mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2025-01-26 16:16:31 -06:00
ui_tests: extend test_pwpolicy.py suite
Extend WebUI test_pwpolicy suite with the following test cases Details in the ticket https://pagure.io/freeipa/issue/7574 Added tests: krbpwdminlength: lower range integer krbmaxpwdlife: non-integer, abc krbmaxpwdlife: upper range integer,2147483648 krbmaxpwdlife: lower range integer,-1 krbminpwdlife: non-integer,edf krbminpwdlife: upper range integer,2147483648 krbminpwdlife: lower range integer,-1 krbpwdhistorylength: non-integer,HIJ krbpwdhistorylength: upper range integer,2147483648 krbpwdhistorylength: lower range integer,-1 krbpwdmindiffchars: noon-integer,3lm krbpwdmindiffchars: upper range integer,2147483648 krbpwdmindiffchars: lower range integer, -1 krbpwdminlength: non-integer, n0p krbpwdminlength: upper range integer,2147483648 krbpwdminlength: lower range integer, -1 cospriority: non-integer, abc cospriority: upper range integer,2147483648 cospriority: lower range integer,-1 krbpwdmaxfailure: non-integer krbpwdmaxfailure: upper range integer krbpwdmaxfailure: lower range integer krbpwdfailurecountinterval: non-integer krbpwdfailurecountinterval: upper range integer krbpwdfailurecountinterval: lower range integer krbpwdlockoutduration: non-integer krbpwdlockoutduration: upper range integer krbpwdlockoutduration: lower range integer deletePolicy_with various scenario MeasurementUnitAdded_Bug798363 Delete global password policy add_Policy_adder_dialog_bug910463 delete_Policy_deleter_dialog_bug910463 test field: cospriority modifyPolicy(undo/refresh/reset) empty policy name upper bound of data range lower bound of data range non integer for policy priority Signed-off-by: Varun Mylaraiah <mvarun@redhat.com> Reviewed-By: Pavel Picka <ppicka@redhat.com>
This commit is contained in:
parent
c2eb0f1612
commit
39ac5f442a
@ -116,3 +116,12 @@ DATA10 = {
|
||||
('radio', 'type', 'nonposix'),
|
||||
]
|
||||
}
|
||||
|
||||
PKEY_SPECIAL_CHAR_GROUP = 'itest...group_-$'
|
||||
DATA_SPECIAL_CHAR_GROUP = {
|
||||
'pkey': PKEY_SPECIAL_CHAR_GROUP,
|
||||
'add': [
|
||||
('textbox', 'cn', PKEY_SPECIAL_CHAR_GROUP),
|
||||
('textarea', 'description', 'special characters group desc'),
|
||||
]
|
||||
}
|
||||
|
92
ipatests/test_webui/data_pwpolicy.py
Normal file
92
ipatests/test_webui/data_pwpolicy.py
Normal file
@ -0,0 +1,92 @@
|
||||
#
|
||||
# Copyright (C) 2018 FreeIPA Contributors see COPYING for license
|
||||
#
|
||||
|
||||
import ipatests.test_webui.data_group as group
|
||||
|
||||
ENTITY = 'pwpolicy'
|
||||
DEFAULT_POLICY = 'global_policy'
|
||||
|
||||
DATA = {
|
||||
'pkey': 'admins',
|
||||
'add': [
|
||||
('combobox', 'cn', 'admins'),
|
||||
('textbox', 'cospriority', '364'),
|
||||
],
|
||||
'mod': [
|
||||
('textbox', 'krbmaxpwdlife', '3000'),
|
||||
('textbox', 'krbminpwdlife', '1'),
|
||||
('textbox', 'krbpwdhistorylength', '0'),
|
||||
('textbox', 'krbpwdmindiffchars', '2'),
|
||||
('textbox', 'krbpwdminlength', '2'),
|
||||
('textbox', 'krbpwdmaxfailure', '15'),
|
||||
('textbox', 'krbpwdfailurecountinterval', '5'),
|
||||
('textbox', 'krbpwdlockoutduration', '3600'),
|
||||
('textbox', 'cospriority', '365'),
|
||||
],
|
||||
}
|
||||
|
||||
PKEY1 = group.PKEY
|
||||
DATA1 = {
|
||||
'pkey': group.PKEY,
|
||||
'add': [
|
||||
('combobox', 'cn', group.PKEY),
|
||||
('textbox', 'cospriority', '1'),
|
||||
],
|
||||
}
|
||||
|
||||
PKEY2 = group.PKEY2
|
||||
DATA2 = {
|
||||
'pkey': group.PKEY2,
|
||||
'add': [
|
||||
('combobox', 'cn', group.PKEY2),
|
||||
('textbox', 'cospriority', '2'),
|
||||
],
