config root man

Current Path : /usr/src/tools/regression/acltools/

FreeBSD hs32.drive.ne.jp 9.1-RELEASE FreeBSD 9.1-RELEASE #1: Wed Jan 14 12:18:08 JST 2015 root@hs32.drive.ne.jp:/sys/amd64/compile/hs32 amd64
Upload File :
Current File : //usr/src/tools/regression/acltools/tools-nfs4-psarc.test

# Copyright (c) 2008, 2009 Edward Tomasz NapieraƂa <trasz@FreeBSD.org>
# All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions
# are met:
# 1. Redistributions of source code must retain the above copyright
#    notice, this list of conditions and the following disclaimer.
# 2. Redistributions in binary form must reproduce the above copyright
#    notice, this list of conditions and the following disclaimer in the
#    documentation and/or other materials provided with the distribution.
#
# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
# ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
# SUCH DAMAGE.
#
# $FreeBSD: release/9.1.0/tools/regression/acltools/tools-nfs4-psarc.test 216393 2010-12-12 13:04:30Z trasz $
#

# This is a tools-level test for NFSv4 ACL functionality with PSARC/2010/029
# semantics.  Run it as root using ACL-enabled kernel:
#
# /usr/src/tools/regression/acltools/run /usr/src/tools/regression/acltools/tools-nfs4-psarc.test
#
# WARNING: Creates files in unsafe way.

$ whoami
> root
$ umask 022

# Smoke test for getfacl(1).
$ touch xxx
$ getfacl xxx
> # file: xxx
> # owner: root
> # group: wheel
>             owner@:rw-p--aARWcCos:------:allow
>             group@:r-----a-R-c--s:------:allow
>          everyone@:r-----a-R-c--s:------:allow

$ getfacl -q xxx
>             owner@:rw-p--aARWcCos:------:allow
>             group@:r-----a-R-c--s:------:allow
>          everyone@:r-----a-R-c--s:------:allow

# Check verbose mode formatting.
$ getfacl -v xxx
> # file: xxx
> # owner: root
> # group: wheel
>             owner@:read_data/write_data/append_data/read_attributes/write_attributes/read_xattr/write_xattr/read_acl/write_acl/write_owner/synchronize::allow
>             group@:read_data/read_attributes/read_xattr/read_acl/synchronize::allow
>          everyone@:read_data/read_attributes/read_xattr/read_acl/synchronize::allow

# Test setfacl -a.
$ setfacl -a2 u:0:write_acl:allow,g:1:read_acl:deny xxx
$ getfacl -n xxx
> # file: xxx
> # owner: root
> # group: wheel
>             owner@:rw-p--aARWcCos:------:allow
>             group@:r-----a-R-c--s:------:allow
>             user:0:-----------C--:------:allow
>            group:1:----------c---:------:deny
>          everyone@:r-----a-R-c--s:------:allow

# Test user and group name resolving.
$ rm xxx
$ touch xxx
$ setfacl -a2 u:root:write_acl:allow,g:daemon:read_acl:deny xxx
$ getfacl xxx
> # file: xxx
> # owner: root
> # group: wheel
>             owner@:rw-p--aARWcCos:------:allow
>             group@:r-----a-R-c--s:------:allow
>          user:root:-----------C--:------:allow
>       group:daemon:----------c---:------:deny
>          everyone@:r-----a-R-c--s:------:allow

# Check whether ls correctly marks files with "+".
$ ls -l xxx | cut -d' ' -f1
> -rw-r--r--+

# Test removing entries by number.
$ setfacl -x 1 xxx
$ getfacl -n xxx
> # file: xxx
> # owner: root
> # group: wheel
>             owner@:rw-p--aARWcCos:------:allow
>             user:0:-----------C--:------:allow
>            group:1:----------c---:------:deny
>          everyone@:r-----a-R-c--s:------:allow

# Test setfacl -m.
$ setfacl -a0 everyone@:rwx:deny xxx
$ setfacl -a0 everyone@:rwx:deny xxx
$ setfacl -a0 everyone@:rwx:deny xxx
$ setfacl -m everyone@::deny xxx
$ getfacl -n xxx
> # file: xxx
> # owner: root
> # group: wheel
>          everyone@:--------------:------:deny
>          everyone@:--------------:------:deny
>          everyone@:--------------:------:deny
>             owner@:rw-p--aARWcCos:------:allow
>             user:0:-----------C--:------:allow
>            group:1:----------c---:------:deny
>          everyone@:r-----a-R-c--s:------:allow

