2015-12-04 10:12:05 -06:00
|
|
|
#
|
|
|
|
# Copyright (C) 2015 FreeIPA Contributors see COPYING for license
|
|
|
|
#
|
|
|
|
|
|
|
|
"""
|
|
|
|
Module provides tests which testing ability of various subsystems to be
|
|
|
|
installed.
|
|
|
|
"""
|
|
|
|
|
2017-12-27 15:32:47 -06:00
|
|
|
from __future__ import absolute_import
|
|
|
|
|
|
|
|
import os
|
2019-05-15 07:36:40 -05:00
|
|
|
import re
|
2018-10-03 09:50:11 -05:00
|
|
|
from datetime import datetime, timedelta
|
|
|
|
import time
|
2019-04-15 07:37:25 -05:00
|
|
|
|
|
|
|
from cryptography.hazmat.primitives import hashes
|
2016-10-13 10:42:27 -05:00
|
|
|
import pytest
|
2019-04-15 07:37:25 -05:00
|
|
|
|
2016-10-13 10:42:27 -05:00
|
|
|
from ipalib.constants import DOMAIN_LEVEL_0
|
2018-08-13 08:24:48 -05:00
|
|
|
from ipaplatform.constants import constants
|
2019-05-15 07:36:40 -05:00
|
|
|
from ipaplatform.osinfo import osinfo
|
2017-12-27 15:32:47 -06:00
|
|
|
from ipaplatform.paths import paths
|
2019-04-25 06:24:50 -05:00
|
|
|
from ipaplatform.tasks import tasks as platformtasks
|
2018-08-02 06:45:19 -05:00
|
|
|
from ipatests.pytest_ipa.integration.env_config import get_global_config
|
2015-12-04 10:12:05 -06:00
|
|
|
from ipatests.test_integration.base import IntegrationTest
|
2018-08-02 06:45:19 -05:00
|
|
|
from ipatests.pytest_ipa.integration import tasks
|
2017-12-27 15:32:47 -06:00
|
|
|
from ipatests.test_integration.test_caless import CALessBase, ipa_certs_cleanup
|
2018-10-03 09:50:11 -05:00
|
|
|
from ipalib import x509
|
2015-12-04 10:12:05 -06:00
|
|
|
|
2016-10-13 10:42:27 -05:00
|
|
|
config = get_global_config()
|
2015-12-04 10:12:05 -06:00
|
|
|
|
2017-12-27 15:32:47 -06:00
|
|
|
|
|
|
|
def create_broken_resolv_conf(master):
|
|
|
|
# Force a broken resolv.conf to simulate a bad response to
|
|
|
|
# reverse zone lookups
|
|
|
|
master.run_command([
|
Fix unnecessary usrmerge assumptions
On non-usrmerge systems (e.g., Debian), bash, mv, cp, cat, tail,
keyctl, and gzip live in /bin, not /usr/bin.
On usrmerge systems, /bin is a symlink to /usr/bin (or vice versa), so
this has no effect.
Signed-off-by: Robbie Harwood <rharwood@redhat.com>
Reviewed-By: Alexander Bokovoy <abokovoy@redhat.com>
Reviewed-By: Christian Heimes <cheimes@redhat.com>
2019-04-10 16:25:37 -05:00
|
|
|
'/bin/mv',
|
2017-12-27 15:32:47 -06:00
|
|
|
paths.RESOLV_CONF,
|
|
|
|
'%s.sav' % paths.RESOLV_CONF
|
|
|
|
])
|
|
|
|
|
|
|
|
contents = "# Set as broken by ipatests\nnameserver 127.0.0.2\n"
|
|
|
|
master.put_file_contents(paths.RESOLV_CONF, contents)
|
|
|
|
|
|
|
|
|
|
|
|
def restore_resolv_conf(master):
|
|
|
|
if os.path.exists('%s.sav' % paths.RESOLV_CONF):
|
|
|
|
master.run_command([
|
Fix unnecessary usrmerge assumptions
On non-usrmerge systems (e.g., Debian), bash, mv, cp, cat, tail,
keyctl, and gzip live in /bin, not /usr/bin.
On usrmerge systems, /bin is a symlink to /usr/bin (or vice versa), so
this has no effect.
