d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy#!/bin/ksh -p
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy#
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy# CDDL HEADER START
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy#
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy# The contents of this file are subject to the terms of the
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy# Common Development and Distribution License (the "License").
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy# You may not use this file except in compliance with the License.
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy#
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy# You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy# or http://www.opensolaris.org/os/licensing.
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy# See the License for the specific language governing permissions
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy# and limitations under the License.
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy#
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy# When distributing Covered Code, include this CDDL HEADER in each
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy# file and include the License file at usr/src/OPENSOLARIS.LICENSE.
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy# If applicable, add the following below this CDDL HEADER, with the
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy# fields enclosed by brackets "[]" replaced with your own identifying
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy# information: Portions Copyright [yyyy] [name of copyright owner]
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy#
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy# CDDL HEADER END
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy#
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy#
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy# Copyright 2009 Sun Microsystems, Inc. All rights reserved.
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy# Use is subject to license terms.
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy#
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy
1d32ba663e202c24a5a1f2e5aef83fffb447cb7fJohn Wren Kennedy# Copyright (c) 2012, 2016 by Delphix. All rights reserved.
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov# Copyright 2016 Nexenta Systems, Inc.
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy#
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy. $STF_SUITE/tests/functional/acl/acl_common.kshlib
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy# DESCRIPTION:
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov# Verify aclinherit=passthrough-x will inherit the execute permission only if
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov# file creation mode requests it.
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy#
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy# STRATEGY:
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov# 1. Use both super user and non-super user to run the test case.
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov# 2. Set aclinherit=passthrough-x
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov# 3. Create basedir and a set of files, one with 644 and one with 755 mode.
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov# 4. Verify that execute permission is inherited only if file creation mode
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov# requests them.
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedyverify_runnable "both"
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedyfunction cleanup
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy{
1d32ba663e202c24a5a1f2e5aef83fffb447cb7fJohn Wren Kennedy [[ -d $basedir ]] && log_must rm -rf $basedir
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy}
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankovlog_assert "aclinherit=passthrough-x should inherit the execute permission" \
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov "only if file creation mode requests it"
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedylog_onexit cleanup
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedyset -A aces \
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov "owner@:rwxp:f:allow" \
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov "group@:rxp:f:allow" \
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov "everyone@:rxp:f:allow"
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankovtypeset basedir="$TESTDIR/basedir"
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankovtypeset nfile1="$basedir/nfile1" nfile2="$basedir/nfile2"
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankovfunction check_execute_bit
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy{
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov typeset ace
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov typeset file=$1
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov typeset -i i=0
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov while ((i < 6)); do
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov ace=$(get_ACE $file $i)
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov if [[ "$ace" == *"execute"* ]]; then
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov return 0
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov fi
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov ((i = i + 1))
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov done
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov return 1
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov}
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankovfunction verify_inherit
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov{
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy typeset -i i=0
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov
1d32ba663e202c24a5a1f2e5aef83fffb447cb7fJohn Wren Kennedy log_must usr_exec mkdir $basedir
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov # Modify owner@, group@ and everyone@ ACEs to include execute
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov # permission (see above), and make them file-inheritable
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy while ((i < ${#aces[*]})); do
1d32ba663e202c24a5a1f2e5aef83fffb447cb7fJohn Wren Kennedy log_must usr_exec chmod A$i=${aces[i]} $basedir
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy ((i = i + 1))
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy done
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov # Create file with 644 mode
1d32ba663e202c24a5a1f2e5aef83fffb447cb7fJohn Wren Kennedy log_must usr_exec touch $nfile1
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov # Check that execute permission wasn't inherited
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov log_mustnot check_execute_bit $nfile1
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov # Use cp(1) to copy over /usr/bin/true
1d32ba663e202c24a5a1f2e5aef83fffb447cb7fJohn Wren Kennedy log_must usr_exec cp /usr/bin/true $nfile2
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov # Check that execute permission was inherited
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov log_must check_execute_bit $nfile2
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy}
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy
1d32ba663e202c24a5a1f2e5aef83fffb447cb7fJohn Wren Kennedylog_must zfs set aclmode=passthrough $TESTPOOL/$TESTFS
1d32ba663e202c24a5a1f2e5aef83fffb447cb7fJohn Wren Kennedylog_must zfs set aclinherit=passthrough-x $TESTPOOL/$TESTFS
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedyfor user in root $ZFS_ACL_STAFF1; do
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy log_must set_cur_usr $user
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov verify_inherit
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy cleanup
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedydone
d583b39bfb4e2571d3e41097c5c357ffe353ad45John Wren Kennedy
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankovlog_pass "aclinherit=passthrough-x should inherit the execute permission" \
232f5a2e6e6fcc0e7d4f5bd719cd5e6433a24020Yuri Pankov "only if file creation mode requests it"