blob: f3213254b97a24c7c049a8334b5e9fdf8c7613c8 [file] [log] [blame]
#!/bin/ksh -p
#
# CDDL HEADER START
#
# The contents of this file are subject to the terms of the
# Common Development and Distribution License (the "License").
# You may not use this file except in compliance with the License.
#
# You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
# or http://www.opensolaris.org/os/licensing.
# See the License for the specific language governing permissions
# and limitations under the License.
#
# When distributing Covered Code, include this CDDL HEADER in each
# file and include the License file at usr/src/OPENSOLARIS.LICENSE.
# If applicable, add the following below this CDDL HEADER, with the
# fields enclosed by brackets "[]" replaced with your own identifying
# information: Portions Copyright [yyyy] [name of copyright owner]
#
# CDDL HEADER END
#
#
# Copyright 2008 Sun Microsystems, Inc. All rights reserved.
# Use is subject to license terms.
#
#
# Copyright (c) 2013, 2016 by Delphix. All rights reserved.
#
. $STF_SUITE/tests/functional/delegate/delegate_common.kshlib
#
# DESCRIPTION:
# Verify the permissions set will be masked on its descendent
# datasets by same name set.
#
# STRATEGY:
# 1. Create $ROOT_TESTFS/childfs
# 2. Set permission $perms1 to @set on $ROOT_TESTFS
# 3. Reset permission $perms2 to @set on $ROOT_TESTFS/childfs
# 4. Allow @set to $STAFF1 on $ROOT_TESTFS/childfs
# 5. Verify $perms2 is delegated on $ROOT_TESTFS/childfs and its
# descendent.
# 6. Allow @set to $STAFF1 on $ROOT_TESTFS
# 7. Verify $perms1 is not appended to $STAFF1 on $ROOT_TESTFS/childfs and
# its descendent since it is masked
#
verify_runnable "both"
log_assert "Verify permission set can be masked on descendent dataset."
log_onexit restore_root_datasets
typeset perms1="snapshot,reservation,compression"
eval set -A dataset $DATASETS
typeset perms2="checksum,send,userprop"
#
# Define three level filesystems
#
childfs=$ROOT_TESTFS/childfs
grandchild=$childfs/grandchild
log_must zfs create $childfs
log_must zfs create $grandchild
#
# Setting different permissions to the same set on two levels.
# But only assign the user at one level.
#
log_must zfs allow -s @set $perms1 $ROOT_TESTFS
log_must zfs allow -s @set $perms2 $childfs
log_must zfs allow $STAFF1 @set $childfs
#
# Verify that the user only has the permissions that they were assigned
# in each filesystem.
#
log_must verify_noperm $ROOT_TESTFS $perms1 $STAFF1
for fs in $childfs $grandchild ; do
log_must verify_noperm $fs $perms1 $STAFF1
log_must verify_perm $fs $perms2 $STAFF1
done
#
# Delegate @set to STAFF1 on ROOT_TESTFS, verify $perms1 will not be appended
# to its descendent datasets since it is masked
#
log_must zfs allow $STAFF1 @set $ROOT_TESTFS
log_must verify_perm $ROOT_TESTFS $perms1 $STAFF1
for fs in $childfs $grandchild ; do
log_must verify_noperm $fs $perms1 $STAFF1
log_must verify_perm $fs $perms2 $STAFF1
done
# Remove the mask, $perms1 will be allowed to its descendent datasets
log_must zfs unallow -s @set $childfs
for fs in $childfs $grandchild ; do
log_must verify_noperm $fs $perms2 $STAFF1
log_must verify_perm $fs $perms1 $STAFF1
done
log_pass "Verify permission set can be masked on descendent dataset pass."