Signed-off-by: Robbie Harwood <rharwood@redhat.com>
Reviewed-By: Alexander Bokovoy <abokovoy@redhat.com>
Reviewed-By: Christian Heimes <cheimes@redhat.com>
2019-04-10 16:25:37 -05:00
|
|
|
'/bin/mv',
|
2017-12-27 15:32:47 -06:00
|
|
|
'%s.sav' % paths.RESOLV_CONF,
|
|
|
|
paths.RESOLV_CONF
|
|
|
|
])
|
|
|
|
|
|
|
|
|
|
|
|
def server_install_setup(func):
|
|
|
|
def wrapped(*args):
|
|
|
|
master = args[0].master
|
|
|
|
create_broken_resolv_conf(master)
|
|
|
|
try:
|
|
|
|
func(*args)
|
|
|
|
finally:
|
|
|
|
tasks.uninstall_master(master, clean=False)
|
|
|
|
restore_resolv_conf(master)
|
|
|
|
ipa_certs_cleanup(master)
|
|
|
|
return wrapped
|
|
|
|
|
|
|
|
|
2015-12-04 10:12:05 -06:00
|
|
|
class InstallTestBase1(IntegrationTest):
|
|
|
|
|
|
|
|
num_replicas = 3
|
|
|
|
topology = 'star'
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def install(cls, mh):
|
|
|
|
tasks.install_master(cls.master, setup_dns=False)
|
|
|
|
|
|
|
|
def test_replica0_ca_less_install(self):
|
|
|
|
tasks.install_replica(self.master, self.replicas[0], setup_ca=False)
|
|
|
|
|
|
|
|
def test_replica0_ipa_ca_install(self):
|
|
|
|
tasks.install_ca(self.replicas[0])
|
|
|
|
|
|
|
|
def test_replica0_ipa_kra_install(self):
|
|
|
|
tasks.install_kra(self.replicas[0], first_instance=True)
|
|
|
|
|
|
|
|
def test_replica0_ipa_dns_install(self):
|
|
|
|
tasks.install_dns(self.replicas[0])
|
|
|
|
|
|
|
|
def test_replica1_with_ca_install(self):
|
|
|
|
tasks.install_replica(self.master, self.replicas[1], setup_ca=True)
|
|
|
|
|
|
|
|
def test_replica1_ipa_kra_install(self):
|
|
|
|
tasks.install_kra(self.replicas[1])
|
|
|
|
|
|
|
|
def test_replica1_ipa_dns_install(self):
|
|
|
|
tasks.install_dns(self.replicas[1])
|
|
|
|
|
|
|
|
def test_replica2_with_ca_kra_install(self):
|
|
|
|
tasks.install_replica(self.master, self.replicas[2], setup_ca=True,
|
|
|
|
setup_kra=True)
|
|
|
|
|
|
|
|
def test_replica2_ipa_dns_install(self):
|
|
|
|
tasks.install_dns(self.replicas[2])
|
|
|
|
|
|
|
|
|
|
|
|
class InstallTestBase2(IntegrationTest):
|
|
|
|
|
|
|
|
num_replicas = 3
|
|
|
|
topology = 'star'
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def install(cls, mh):
|
|
|
|
tasks.install_master(cls.master, setup_dns=False)
|
|
|
|
|
|
|
|
def test_replica1_with_ca_dns_install(self):
|
|
|
|
tasks.install_replica(self.master, self.replicas[1], setup_ca=True,
|
|
|
|
setup_dns=True)
|
|
|
|
|
|
|
|
def test_replica1_ipa_kra_install(self):
|
|
|
|
tasks.install_kra(self.replicas[1])
|
|
|
|
|
|
|
|
def test_replica2_with_dns_install(self):
|
|
|
|
tasks.install_replica(self.master, self.replicas[2], setup_ca=False,
|
|
|
|
setup_dns=True)
|
|
|
|
|
|
|
|
def test_replica2_ipa_ca_install(self):
|
|
|
|
tasks.install_ca(self.replicas[2])
|
|
|
|
|
|
|
|
def test_replica2_ipa_kra_install(self):
|
|
|
|
tasks.install_kra(self.replicas[2])
|
|
|
|
|
|
|
|
|
2017-02-20 08:17:11 -06:00
|
|
|
class ADTrustInstallTestBase(IntegrationTest):
|
|
|
|
"""
|
|
|
|
Base test for builtin AD trust installation im combination with other
|
|
|
|
components
|
|
|
|
"""
|
|
|
|
num_replicas = 2
|
|
|
|
topology = 'star'
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def install(cls, mh):
|
|
|
|
tasks.install_master(cls.master, setup_dns=False)
|
|
|
|
|
|
|
|
def install_replica(self, replica, **kwargs):
|
|
|
|
tasks.install_replica(self.master, replica, setup_adtrust=True,
|
|
|
|
**kwargs)
|
|
|
|
|
|
|
|
def test_replica0_only_adtrust(self):
|
|
|
|
self.install_replica(self.replicas[0], setup_ca=False)
|
|
|
|
|
|
|
|
def test_replica1_all_components_adtrust(self):
|
|
|
|
self.install_replica(self.replicas[1], setup_ca=True)
|
|
|
|
|
|
|
|
|
2015-12-04 10:12:05 -06:00
|
|
|
##
|
|
|
|
# Master X Replicas installation tests
|
|
|
|
##
|
|
|
|
|
|
|
|
class TestInstallWithCA1(InstallTestBase1):
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def install(cls, mh):