|
||||
}
|
||||
|
||||
PKEY3 = group.PKEY3
|
||||
DATA3 = {
|
||||
'pkey': group.PKEY3,
|
||||
'add': [
|
||||
('combobox', 'cn', group.PKEY3),
|
||||
('textbox', 'cospriority', '3'),
|
||||
],
|
||||
}
|
||||
|
||||
PKEY6 = group.PKEY6
|
||||
DATA_RESET = {
|
||||
'pkey': group.PKEY6,
|
||||
'add': [
|
||||
('combobox', 'cn', group.PKEY6),
|
||||
('textbox', 'cospriority', '6'),
|
||||
],
|
||||
'mod': [
|
||||
('textbox', 'krbmaxpwdlife', '1000'),
|
||||
('textbox', 'krbminpwdlife', '2'),
|
||||
('textbox', 'krbpwdhistorylength', '0'),
|
||||
('textbox', 'krbpwdmindiffchars', '3'),
|
||||
('textbox', 'krbpwdminlength', '4'),
|
||||
('textbox', 'krbpwdmaxfailure', '17'),
|
||||
('textbox', 'krbpwdfailurecountinterval', '4'),
|
||||
('textbox', 'krbpwdlockoutduration', '4200'),
|
||||
('textbox', 'cospriority', '38'),
|
||||
],
|
||||
}
|
||||
|
||||
PKEY_SPECIAL_CHAR = group.PKEY_SPECIAL_CHAR_GROUP
|
||||
DATA_SPECIAL_CHAR = {
|
||||
'pkey': group.PKEY_SPECIAL_CHAR_GROUP,
|
||||
'add': [
|
||||
('combobox', 'cn', group.PKEY_SPECIAL_CHAR_GROUP),
|
||||
('textbox', 'cospriority', '7'),
|
||||
],
|
||||
}
|
||||
|
||||
PKEY7 = group.PKEY4
|
||||
DATA7 = {
|
||||
'pkey': group.PKEY4,
|
||||
'add': [
|
||||
('combobox', 'cn', group.PKEY4),
|
||||
('textbox', 'cospriority', '4'),
|
||||
],
|
||||
}
|
@ -23,26 +23,22 @@ Password policy tests
|
||||
|
||||
from ipatests.test_webui.ui_driver import UI_driver
|
||||
from ipatests.test_webui.ui_driver import screenshot
|
||||
import ipatests.test_webui.data_group as group
|
||||
import ipatests.test_webui.data_pwpolicy as pwpolicy
|
||||
import pytest
|
||||
|
||||
ENTITY = 'pwpolicy'
|
||||
DATA = {
|
||||
'pkey': 'admins',
|
||||
'add': [
|
||||
('combobox', 'cn', 'admins'),
|
||||
('textbox', 'cospriority', '364'),
|
||||
],
|
||||
'mod': [
|
||||
('textbox', 'krbmaxpwdlife', '3000'),
|
||||
('textbox', 'krbminpwdlife', '1'),
|
||||
('textbox', 'krbpwdhistorylength', '0'),
|
||||
('textbox', 'krbpwdmindiffchars', '2'),
|
||||
('textbox', 'krbpwdminlength', '2'),
|
||||
('textbox', 'krbpwdmaxfailure', '15'),
|
||||
('textbox', 'krbpwdfailurecountinterval', '5'),
|
||||
('textbox', 'krbpwdlockoutduration', '3600'),
|
||||
],
|
||||
}
|
||||
try:
|
||||
from selenium.webdriver.common.keys import Keys
|
||||
from selenium.webdriver.common.action_chains import ActionChains
|
||||
except ImportError:
|
||||
pass
|
||||
|
||||
FIELDS = ['krbmaxpwdlife', 'krbminpwdlife', 'krbpwdhistorylength',
|
||||
'krbpwdmindiffchars', 'krbpwdminlength', 'krbpwdmaxfailure',
|
||||
'krbpwdfailurecountinterval', 'krbpwdlockoutduration',
|
||||
'cospriority']
|
||||
EXPECTED_ERR = "invalid 'group': cannot delete global password policy"
|
||||
EXPECTED_MSG = 'Password Policy successfully added'
|
||||
|
||||
|
||||
@pytest.mark.tier1
|
||||
@ -54,4 +50,221 @@ class test_pwpolicy(UI_driver):
|
||||
Basic CRUD: pwpolicy
|
||||
"""
|
||||
self.init_app()
|
||||
self.basic_crud(ENTITY, DATA)
|
||||
self.basic_crud(pwpolicy.ENTITY, pwpolicy.DATA)
|
||||
|
||||
@screenshot
|
||||
def test_misc(self):
|
||||
"""
|
||||
various test cases covered in one place
|
||||
"""
|
||||
# Basic requirement : create user group for test
|
||||
self.init_app()
|
||||
self.navigate_to_entity(group.ENTITY)
|
||||
self.add_record(group.ENTITY, [group.DATA, group.DATA2, group.DATA3,
|
||||
group.DATA_SPECIAL_CHAR_GROUP])
|
||||
|
||||
# add then cancel
|
||||
self.add_record(pwpolicy.ENTITY, pwpolicy.DATA1, dialog_btn='cancel')
|
||||
|
||||
# test add and add another record
|
||||
self.add_record(pwpolicy.ENTITY, [pwpolicy.DATA1, pwpolicy.DATA2])
