1#!/usr/local/bin/ksh93 -p 2# 3# CDDL HEADER START 4# 5# The contents of this file are subject to the terms of the 6# Common Development and Distribution License (the "License"). 7# You may not use this file except in compliance with the License. 8# 9# You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 10# or http://www.opensolaris.org/os/licensing. 11# See the License for the specific language governing permissions 12# and limitations under the License. 13# 14# When distributing Covered Code, include this CDDL HEADER in each 15# file and include the License file at usr/src/OPENSOLARIS.LICENSE. 16# If applicable, add the following below this CDDL HEADER, with the 17# fields enclosed by brackets "[]" replaced with your own identifying 18# information: Portions Copyright [yyyy] [name of copyright owner] 19# 20# CDDL HEADER END 21# 22 23# 24# Copyright 2008 Sun Microsystems, Inc. All rights reserved. 25# Use is subject to license terms. 26# 27# ident "@(#)zfs_allow_007_pos.ksh 1.3 08/11/03 SMI" 28# 29 30. $STF_SUITE/tests/delegate/delegate_common.kshlib 31 32################################################################################# 33# 34# __stc_assertion_start 35# 36# ID: zfs_allow_007_pos 37# 38# DESCRIPTION: 39# Verify the permissions set will be masked on its descendent 40# datasets by same name set. 41# 42# STRATEGY: 43# 1. Create $ROOT_TESTFS/childfs 44# 2. Set permission $perms1 to @set on $ROOT_TESTFS 45# 3. Reset permission $perms2 to @set on $ROOT_TESTFS/childfs 46# 4. Allow @set to $STAFF1 on $ROOT_TESTFS/childfs 47# 5. Verify $perms2 is delegated on $ROOT_TESTFS/childfs and its 48# descendent. 49# 6. Allow @set to $STAFF1 on $ROOT_TESTFS 50# 7. Verify $perms1 is not appended to $STAFF1 on $ROOT_TESTFS/childfs and 51# its descendent since it is masked 52# 53# TESTABILITY: explicit 54# 55# TEST_AUTOMATION_LEVEL: automated 56# 57# CODING_STATUS: COMPLETED (2006-09-19) 58# 59# __stc_assertion_end 60# 61################################################################################ 62 63verify_runnable "both" 64 65log_assert "Verify permission set can be masked on descendent dataset." 66 67typeset perms1="snapshot,reservation,compression" 68eval set -A dataset $DATASETS 69enc=$(get_prop encryption $dataset) 70if [[ $? -eq 0 ]] && [[ -n "$enc" ]] && [[ "$enc" != "off" ]]; then 71 typeset perms2="send,allow,userprop" 72else 73 typeset perms2="checksum,send,allow,userprop" 74fi 75 76# 77# Define three level filesystems 78# 79childfs=$ROOT_TESTFS/childfs 80grandchild=$childfs/grandchild 81log_must $ZFS create $childfs 82log_must $ZFS create $grandchild 83 84# 85# Setting different permissions to the same set on two level. 86# But only assign the user at one level. 87# 88log_must $ZFS allow -s @set $perms1 $ROOT_TESTFS 89log_must $ZFS allow -s @set $perms2 $childfs 90log_must $ZFS allow $STAFF1 @set $childfs 91 92# 93# Verify only perms2 is valid to user on the level which he was assigned. 94# 95log_must verify_noperm $ROOT_TESTFS $perms1 $STAFF1 96for fs in $childfs $grandchild ; do 97 log_must verify_noperm $childfs $perms1 $STAFF1 98 log_must verify_perm $childfs $perms2 $STAFF1 99done 100 101# 102# Delegate @set to STAFF1 on ROOT_TESTFS, verify $perms1 will not be appended 103# to its descendent datasets since it is masked 104# 105log_must $ZFS allow $STAFF1 @set $ROOT_TESTFS 106log_must verify_perm $ROOT_TESTFS $perms1 $STAFF1 107for fs in $childfs $grandchild ; do 108 log_must verify_noperm $childfs $perms1 $STAFF1 109 log_must verify_perm $childfs $perms2 $STAFF1 110done 111 112# Remove the mask, $perms1 will be allowed to its descendent datasets 113log_must $ZFS unallow -s @set $childfs 114for fs in $childfs $grandchild ; do 115 log_must verify_noperm $childfs $perms2 $STAFF1 116 log_must verify_perm $childfs $perms1 $STAFF1 117done 118 119log_pass "Verify permission set can be masked on descendetn dataset pass." 120