|
|
|
|
tasks.install_master(cls.master, setup_dns=False)
|
|
|
|
|
2016-10-13 10:42:27 -05:00
|
|
|
@pytest.mark.skipif(config.domain_level == DOMAIN_LEVEL_0,
|
|
|
|
reason='does not work on DOMAIN_LEVEL_0 by design')
|
|
|
|
def test_replica1_ipa_kra_install(self):
|
|
|
|
super(TestInstallWithCA1, self).test_replica1_ipa_kra_install()
|
|
|
|
|
|
|
|
@pytest.mark.skipif(config.domain_level == DOMAIN_LEVEL_0,
|
|
|
|
reason='does not work on DOMAIN_LEVEL_0 by design')
|
|
|
|
def test_replica2_with_ca_kra_install(self):
|
|
|
|
super(TestInstallWithCA1, self).test_replica2_with_ca_kra_install()
|
|
|
|
|
|
|
|
@pytest.mark.skipif(config.domain_level == DOMAIN_LEVEL_0,
|
|
|
|
reason='does not work on DOMAIN_LEVEL_0 by design')
|
|
|
|
def test_replica2_ipa_dns_install(self):
|
|
|
|
super(TestInstallWithCA1, self).test_replica2_ipa_dns_install()
|
|
|
|
|
2018-11-15 00:38:53 -06:00
|
|
|
def test_install_with_bad_ldap_conf(self):
|
|
|
|
"""
|
|
|
|
Test a client install with a non standard ldap.config
|
|
|
|
https://pagure.io/freeipa/issue/7418
|
|
|
|
"""
|
|
|
|
ldap_conf = paths.OPENLDAP_LDAP_CONF
|
|
|
|
base_dn = self.master.domain.basedn # pylint: disable=no-member
|
|
|
|
client = self.replicas[0]
|
|
|
|
tasks.uninstall_master(client)
|
|
|
|
expected_msg1 = "contains deprecated and unsupported " \
|
|
|
|
"entries: HOST, PORT"
|
|
|
|
file_backup = client.get_file_contents(ldap_conf, encoding='utf-8')
|
|
|
|
constants = "URI ldaps://{}\nBASE {}\nHOST {}\nPORT 636".format(
|
|
|
|
self.master.hostname, base_dn,
|
|
|
|
self.master.hostname)
|
|
|
|
modifications = "{}\n{}".format(file_backup, constants)
|
|
|
|
client.put_file_contents(paths.OPENLDAP_LDAP_CONF, modifications)
|
|
|
|
result = client.run_command(['ipa-client-install', '-U',
|
|
|
|
'--domain', client.domain.name,
|
|
|
|
'--realm', client.domain.realm,
|
|
|
|
'-p', client.config.admin_name,
|
|
|
|
'-w', client.config.admin_password,
|
|
|
|
'--server', self.master.hostname],
|
|
|
|
raiseonerr=False)
|
|
|
|
assert expected_msg1 in result.stderr_text
|
|
|
|
client.put_file_contents(ldap_conf, file_backup)
|
|
|
|
|
2015-12-04 10:12:05 -06:00
|
|
|
|
|
|
|
class TestInstallWithCA2(InstallTestBase2):
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def install(cls, mh):
|
|
|
|
tasks.install_master(cls.master, setup_dns=False)
|
|
|
|
|
2016-10-13 10:42:27 -05:00
|
|
|
@pytest.mark.skipif(config.domain_level == DOMAIN_LEVEL_0,
|
|
|
|
reason='does not work on DOMAIN_LEVEL_0 by design')
|
|
|
|
def test_replica1_ipa_kra_install(self):
|
|
|
|
super(TestInstallWithCA2, self).test_replica1_ipa_kra_install()
|
|
|
|
|
|
|
|
@pytest.mark.skipif(config.domain_level == DOMAIN_LEVEL_0,
|
|
|
|
reason='does not work on DOMAIN_LEVEL_0 by design')
|
|
|
|
def test_replica2_ipa_kra_install(self):
|
|
|
|
super(TestInstallWithCA2, self).test_replica2_ipa_kra_install()
|
|
|
|
|
2015-12-04 10:12:05 -06:00
|
|
|
|
|
|
|
class TestInstallWithCA_KRA1(InstallTestBase1):
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def install(cls, mh):
|
|
|
|
tasks.install_master(cls.master, setup_dns=False, setup_kra=True)
|
|
|
|
|
|
|
|
def test_replica0_ipa_kra_install(self):
|
|
|
|
tasks.install_kra(self.replicas[0], first_instance=False)
|
|
|
|
|
|
|
|
|
|
|
|
class TestInstallWithCA_KRA2(InstallTestBase2):
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def install(cls, mh):
|
|
|
|
tasks.install_master(cls.master, setup_dns=False, setup_kra=True)
|
|
|
|
|
|
|
|
|
|
|
|
class TestInstallWithCA_DNS1(InstallTestBase1):
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def install(cls, mh):
|
|
|
|
tasks.install_master(cls.master, setup_dns=True)
|
|
|
|
|
2016-10-13 10:42:27 -05:00
|
|
|
@pytest.mark.skipif(config.domain_level == DOMAIN_LEVEL_0,
|
|
|
|
reason='does not work on DOMAIN_LEVEL_0 by design')
|
|
|
|
def test_replica1_ipa_kra_install(self):