|
||||
|
||||
# test add and edit record
|
||||
self.add_record(pwpolicy.ENTITY, pwpolicy.DATA,
|
||||
dialog_btn='add_and_edit')
|
||||
|
||||
# test delete multiple records
|
||||
self.navigate_to_entity(pwpolicy.ENTITY)
|
||||
records = [pwpolicy.DATA, pwpolicy.DATA1, pwpolicy.DATA2]
|
||||
self.select_multiple_records(records)
|
||||
self.facet_button_click('remove')
|
||||
self.dialog_button_click('ok')
|
||||
|
||||
# test add password policy for special characters group
|
||||
self.add_record(pwpolicy.ENTITY, pwpolicy.DATA_SPECIAL_CHAR,
|
||||
delete=True)
|
||||
|
||||
# empty group and priority (requires the field)
|
||||
self.facet_button_click('add')
|
||||
self.dialog_button_click('add')
|
||||
self.assert_field_validation_required(field='cn')
|
||||
self.assert_field_validation_required(field='cospriority')
|
||||
self.close_all_dialogs()
|
||||
|
||||
# test delete default policy and
|
||||
# confirming by keyboard to test ticket #4097
|
||||
self.select_record(pwpolicy.DEFAULT_POLICY)
|
||||
self.facet_button_click('remove')
|
||||
self.dialog_button_click('ok')
|
||||
self.assert_last_error_dialog(EXPECTED_ERR, details=True)
|
||||
actions = ActionChains(self.driver)
|
||||
actions.send_keys(Keys.TAB)
|
||||
actions.send_keys(Keys.ENTER).perform()
|
||||
self.wait(0.5)
|
||||
self.assert_record(pwpolicy.DEFAULT_POLICY)
|
||||
|
||||
# test add/delete Passwordpolicy confirming using
|
||||
# ENTER key ticket #3200
|
||||
self.add_record(pwpolicy.ENTITY, pwpolicy.DATA3, dialog_btn=None)
|
||||
actions = ActionChains(self.driver)
|
||||
actions.send_keys(Keys.ENTER).perform()
|
||||
self.wait_for_request(d=0.5)
|
||||
self.assert_notification(assert_text=EXPECTED_MSG)
|
||||
self.assert_record(pwpolicy.PKEY3)
|
||||
self.close_notifications()
|
||||
self.delete_record(pwpolicy.PKEY3, confirm_btn=None)
|
||||
actions = ActionChains(self.driver)
|
||||
actions.send_keys(Keys.ENTER).perform()
|
||||
self.wait_for_request(d=0.5)
|
||||
self.assert_notification(assert_text='1 item(s) deleted')
|
||||
self.assert_record(pwpolicy.PKEY3, negative=True)
|
||||
self.close_notifications()
|
||||
|
||||
# cleanup
|
||||
self.delete(group.ENTITY, [group.DATA, group.DATA2, group.DATA3,
|
||||
group.DATA_SPECIAL_CHAR_GROUP])
|
||||
|
||||
@screenshot
|
||||
def test_negative_value(self):
|
||||
"""
|
||||
Negative test for Password policy fields in edit page
|
||||
"""
|
||||
self.init_app()
|
||||
self.add_record(group.ENTITY, [group.DATA, group.DATA4])
|
||||
self.navigate_to_entity(pwpolicy.ENTITY)
|
||||
non_interger_expected_error = 'Must be an integer'
|
||||
minimum_value_expected_error = 'Minimum value is 0'
|
||||
non_integer = 'nonInteger'
|
||||
maximum_value = '2147483649'
|
||||
minimum_value = '-1'
|
||||
|
||||
self.add_record(pwpolicy.ENTITY, pwpolicy.DATA1,
|
||||
dialog_btn='add_and_edit')
|
||||
|
||||
for field in FIELDS:
|
||||
# bigger than max value
|
||||
# verifying if field value is more then 20000
|
||||
if field == 'krbmaxpwdlife':
|
||||
self.check_expected_error(field, 'Maximum value is 20000',
|
||||
maximum_value)
|
||||
# verifying if field value is more then 5
|
||||
elif field == 'krbpwdmindiffchars':
|
||||
self.check_expected_error(field, 'Maximum value is 5',
|
||||
maximum_value)
|
||||
# verifying if field value is more then 2147483647
|
||||
else:
|
||||
self.check_expected_error(field, 'Maximum value is 2147483647',
|
||||
maximum_value)
|
||||
|
||||
# string used instead of integer
|
||||
self.check_expected_error(field, non_interger_expected_error,
|
||||
non_integer)
