRV _ldap._tcp.${WIN_REALM} ${WIN_IP}", ['has SRV record'], retries=60, delay=5 )
|
---|
884 |
|
---|
885 |
|
---|
886 | def start_winvm(self, vm):
|
---|
887 | '''start a Windows VM'''
|
---|
888 | self.setwinvars(vm)
|
---|
889 |
|
---|
890 | self.info("Joining a windows box to the domain")
|
---|
891 | self.vm_poweroff("${WIN_VM}", checkfail=False)
|
---|
892 | self.vm_restore("${WIN_VM}", "${WIN_SNAPSHOT}")
|
---|
893 |
|
---|
894 | def run_winjoin(self, vm, domain, username="administrator", password="${PASSWORD1}"):
|
---|
895 | '''join a windows box to a domain'''
|
---|
896 | child = self.open_telnet("${WIN_HOSTNAME}", "${WIN_USER}", "${WIN_PASS}", set_time=True, set_ip=True, set_noexpire=True)
|
---|
897 | retries = 5
|
---|
898 | while retries > 0:
|
---|
899 | child.sendline("ipconfig /flushdns")
|
---|
900 | child.expect("C:")
|
---|
901 | child.sendline("netdom join ${WIN_HOSTNAME} /Domain:%s /UserD:%s /PasswordD:%s" % (domain, username, password))
|
---|
902 | i = child.expect(["The command completed successfully",
|
---|
903 | "The specified domain either does not exist or could not be contacted."], timeout=120)
|
---|
904 | if i == 0:
|
---|
905 | break
|
---|
906 | time.sleep(10)
|
---|
907 | retries -= 1
|
---|
908 |
|
---|
909 | child.expect("C:")
|
---|
910 | child.sendline("shutdown /r -t 0")
|
---|
911 | self.wait_reboot()
|
---|
912 | child = self.open_telnet("${WIN_HOSTNAME}", "${WIN_USER}", "${WIN_PASS}", set_time=True, set_ip=True)
|
---|
913 | child.sendline("ipconfig /registerdns")
|
---|
914 | child.expect("Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported in the Event Viewer")
|
---|
915 | child.expect("C:")
|
---|
916 |
|
---|
917 |
|
---|
918 | def test_remote_smbclient(self, vm, username="${WIN_USER}", password="${WIN_PASS}", args=""):
|
---|
919 | '''test smbclient against remote server'''
|
---|
920 | self.setwinvars(vm)
|
---|
921 | self.info('Testing smbclient')
|
---|
922 | self.chdir('${PREFIX}')
|
---|
923 | smbclient = self.getvar("smbclient")
|
---|
924 | self.cmd_contains("%s --version" % (smbclient), ["${SAMBA_VERSION}"])
|
---|
925 | self.retry_cmd('%s -L ${WIN_HOSTNAME} -U%s%%%s %s' % (smbclient, username, password, args), ["IPC"], retries=60, delay=5)
|
---|
926 |
|
---|
927 | def test_net_use(self, vm, realm, domain, username, password):
|
---|
928 | self.setwinvars(vm)
|
---|
929 | self.info('Testing net use against Samba3 member')
|
---|
930 | child = self.open_telnet("${WIN_HOSTNAME}", "%s\\%s" % (domain, username), password)
|
---|
931 | child.sendline("net use t: \\\\${HOSTNAME}.%s\\test" % realm)
|
---|
932 | child.expect("The command completed successfully")
|
---|
933 |
|
---|
934 |
|
---|
935 | def setup(self, testname, subdir):
|
---|
936 | '''setup for main tests, parsing command line'''
|
---|
937 | self.parser.add_option("--conf", type='string', default='', help='config file')
|
---|
938 | self.parser.add_option("--skip", type='string', default='', help='list of steps to skip (comma separated)')
|
---|
939 | self.parser.add_option("--vms", type='string', default=None, help='list of VMs to use (comma separated)')