|
|
|
|
super(TestInstallWithCA_DNS1, self).test_replica1_ipa_kra_install()
|
|
|
|
|
|
|
|
@pytest.mark.skipif(config.domain_level == DOMAIN_LEVEL_0,
|
|
|
|
reason='does not work on DOMAIN_LEVEL_0 by design')
|
|
|
|
def test_replica2_with_ca_kra_install(self):
|
|
|
|
super(TestInstallWithCA_DNS1, self).test_replica2_with_ca_kra_install()
|
|
|
|
|
|
|
|
@pytest.mark.skipif(config.domain_level == DOMAIN_LEVEL_0,
|
|
|
|
reason='does not work on DOMAIN_LEVEL_0 by design')
|
|
|
|
def test_replica2_ipa_dns_install(self):
|
|
|
|
super(TestInstallWithCA_DNS1, self).test_replica2_ipa_dns_install()
|
|
|
|
|
2015-12-04 10:12:05 -06:00
|
|
|
|
|
|
|
class TestInstallWithCA_DNS2(InstallTestBase2):
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def install(cls, mh):
|
|
|
|
tasks.install_master(cls.master, setup_dns=True)
|
|
|
|
|
2016-10-13 10:42:27 -05:00
|
|
|
@pytest.mark.skipif(config.domain_level == DOMAIN_LEVEL_0,
|
|
|
|
reason='does not work on DOMAIN_LEVEL_0 by design')
|
|
|
|
def test_replica1_ipa_kra_install(self):
|
|
|
|
super(TestInstallWithCA_DNS2, self).test_replica1_ipa_kra_install()
|
|
|
|
|
|
|
|
@pytest.mark.skipif(config.domain_level == DOMAIN_LEVEL_0,
|
|
|
|
reason='does not work on DOMAIN_LEVEL_0 by design')
|
|
|
|
def test_replica2_ipa_kra_install(self):
|
|
|
|
super(TestInstallWithCA_DNS2, self).test_replica2_ipa_kra_install()
|
|
|
|
|
2015-12-04 10:12:05 -06:00
|
|
|
|
2017-12-27 15:32:47 -06:00
|
|
|
class TestInstallWithCA_DNS3(CALessBase):
|
|
|
|
"""
|
|
|
|
Test an install with a bad DNS resolver configured to force a
|
|
|
|
timeout trying to verify the existing zones. In the case of a reverse
|
|
|
|
zone it is skipped unless --allow-zone-overlap is set regardless of
|
|
|
|
the value of --auto-reverse. Confirm that --allow-zone-overlap
|
|
|
|
lets the reverse zone be created.
|
|
|
|
|
|
|
|
ticket 7239
|
|
|
|
"""
|
|
|
|
|
|
|
|
@server_install_setup
|
|
|
|
def test_number_of_zones(self):
|
|
|
|
"""There should be two zones: one forward, one reverse"""
|
|
|
|
|
|
|
|
self.create_pkcs12('ca1/server')
|
|
|
|
self.prepare_cacert('ca1')
|
|
|
|
|
|
|
|
self.install_server(extra_args=['--allow-zone-overlap'])
|
|
|
|
|
|
|
|
result = self.master.run_command([
|
|
|
|
'ipa', 'dnszone-find'])
|
|
|
|
|
|
|
|
assert "in-addr.arpa." in result.stdout_text
|
|
|
|
|
|
|
|
assert "returned 2" in result.stdout_text
|
|
|
|
|
|
|
|
|
|
|
|
class TestInstallWithCA_DNS4(CALessBase):
|
|
|
|
"""
|
|
|
|
Test an install with a bad DNS resolver configured to force a
|
|
|
|
timeout trying to verify the existing zones. In the case of a reverse
|
|
|
|
zone it is skipped unless --allow-zone-overlap is set regardless of
|
|
|
|
the value of --auto-reverse. Confirm that without --allow-reverse-zone
|
|
|
|
only the forward zone is created.
|
|
|
|
|
|
|
|
ticket 7239
|
|
|
|
"""
|
|
|
|
|
|
|
|
@server_install_setup
|
|
|
|
def test_number_of_zones(self):
|
|
|
|
"""There should be one zone, a forward because rev timed-out"""
|
|
|
|
|
|
|
|
self.create_pkcs12('ca1/server')
|
|
|
|
self.prepare_cacert('ca1')
|
|
|
|
|
|
|
|
# no zone overlap by default
|
|
|
|
self.install_server()
|
|
|
|
|
|
|
|
result = self.master.run_command([
|
|
|
|
'ipa', 'dnszone-find'])
|
|
|
|
|
|
|
|
assert "in-addr.arpa." not in result.stdout_text
|
|
|
|
|
|
|
|
assert "returned 1" in result.stdout_text
|
|
|
|
|
|
|
|
|
2016-11-15 07:18:59 -06:00
|
|
|
@pytest.mark.cs_acceptance
|
2015-12-04 10:12:05 -06:00
|
|
|
class TestInstallWithCA_KRA_DNS1(InstallTestBase1):
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def install(cls, mh):
|
|
|
|
tasks.install_master(cls.master, setup_dns=True, setup_kra=True)
|
|
|
|
|
|
|
|
def test_replica0_ipa_kra_install(self):
|
|
|
|
tasks.install_kra(self.replicas[0], first_instance=False)
|
|
|
|
|
|
|
|
|
|
|
|
class TestInstallWithCA_KRA_DNS2(InstallTestBase2):