# Test getfacl -i.
$ getfacl -i xxx
> # file: xxx
> # owner: root
> # group: wheel
>          everyone@:--------------:------:deny
>          everyone@:--------------:------:deny
>          everyone@:--------------:------:deny
>             owner@:rw-p--aARWcCos:------:allow
>          user:root:-----------C--:------:allow:0
>       group:daemon:----------c---:------:deny:1
>          everyone@:r-----a-R-c--s:------:allow

# Make sure cp without any flags does not copy copy the ACL.
$ cp xxx yyy
$ ls -l yyy | cut -d' ' -f1
> -rw-r--r--

# Make sure it does with the "-p" flag.
$ rm yyy
$ cp -p xxx yyy
$ getfacl -n yyy
> # file: yyy
> # owner: root
> # group: wheel
>          everyone@:--------------:------:deny
>          everyone@:--------------:------:deny
>          everyone@:--------------:------:deny
>             owner@:rw-p--aARWcCos:------:allow
>             user:0:-----------C--:------:allow
>            group:1:----------c---:------:deny
>          everyone@:r-----a-R-c--s:------:allow

$ rm yyy

# Test removing entries by...  by example?
$ setfacl -x everyone@::deny xxx
$ getfacl -n xxx
> # file: xxx
> # owner: root
> # group: wheel
>             owner@:rw-p--aARWcCos:------:allow
>             user:0:-----------C--:------:allow
>            group:1:----------c---:------:deny
>          everyone@:r-----a-R-c--s:------:allow

# Test setfacl -b.
$ setfacl -b xxx
$ getfacl -n xxx
> # file: xxx
> # owner: root
> # group: wheel
>             owner@:rw-p--aARWcCos:------:allow
>             group@:r-----a-R-c--s:------:allow
>          everyone@:r-----a-R-c--s:------:allow

$ ls -l xxx | cut -d' ' -f1
> -rw-r--r--

# Check setfacl(1) and getfacl(1) with multiple files.
$ touch xxx yyy zzz

$ ls -l xxx yyy zzz | cut -d' ' -f1
> -rw-r--r--
> -rw-r--r--
> -rw-r--r--

$ setfacl -m u:42:x:allow,g:43:w:allow nnn xxx yyy zzz
> setfacl: nnn: stat() failed: No such file or directory

$ ls -l nnn xxx yyy zzz | cut -d' ' -f1
> ls: nnn: No such file or directory
> -rw-r--r--+
> -rw-r--r--+
> -rw-r--r--+

$ getfacl -nq nnn xxx yyy zzz
> getfacl: nnn: stat() failed: No such file or directory
>            user:42:--x-----------:------:allow
>           group:43:-w------------:------:allow
>             owner@:rw-p--aARWcCos:------:allow
>             group@:r-----a-R-c--s:------:allow
>          everyone@:r-----a-R-c--s:------:allow
>
>            user:42:--x-----------:------:allow
>           group:43:-w------------:------:allow
>             owner@:rw-p--aARWcCos:------:allow
>             group@:r-----a-R-c--s:------:allow
>          everyone@:r-----a-R-c--s:------:allow
>
>            user:42:--x-----------:------:allow
>           group:43:-w------------:------:allow
>             owner@:rw-p--aARWcCos:------:allow
>             group@:r-----a-R-c--s:------:allow
>          everyone@:r-----a-R-c--s:------:allow

$ setfacl -b nnn xxx yyy zzz
> setfacl: nnn: stat() failed: No such file or directory

$ ls -l nnn xxx yyy zzz | cut -d' ' -f1
> ls: nnn: No such file or directory
> -rw-r--r--
> -rw-r--r--
> -rw-r--r--

$ rm xxx yyy zzz

# Test applying mode to an ACL.
$ touch xxx
$ setfacl -a0 user:42:r:allow,user:43:w:deny,user:43:w:allow,user:44:x:allow -x everyone@::allow xxx
$ chmod 600 xxx
$ getfacl -n xxx
> # file: xxx
> # owner: root
> # group: wheel
>             owner@:rw-p--aARWcCos:------:allow
>             group@:------a-R-c--s:------:allow
>          everyone@:------a-R-c--s:------:allow