|
---|
940 | self.parser.add_option("--list", action='store_true', default=False, help='list the available steps')
|
---|
941 | self.parser.add_option("--rebase", action='store_true', default=False, help='do a git pull --rebase')
|
---|
942 | self.parser.add_option("--clean", action='store_true', default=False, help='clean the tree')
|
---|
943 | self.parser.add_option("--prefix", type='string', default=None, help='override install prefix')
|
---|
944 | self.parser.add_option("--sourcetree", type='string', default=None, help='override sourcetree location')
|
---|
945 | self.parser.add_option("--nocleanup", action='store_true', default=False, help='disable cleanup code')
|
---|
946 | self.parser.add_option("--use-ntvfs", action='store_true', default=False, help='use NTVFS for the fileserver')
|
---|
947 | self.parser.add_option("--dns-backend", type="choice",
|
---|
948 | choices=["SAMBA_INTERNAL", "BIND9_FLATFILE", "BIND9_DLZ", "NONE"],
|
---|
949 | help="The DNS server backend. SAMBA_INTERNAL is the builtin name server (default), " \
|
---|
950 | "BIND9_FLATFILE uses bind9 text database to store zone information, " \
|
---|
951 | "BIND9_DLZ uses samba4 AD to store zone information, " \
|
---|
952 | "NONE skips the DNS setup entirely (not recommended)",
|
---|
953 | default="SAMBA_INTERNAL")
|
---|
954 |
|
---|
955 | self.opts, self.args = self.parser.parse_args()
|
---|
956 |
|
---|
957 | if not self.opts.conf:
|
---|
958 | print("Please specify a config file with --conf")
|
---|
959 | sys.exit(1)
|
---|
960 |
|
---|
961 | # we don't need fsync safety in these tests
|
---|
962 | self.putenv('TDB_NO_FSYNC', '1')
|
---|
963 |
|
---|
964 | self.load_config(self.opts.conf)
|
---|
965 |
|
---|
966 | nameserver = self.get_nameserver()
|
---|
967 | if nameserver == self.getvar('NAMED_INTERFACE_IP'):
|
---|
968 | raise RuntimeError("old /etc/resolv.conf must not contain %s as a nameserver, this will create loops with the generated dns configuration" % nameserver)
|
---|
969 | self.setvar('DNSSERVER', nameserver)
|
---|
970 |
|
---|
971 | self.set_skip(self.opts.skip)
|
---|
972 | self.set_vms(self.opts.vms)
|
---|
973 |
|
---|
974 | if self.opts.list:
|
---|
975 | self.list_steps_mode()
|
---|
976 |
|
---|
977 | if self.opts.prefix:
|
---|
978 | self.setvar('PREFIX', self.opts.prefix)
|
---|
979 |
|
---|
980 | if self.opts.sourcetree:
|
---|
981 | self.setvar('SOURCETREE', self.opts.sourcetree)
|
---|
982 |
|
---|
983 | if self.opts.rebase:
|
---|
984 | self.info('rebasing')
|
---|
985 | self.chdir('${SOURCETREE}')
|
---|
986 | self.run_cmd('git pull --rebase')
|
---|
987 |
|
---|
988 | if self.opts.clean:
|
---|
989 | self.info('cleaning')
|
---|
990 | self.chdir('${SOURCETREE}/' + subdir)
|
---|
991 | self.run_cmd('make clean')
|
---|
992 |
|
---|
993 | if self.opts.use_ntvfs:
|
---|
994 | self.setvar('USE_NTVFS', "--use-ntvfs")
|
---|
995 | else:
|
---|
996 | self.setvar('USE_NTVFS', "")
|
---|
997 |
|
---|
998 | self.setvar('NAMESERVER_BACKEND', self.opts.dns_backend)
|
---|
999 |
|
---|
1000 | self.setvar('DNS_FORWARDER', "--option=dns forwarder=%s" % nameserver)
|
---|