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def install(cls, mh):
|
|
|
|
tasks.install_master(cls.master, setup_dns=True, setup_kra=True)
|
|
|
|
|
|
|
|
|
2017-02-20 08:17:11 -06:00
|
|
|
class TestADTrustInstall(ADTrustInstallTestBase):
|
|
|
|
"""
|
|
|
|
Tests built-in AD trust installation in various combinations (see the base
|
|
|
|
class for more details) against plain IPA master (no DNS, no KRA, no AD
|
|
|
|
trust)
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
|
|
class TestADTrustInstallWithDNS_KRA_ADTrust(ADTrustInstallTestBase):
|
|
|
|
"""
|
|
|
|
Tests built-in AD trust installation in various combinations (see the base
|
|
|
|
class for more details) against fully equipped (DNS, CA, KRA, ADtrust)
|
|
|
|
master. Additional two test cases were added to test interplay including
|
|
|
|
KRA installer
|
|
|
|
"""
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def install(cls, mh):
|
|
|
|
tasks.install_master(cls.master, setup_dns=True, setup_kra=True,
|
|
|
|
setup_adtrust=True)
|
|
|
|
|
|
|
|
def test_replica1_all_components_adtrust(self):
|
|
|
|
self.install_replica(self.replicas[1], setup_ca=True, setup_kra=True)
|
|
|
|
|
|
|
|
|
2015-12-04 10:12:05 -06:00
|
|
|
##
|
|
|
|
# Rest of master installation tests
|
|
|
|
##
|
|
|
|
|
|
|
|
class TestInstallMaster(IntegrationTest):
|
|
|
|
|
|
|
|
num_replicas = 0
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def install(cls, mh):
|
|
|
|
pass
|
|
|
|
|
|
|
|
def test_install_master(self):
|
|
|
|
tasks.install_master(self.master, setup_dns=False)
|
|
|
|
|
|
|
|
def test_install_kra(self):
|
|
|
|
tasks.install_kra(self.master, first_instance=True)
|
|
|
|
|
|
|
|
def test_install_dns(self):
|
2019-04-25 06:24:50 -05:00
|
|
|
tasks.install_dns(
|
|
|
|
self.master,
|
|
|
|
extra_args=['--dnssec-master', '--no-dnssec-validation']
|
|
|
|
)
|
2015-12-04 10:12:05 -06:00
|
|
|
|
2018-08-13 08:24:48 -05:00
|
|
|
def test_WSGI_worker_process(self):
|
|
|
|
""" Test if WSGI worker process count is set to 4
|
|
|
|
|
|
|
|
related ticket : https://pagure.io/freeipa/issue/7587
|
|
|
|
"""
|
|
|
|
# check process count in httpd conf file i.e expected string
|
|
|
|
exp = b'WSGIDaemonProcess ipa processes=%d' % constants.WSGI_PROCESSES
|
|
|
|
httpd_conf = self.master.get_file_contents(paths.HTTPD_IPA_CONF)
|
|
|
|
assert exp in httpd_conf
|
|
|
|
|
|
|
|
# check the process count
|
|
|
|
cmd = self.master.run_command('ps -eF')
|
|
|
|
wsgi_count = cmd.stdout_text.count('wsgi:ipa')
|
|
|
|
assert constants.WSGI_PROCESSES == wsgi_count
|
|
|
|
|
2018-08-30 05:37:33 -05:00
|
|
|
def test_error_for_yubikey(self):
|
|
|
|
""" Test error when yubikey hardware not present
|
|
|
|
|
|
|
|
In order to work with IPA and Yubikey, libyubikey is required.
|
|
|
|
Before the fix, if yubikey added without having packages, it used to
|
|
|
|
result in traceback. Now it the exception is handeled properly.
|
|
|
|
It needs Yubikey hardware to make command successfull. This test
|
|
|
|
just check of proper error thrown when hardware is not attached.
|
|
|
|
|
|
|
|
related ticket : https://pagure.io/freeipa/issue/6979
|
|
|
|
"""
|
|
|
|
# try to add yubikey to the user
|
|
|
|
args = ['ipa', 'otptoken-add-yubikey', '--owner=admin']
|
|
|
|
cmd = self.master.run_command(args, raiseonerr=False)
|
|
|
|
assert cmd.returncode != 0
|
|
|
|
exp_str = ("ipa: ERROR: No YubiKey found")
|
|
|
|
assert exp_str in cmd.stderr_text
|
|
|
|
|
2019-04-15 07:37:25 -05:00
|
|
|
def test_pki_certs(self):
|
|
|
|
certs, keys = tasks.certutil_certs_keys(
|
|
|
|
self.master,
|
|
|
|
paths.PKI_TOMCAT_ALIAS_DIR,
|
|
|
|
paths.PKI_TOMCAT_ALIAS_PWDFILE_TXT
|
|
|
|
)
|
|
|
|
|
|
|
|
expected_certs = {
|
|
|
|
# CA
|
|
|
|
'caSigningCert cert-pki-ca': 'CTu,Cu,Cu',
|
|
|
|
'ocspSigningCert cert-pki-ca': 'u,u,u',
|
|
|
|
'subsystemCert cert-pki-ca': 'u,u,u',
|
|
|
|
'auditSigningCert cert-pki-ca': 'u,u,Pu', # why P?