$ ls -l xxx | cut -d' ' -f1
> -rw-------

$ rm xxx
$ touch xxx
$ chown 42 xxx
$ setfacl -a0 user:42:r:allow,user:43:w:deny,user:43:w:allow,user:44:x:allow xxx
$ chmod 600 xxx
$ getfacl -n xxx
> # file: xxx
> # owner: 42
> # group: wheel
>             owner@:rw-p--aARWcCos:------:allow
>             group@:------a-R-c--s:------:allow
>          everyone@:------a-R-c--s:------:allow
$ ls -l xxx | cut -d' ' -f1
> -rw-------

$ rm xxx
$ touch xxx
$ chown 43 xxx
$ setfacl -a0 user:42:r:allow,user:43:w:deny,user:43:w:allow,user:44:x:allow xxx
$ chmod 124 xxx
$ getfacl -n xxx
> # file: xxx
> # owner: 43
> # group: wheel
>             owner@:rw-p----------:------:deny
>             group@:r-------------:------:deny
>             owner@:--x---aARWcCos:------:allow
>             group@:-w-p--a-R-c--s:------:allow
>          everyone@:r-----a-R-c--s:------:allow
$ ls -l xxx | cut -d' ' -f1
> ---x-w-r--

$ rm xxx
$ touch xxx
$ chown 43 xxx
$ setfacl -a0 user:42:r:allow,user:43:w:deny,user:43:w:allow,user:44:x:allow xxx
$ chmod 412 xxx
$ getfacl -n xxx
> # file: xxx
> # owner: 43
> # group: wheel
>             owner@:-wxp----------:------:deny
>             group@:-w-p----------:------:deny
>             owner@:r-----aARWcCos:------:allow
>             group@:--x---a-R-c--s:------:allow
>          everyone@:-w-p--a-R-c--s:------:allow
$ ls -l xxx | cut -d' ' -f1
> -r----x-w-

$ mkdir ddd
$ setfacl -a0 group:44:rwapd:allow ddd
$ setfacl -a0 group:43:write_data/delete_child:d:deny,group@:ad:allow ddd
$ setfacl -a0 user:42:rx:fi:allow,group:42:write_data/delete_child:d:allow ddd
$ setfacl -m everyone@:-w-p--a-R-c--s:fi:allow ddd
$ getfacl -n ddd
> # file: ddd
> # owner: root
> # group: wheel
>            user:42:r-x-----------:f-i---:allow
>           group:42:-w--D---------:-d----:allow
>           group:43:-w--D---------:-d----:deny
>             group@:-----da-------:------:allow
>           group:44:rw-p-da-------:------:allow
>             owner@:rwxp--aARWcCos:------:allow
>             group@:r-x---a-R-c--s:------:allow
>          everyone@:-w-p--a-R-c--s:f-i---:allow

$ chmod 777 ddd
$ getfacl -n ddd
> # file: ddd
> # owner: root
> # group: wheel
>             owner@:rwxp--aARWcCos:------:allow
>             group@:rwxp--a-R-c--s:------:allow
>          everyone@:rwxp--a-R-c--s:------:allow

# Test applying ACL to mode.
$ rmdir ddd
$ mkdir ddd
$ setfacl -a0 u:42:rwx:fi:allow ddd
$ ls -ld ddd | cut -d' ' -f1
> drwxr-xr-x+

$ rmdir ddd
$ mkdir ddd
$ chmod 0 ddd
$ setfacl -a0 owner@:r:allow,group@:w:deny,group@:wx:allow ddd
$ ls -ld ddd | cut -d' ' -f1
> dr----x---+

$ rmdir ddd
$ mkdir ddd
$ chmod 0 ddd
$ setfacl -a0 owner@:r:allow,group@:w:fi:deny,group@:wx:allow ddd
$ ls -ld ddd | cut -d' ' -f1
> dr---wx---+

$ rmdir ddd
$ mkdir ddd
$ chmod 0 ddd
$ setfacl -a0 owner@:r:allow,group:43:w:deny,group:43:wx:allow ddd
$ ls -ld ddd | cut -d' ' -f1
> dr--------+

$ rmdir ddd
$ mkdir ddd
$ chmod 0 ddd
$ setfacl -a0 owner@:r:allow,user:43:w:deny,user:43:wx:allow ddd
$ ls -ld ddd | cut -d' ' -f1
> dr--------+