|
|
|
|
# KRA
|
|
|
|
'transportCert cert-pki-kra': 'u,u,u',
|
|
|
|
'storageCert cert-pki-kra': 'u,u,u',
|
|
|
|
'auditSigningCert cert-pki-kra': 'u,u,Pu',
|
|
|
|
# server
|
|
|
|
'Server-Cert cert-pki-ca': 'u,u,u',
|
|
|
|
}
|
|
|
|
assert certs == expected_certs
|
|
|
|
assert len(certs) == len(keys)
|
|
|
|
|
|
|
|
for nickname in sorted(certs):
|
|
|
|
cert = tasks.certutil_fetch_cert(
|
|
|
|
self.master,
|
|
|
|
paths.PKI_TOMCAT_ALIAS_DIR,
|
|
|
|
paths.PKI_TOMCAT_ALIAS_PWDFILE_TXT,
|
|
|
|
nickname
|
|
|
|
)
|
|
|
|
key_size = cert.public_key().key_size
|
|
|
|
if nickname == 'caSigningCert cert-pki-ca':
|
|
|
|
assert key_size == 3072
|
|
|
|
else:
|
|
|
|
assert key_size == 2048
|
|
|
|
assert cert.signature_hash_algorithm.name == hashes.SHA256.name
|
|
|
|
|
2019-04-24 06:13:45 -05:00
|
|
|
def test_p11_kit_softhsm2(self):
|
|
|
|
# check that p11-kit-proxy does not inject SoftHSM2
|
|
|
|
result = self.master.run_command([
|
|
|
|
"modutil", "-dbdir", paths.PKI_TOMCAT_ALIAS_DIR, "-list"
|
|
|
|
])
|
|
|
|
assert "softhsm" not in result.stdout_text.lower()
|
|
|
|
assert "opendnssec" not in result.stdout_text.lower()
|
|
|
|
|
2019-04-25 06:24:50 -05:00
|
|
|
@pytest.mark.skipif(
|
|
|
|
not platformtasks.is_selinux_enabled(),
|
|
|
|
reason="Test needs SELinux enabled")
|
|
|
|
def test_selinux_avcs(self):
|
|
|
|
# Use journalctl instead of ausearch. The ausearch command is not
|
|
|
|
# installed by default and journalctl gives us all AVCs.
|
|
|
|
result = self.master.run_command([
|
|
|
|
"journalctl", "--full", "--grep=AVC", "--since=yesterday"
|
|
|
|
])
|
|
|
|
avcs = list(
|
|
|
|
line.strip() for line in result.stdout_text.split('\n')
|
|
|
|
if "AVC avc:" in line
|
|
|
|
)
|
|
|
|
if avcs:
|
|
|
|
print('\n'.join(avcs))
|
|
|
|
# Use expected failure until all SELinux violations are fixed
|
|
|
|
pytest.xfail("{} AVCs found".format(len(avcs)))
|
2019-04-24 06:13:45 -05:00
|
|
|
|
2019-05-15 07:36:40 -05:00
|
|
|
def test_file_permissions(self):
|
|
|
|
args = [
|
|
|
|
"rpm", "-V",
|
|
|
|
"python3-ipaclient",
|
|
|
|
"python3-ipalib",
|
|
|
|
"python3-ipaserver"
|
|
|
|
]
|
|
|
|
|
|
|
|
if osinfo.id == 'fedora':
|
|
|
|
args.extend([
|
|
|
|
"freeipa-client",
|
|
|
|
"freeipa-client-common",
|
|
|
|
"freeipa-common",
|
|
|
|
"freeipa-server",
|
|
|
|
"freeipa-server-common",
|
|
|
|
"freeipa-server-dns",
|
|
|
|
"freeipa-server-trust-ad"
|
|
|
|
])
|
|
|
|
else:
|
|
|
|
args.extend([
|
|
|
|
"ipa-client",
|
|
|
|
"ipa-client-common",
|
|
|
|
"ipa-common",
|
|
|
|
"ipa-server",
|
|
|
|
"ipa-server-common",
|
|
|
|
"ipa-server-dns"
|
|
|
|
])
|
|
|
|
|
|
|
|
result = self.master.run_command(args, raiseonerr=False)
|
|
|
|
if result.returncode != 0:
|
|
|
|
# Check the mode errors
|
|
|
|
mode_warnings = re.findall(
|
|
|
|
r"^.M....... [cdglr ]+ (?P<filename>.*)$",
|
|
|
|
result.stdout_text, re.MULTILINE)
|
|
|
|
msg = "rpm -V found mode issues for the following files: {}"
|
|
|
|
assert mode_warnings == [], msg.format(mode_warnings)
|
|
|
|
# Check the owner errors
|
|
|
|
user_warnings = re.findall(
|
|
|
|
r"^.....U... [cdglr ]+ (?P<filename>.*)$",
|
|
|
|
result.stdout_text, re.MULTILINE)
|
|
|
|
msg = "rpm -V found ownership issues for the following files: {}"
|
|
|
|
assert user_warnings == [], msg.format(user_warnings)
|
|
|
|
# Check the group errors
|
|
|
|
group_warnings = re.findall(
|
|
|
|
r"^......G.. [cdglr ]+ (?P<filename>.*)$",