# Test inheritance.
$ rmdir ddd
$ mkdir ddd
$ setfacl -a0 group:43:write_data/write_acl:fin:deny,u:43:rwxp:allow ddd
$ setfacl -a0 user:42:rx:fi:allow,group:42:write_data/delete_child:dn:deny ddd
$ setfacl -a0 user:42:write_acl/write_owner:fi:allow ddd
$ setfacl -a0 group:41:read_data/read_attributes:dni:allow ddd
$ setfacl -a0 user:41:write_data/write_attributes:fn:allow ddd
$ getfacl -qn ddd
>            user:41:-w-----A------:f--n--:allow
>           group:41:r-----a-------:-din--:allow
>            user:42:-----------Co-:f-i---:allow
>            user:42:r-x-----------:f-i---:allow
>           group:42:-w--D---------:-d-n--:deny
>           group:43:-w---------C--:f-in--:deny
>            user:43:rwxp----------:------:allow
>             owner@:rwxp--aARWcCos:------:allow
>             group@:r-x---a-R-c--s:------:allow
>          everyone@:r-x---a-R-c--s:------:allow

$ cd ddd
$ touch xxx
$ getfacl -qn xxx
>            user:41:--------------:------:allow
>            user:42:--------------:------:allow
>            user:42:r-------------:------:allow
>           group:43:-w---------C--:------:deny
>             owner@:rw-p--aARWcCos:------:allow
>             group@:r-----a-R-c--s:------:allow
>          everyone@:r-----a-R-c--s:------:allow

$ rm xxx
$ umask 077
$ touch xxx
$ getfacl -qn xxx
>            user:41:--------------:------:allow
>            user:42:--------------:------:allow
>            user:42:--------------:------:allow
>           group:43:-w---------C--:------:deny
>             owner@:rw-p--aARWcCos:------:allow
>             group@:------a-R-c--s:------:allow
>          everyone@:------a-R-c--s:------:allow

$ rm xxx
$ umask 770
$ touch xxx
$ getfacl -qn xxx
>             owner@:rw-p----------:------:deny
>             group@:rw-p----------:------:deny
>            user:41:--------------:------:allow
>            user:42:--------------:------:allow
>            user:42:--------------:------:allow
>           group:43:-w---------C--:------:deny
>             owner@:------aARWcCos:------:allow
>             group@:------a-R-c--s:------:allow
>          everyone@:rw-p--a-R-c--s:------:allow

$ rm xxx
$ umask 707
$ touch xxx
$ getfacl -qn xxx
>             owner@:rw-p----------:------:deny
>            user:41:-w------------:------:allow
>            user:42:--------------:------:allow
>            user:42:r-------------:------:allow
>           group:43:-w---------C--:------:deny
>             owner@:------aARWcCos:------:allow
>             group@:rw-p--a-R-c--s:------:allow
>          everyone@:------a-R-c--s:------:allow

$ umask 077
$ mkdir yyy
$ getfacl -qn yyy
>           group:41:------a-------:------:allow
>            user:42:-----------Co-:f-i---:allow
>            user:42:r-x-----------:f-i---:allow
>           group:42:-w--D---------:------:deny
>             owner@:rwxp--aARWcCos:------:allow
>             group@:------a-R-c--s:------:allow
>          everyone@:------a-R-c--s:------:allow

$ rmdir yyy
$ umask 770
$ mkdir yyy
$ getfacl -qn yyy
>             owner@:rwxp----------:------:deny
>             group@:rwxp----------:------:deny
>           group:41:------a-------:------:allow
>            user:42:-----------Co-:f-i---:allow
>            user:42:r-x-----------:f-i---:allow
>           group:42:-w--D---------:------:deny
>             owner@:------aARWcCos:------:allow
>             group@:------a-R-c--s:------:allow
>          everyone@:rwxp--a-R-c--s:------:allow

$ rmdir yyy
$ umask 707
$ mkdir yyy
$ getfacl -qn yyy
>             owner@:rwxp----------:------:deny
>           group:41:r-----a-------:------:allow
>            user:42:-----------Co-:f-i---:allow
>            user:42:r-x-----------:f-i---:allow
>           group:42:-w--D---------:------:deny
>             owner@:------aARWcCos:------:allow
>             group@:rwxp--a-R-c--s:------:allow
>          everyone@:------a-R-c--s:------:allow

# There is some complication regarding how write_acl and write_owner flags
# get inherited.  Make sure we got it right.
$ setfacl -b .
$ setfacl -a0 u:42:Co:f:allow .
$ setfacl -a0 u:43:Co:d:allow .
$ setfacl -a0 u:44:Co:fd:allow .
$ setfacl -a0 u:45:Co:fi:allow .
$ setfacl -a0 u:46:Co:di:allow .
$ setfacl -a0 u:47:Co:fdi:allow .
$ setfacl -a0 u:48:Co:fn:allow .
$ setfacl -a0 u:49:Co:dn:allow .
$ setfacl -a0 u:50:Co:fdn:allow .
$ setfacl -a0 u:51:Co:fni:allow .
$ setfacl -a0 u:52:Co:dni:allow .
$ setfacl -a0 u:53:Co:fdni:allow .
$ umask 022
$ rm xxx
$ touch xxx
$ getfacl -nq xxx
>            user:53:--------------:------:allow
>            user:51:--------------:------:allow
>            user:50:--------------:------:allow
>            user:48:--------------:------:allow
>            user:47:--------------:------:allow
>            user:45:--------------:------:allow
>            user:44:--------------:------:allow
>            user:42:--------------:------:allow
>             owner@:rw-p--aARWcCos:------:allow
>             group@:r-----a-R-c--s:------:allow
>          everyone@:r-----a-R-c--s:------:allow

$ rmdir yyy
$ mkdir yyy
$ getfacl -nq yyy
>            user:53:--------------:------:allow
>            user:52:--------------:------:allow
>            user:50:--------------:------:allow
>            user:49:--------------:------:allow
>            user:47:--------------:fd----:allow
>            user:46:--------------:-d----:allow
>            user:45:-----------Co-:f-i---:allow
>            user:44:--------------:fd----:allow
>            user:43:--------------:-d----:allow
>            user:42:-----------Co-:f-i---:allow
>             owner@:rwxp--aARWcCos:------:allow
>             group@:r-x---a-R-c--s:------:allow
>          everyone@:r-x---a-R-c--s:------:allow

$ setfacl -b .
$ setfacl -a0 u:42:Co:f:deny .
$ setfacl -a0 u:43:Co:d:deny .
$ setfacl -a0 u:44:Co:fd:deny .
$ setfacl -a0 u:45:Co:fi:deny .
$ setfacl -a0 u:46:Co:di:deny .
$ setfacl -a0 u:47:Co:fdi:deny .
$ setfacl -a0 u:48:Co:fn:deny .
$ setfacl -a0 u:49:Co:dn:deny .
$ setfacl -a0 u:50:Co:fdn:deny .
$ setfacl -a0 u:51:Co:fni:deny .
$ setfacl -a0 u:52:Co:dni:deny .
$ setfacl -a0 u:53:Co:fdni:deny .
$ umask 022
$ rm xxx
$ touch xxx
$ getfacl -nq xxx
>            user:53:-----------Co-:------:deny
>            user:51:-----------Co-:------:deny
>            user:50:-----------Co-:------:deny
>            user:48:-----------Co-:------:deny
>            user:47:-----------Co-:------:deny
>            user:45:-----------Co-:------:deny
>            user:44:-----------Co-:------:deny
>            user:42:-----------Co-:------:deny
>             owner@:rw-p--aARWcCos:------:allow
>             group@:r-----a-R-c--s:------:allow
>          everyone@:r-----a-R-c--s:------:allow

$ rmdir yyy
$ mkdir yyy
$ getfacl -nq yyy
>            user:53:-----------Co-:------:deny
>            user:52:-----------Co-:------:deny
>            user:50:-----------Co-:------:deny
>            user:49:-----------Co-:------:deny
>            user:47:-----------Co-:fd----:deny
>            user:46:-----------Co-:-d----:deny
>            user:45:-----------Co-:f-i---:deny
>            user:44:-----------Co-:fd----:deny
>            user:43:-----------Co-:-d----:deny
>            user:42:-----------Co-:f-i---:deny
>             owner@:rwxp--aARWcCos:------:allow
>             group@:r-x---a-R-c--s:------:allow
>          everyone@:r-x---a-R-c--s:------:allow

$ rmdir yyy
$ rm xxx
$ cd ..
$ rmdir ddd

$ rm xxx


Man Man