|
|
|
|
result.stdout_text, re.MULTILINE)
|
|
|
|
msg = "rpm -V found group issues for the following files: {}"
|
|
|
|
assert group_warnings == [], msg.format(group_warnings)
|
|
|
|
|
2015-12-04 10:12:05 -06:00
|
|
|
|
|
|
|
class TestInstallMasterKRA(IntegrationTest):
|
|
|
|
|
|
|
|
num_replicas = 0
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def install(cls, mh):
|
|
|
|
pass
|
|
|
|
|
|
|
|
def test_install_master(self):
|
|
|
|
tasks.install_master(self.master, setup_dns=False, setup_kra=True)
|
|
|
|
|
|
|
|
def test_install_dns(self):
|
|
|
|
tasks.install_dns(self.master)
|
|
|
|
|
|
|
|
|
|
|
|
class TestInstallMasterDNS(IntegrationTest):
|
|
|
|
|
|
|
|
num_replicas = 0
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def install(cls, mh):
|
|
|
|
pass
|
|
|
|
|
|
|
|
def test_install_master(self):
|
2018-07-03 15:12:07 -05:00
|
|
|
tasks.install_master(
|
|
|
|
self.master,
|
|
|
|
setup_dns=True,
|
|
|
|
extra_args=['--zonemgr', 'me@example.org'],
|
|
|
|
)
|
2015-12-04 10:12:05 -06:00
|
|
|
|
|
|
|
def test_install_kra(self):
|
|
|
|
tasks.install_kra(self.master, first_instance=True)
|
2018-01-25 02:51:04 -06:00
|
|
|
|
|
|
|
|
|
|
|
class TestInstallMasterReservedIPasForwarder(IntegrationTest):
|
|
|
|
"""Test to check if IANA reserved IP doesn't accepted as DNS forwarder
|
|
|
|
|
|
|
|
IANA reserved IP address can not be used as a forwarder.
|
|
|
|
This test checks if ipa server installation throws an error when
|
|
|
|
0.0.0.0 is specified as forwarder IP address.
|
|
|
|
|
|
|
|
related ticket: https://pagure.io/freeipa/issue/6894
|
|
|
|
"""
|
|
|
|
|
|
|
|
def test_reserved_ip_as_forwarder(self):
|
|
|
|
args = [
|
|
|
|
'ipa-server-install',
|
|
|
|
'-n', self.master.domain.name,
|
|
|
|
'-r', self.master.domain.realm,
|
|
|
|
'-p', self.master.config.dirman_password,
|
|
|
|
'-a', self.master.config.admin_password,
|
|
|
|
'--setup-dns',
|
|
|
|
'--forwarder', '0.0.0.0',
|
|
|
|
'--auto-reverse']
|
|
|
|
cmd = self.master.run_command(args, raiseonerr=False)
|
|
|
|
assert cmd.returncode == 2
|
|
|
|
exp_str = ("error: option --forwarder: invalid IP address 0.0.0.0: "
|
|
|
|
"cannot use IANA reserved IP address 0.0.0.0")
|
|
|
|
assert exp_str in cmd.stderr_text
|
|
|
|
|
|
|
|
server_install_options = (
|
2018-03-15 08:59:33 -05:00
|
|
|
"yes\n"
|
2018-03-26 17:43:13 -05:00
|
|
|
"{hostname}\n"
|
2018-03-15 08:59:33 -05:00
|
|
|
"{dmname}\n\n"
|
2018-01-25 02:51:04 -06:00
|
|
|
"{dm_pass}\n{dm_pass}"
|
|
|
|
"\n{admin_pass}\n{admin_pass}\n"
|
|
|
|
"yes\nyes\n0.0.0.0\n".format(
|
|
|
|
dm_pass=self.master.config.dirman_password,
|
2018-03-15 08:59:33 -05:00
|
|
|
admin_pass=self.master.config.admin_password,
|
2018-03-26 17:43:13 -05:00
|
|
|
dmname=self.master.domain.name,
|
|
|
|
hostname=self.master.hostname))
|
2018-01-25 02:51:04 -06:00
|
|
|
|
|
|
|
cmd = self.master.run_command(['ipa-server-install'],
|
|
|
|
stdin_text=server_install_options,
|
|
|
|
raiseonerr=False)
|
|
|
|
exp_str = ("Invalid IP Address 0.0.0.0: cannot use IANA reserved "
|
|
|
|
"IP address 0.0.0.0")
|
|
|
|
assert exp_str in cmd.stdout_text
|
2018-10-03 09:50:11 -05:00
|
|
|
|
|
|
|
|
|
|
|
class TestKRAinstallAfterCertRenew(IntegrationTest):
|
|
|
|
""" Test KRA installtion after ca agent cert renewal
|
|
|
|
|
|
|
|
KRA installation was failing after ca-agent cert gets renewed.
|
|
|
|
This test checks if the symptoms no longer exist.
|
|
|
|
|
|
|
|
related ticket: https://pagure.io/freeipa/issue/7288
|
|
|
|
"""
|
|
|
|
|
|
|
|
def test_KRA_install_after_cert_renew(self):
|
|
|
|
|
|
|
|
tasks.install_master(self.master)
|
|
|
|
|
|
|
|
# get ca-agent cert and load as pem
|
|
|
|
dm_pass = self.master.config.dirman_password
|
|
|
|
admin_pass = self.master.config.admin_password
|
|
|
|
args = [paths.OPENSSL, "pkcs12", "-in",
|
|
|
|
paths.DOGTAG_ADMIN_P12, "-nodes",
|
|
|
|
"-passin", "pass:{}".format(dm_pass)]
|
|
|
|
cmd = self.master.run_command(args)
|
|
|
|
|
|
|
|
certs = x509.load_certificate_list(cmd.stdout_text.encode('utf-8'))
|
|
|
|
|
|
|
|
# get expiry date of agent cert
|
|
|
|
cert_expiry = certs[0].not_valid_after
|
|
|
|
|
|
|
|
# move date to grace period so that certs get renewed
|
|
|
|
self.master.run_command(['systemctl', 'stop', 'chronyd'])
|
|
|
|
grace_date = cert_expiry - timedelta(days=10)
|
|
|
|
grace_date = datetime.strftime(grace_date, "%Y-%m-%d %H:%M:%S")
|
|
|
|
self.master.run_command(['date', '-s', grace_date])
|
|
|
|
|
|
|
|
# get the count of certs track by certmonger
|
|
|
|
cmd = self.master.run_command(['getcert', 'list'])
|
|
|
|
cert_count = cmd.stdout_text.count('Request ID')
|
|
|
|
timeout = 600
|
|
|
|
count = 0
|
|
|
|
start = time.time()
|
|
|
|
# wait sometime for cert renewal
|
|
|
|
while time.time() - start < timeout:
|
|
|
|
cmd = self.master.run_command(['getcert', 'list'])
|
|
|
|
count = cmd.stdout_text.count('status: MONITORING')
|
|
|
|
if count == cert_count:
|
|
|
|
break
|
|
|
|
time.sleep(100)
|
|
|
|
else:
|
|
|
|
# timeout
|
|
|
|
raise AssertionError('TimeOut: Failed to renew all the certs')
|
|
|
|
|
|
|
|
# move date after 3 days of actual expiry
|
|
|
|
cert_expiry = cert_expiry + timedelta(days=3)
|
|
|
|
cert_expiry = datetime.strftime(cert_expiry, "%Y-%m-%d %H:%M:%S")
|
|
|
|
self.master.run_command(['date', '-s', cert_expiry])
|
|
|
|
|
|
|
|
passwd = "{passwd}\n{passwd}\n{passwd}".format(passwd=admin_pass)
|
|
|
|
self.master.run_command(['kinit', 'admin'], stdin_text=passwd)
|
|
|
|
cmd = self.master.run_command(['ipa-kra-install', '-p', dm_pass, '-U'])
|
|
|
|
self.master.run_command(['systemctl', 'start', 'chronyd'])
|
2019-03-01 04:56:50 -06:00
|
|
|
|
|
|
|
|
|
|
|
class TestMaskInstall(IntegrationTest):
|
|
|
|
""" Test master and replica installation with wrong mask
|
|
|
|
|
|
|
|
This test checks that master/replica installation fails (expectedly) if
|
|
|
|
mask > 022.
|
|
|
|
|
|
|
|
related ticket: https://pagure.io/freeipa/issue/7193
|
|
|
|
"""
|
|
|
|
|
|
|
|
num_replicas = 0
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def install(cls, mh):
|
|
|
|
super(TestMaskInstall, cls).install(mh)
|
|
|
|
cls.bashrc_file = cls.master.get_file_contents('/root/.bashrc')
|
|
|
|
|
|
|
|
def test_install_master(self):
|
|
|
|
self.master.run_command('echo "umask 0027" >> /root/.bashrc')
|
|
|
|
result = self.master.run_command(['umask'])
|
|
|
|
assert '0027' in result.stdout_text
|
|
|
|
|
|
|
|
cmd = tasks.install_master(
|
|
|
|
self.master, setup_dns=False, raiseonerr=False
|
|
|
|
)
|
|
|
|
exp_str = ("Unexpected system mask")
|
|
|
|
assert (exp_str in cmd.stderr_text and cmd.returncode != 0)
|
|
|
|
|
|
|
|
def test_install_replica(self):
|
|
|
|
result = self.master.run_command(['umask'])
|
|
|
|
assert '0027' in result.stdout_text
|
|
|
|
|
|
|
|
cmd = self.master.run_command([
|
|
|
|
'ipa-replica-install', '-w', self.master.config.admin_password,
|
|
|
|
'-n', self.master.domain.name, '-r', self.master.domain.realm,
|
|
|
|
'--server', 'dummy_master.%s' % self.master.domain.name,
|
|
|
|
'-U'], raiseonerr=False
|
|
|
|
)
|
|
|
|
exp_str = ("Unexpected system mask")
|
|
|
|
assert (exp_str in cmd.stderr_text and cmd.returncode != 0)
|
|
|
|
|
|
|
|
def test_files_ownership_and_permission_teardown(self):
|
|
|
|
""" Method to restore the default bashrc contents"""
|
|
|
|
if self.bashrc_file is not None:
|
|
|
|
self.master.put_file_contents('/root/.bashrc', self.bashrc_file)
|