|
||||
|
||||
# smaller than max value
|
||||
self.check_expected_error(field, minimum_value_expected_error,
|
||||
minimum_value)
|
||||
self.navigate_to_entity(pwpolicy.ENTITY)
|
||||
self.delete_record(pwpolicy.group.PKEY)
|
||||
|
||||
# Negative test for policy priority
|
||||
field_priority = 'cospriority'
|
||||
self.add_record(pwpolicy.ENTITY, pwpolicy.DATA7, dialog_btn=None)
|
||||
# non integer for policy priority
|
||||
self.fill_input(field_priority, non_integer)
|
||||
self.assert_field_validation(non_interger_expected_error,
|
||||
field=field_priority)
|
||||
# lower bound of data range
|
||||
self.fill_input(field_priority, minimum_value)
|
||||
self.assert_field_validation(minimum_value_expected_error,
|
||||
field=field_priority)
|
||||
# upper bound of data range
|
||||
self.fill_input(field_priority, maximum_value)
|
||||
self.assert_field_validation(expect_error='Maximum value is'
|
||||
' 2147483647',
|
||||
field=field_priority)
|
||||
self.close_all_dialogs()
|
||||
|
||||
# cleanup
|
||||
self.delete(group.ENTITY, [group.DATA, group.DATA4])
|
||||
|
||||
def check_expected_error(self, pwdfield, expected_error, value):
|
||||
"""
|
||||
Validating password policy fields and asserting expected error
|
||||
"""
|
||||
self.fill_textbox(pwdfield, value)
|
||||
self.wait_for_request()
|
||||
self.assert_field_validation(expected_error, field=pwdfield)
|
||||
self.facet_button_click('revert')
|
||||
|
||||
@screenshot
|
||||
def test_undo_refresh_revert(self):
|
||||
"""
|
||||
Test to verify undo/refresh/revert
|
||||
"""
|
||||
self.init_app()
|
||||
self.add_record(group.ENTITY, [group.DATA6])
|
||||
self.add_record(pwpolicy.ENTITY, pwpolicy.DATA_RESET)
|
||||
self.navigate_to_record(pwpolicy.PKEY6)
|
||||
|
||||
# test undo
|
||||
self.fill_fields(pwpolicy.DATA_RESET['mod'])
|
||||
mod_field = 0
|
||||
for field in FIELDS:
|
||||
modified_value = (pwpolicy.DATA_RESET['mod'][mod_field][2])
|
||||
self.click_undo_button(field)
|
||||
self.field_equals(field, modified_value)
|
||||
mod_field += 1
|
||||
|
||||
# test refresh
|
||||
mod_field = 0
|
||||
for field in FIELDS:
|
||||
self.fill_fields(pwpolicy.DATA_RESET['mod'])
|
||||
modified_value = (pwpolicy.DATA_RESET['mod'][mod_field][2])
|
||||
self.facet_button_click('refresh')
|
||||
self.field_equals(field, modified_value)
|
||||
mod_field += 1
|
||||
|
||||
# test revert
|
||||
mod_field = 0
|
||||
for field in FIELDS:
|
||||
self.fill_fields(pwpolicy.DATA_RESET['mod'])
|
||||
modified_value = (pwpolicy.DATA_RESET['mod'][mod_field][2])
|
||||
self.facet_button_click('revert')
|
||||
self.field_equals(field, modified_value)
|
||||
mod_field += 1
|
||||
|
||||
# cleanup
|
||||
self.navigate_to_entity(pwpolicy.ENTITY)
|
||||
self.delete_record(pwpolicy.group.PKEY6)
|
||||
self.delete(group.ENTITY, [group.DATA6])
|
||||
|
||||
def field_equals(self, field, mod_value, negative=True):
|
||||
"""
|
||||
comparing current value with modified value
|
||||
"""
|
||||
current_value = self.get_field_value(field, element="input")
|
||||
if negative:
|
||||
assert current_value != mod_value
|
||||
else:
|
||||
assert current_value == mod_value
|
||||
|
||||
@screenshot
|
||||
def test_verify_measurement_unit(self):
|
||||
"""
|
||||
verifying measurement unit for password policy ticket #2437
|
||||
"""
|
||||
self.init_app()
|
||||
self.navigate_to_entity(pwpolicy.ENTITY)
|
||||
self.navigate_to_record('global_policy')
|
||||
krbmaxpwdlife = self.get_text('label[name="krbmaxpwdlife"]')
|
||||
krbminpwdlife = self.get_text('label[name="krbminpwdlife"]')
|
||||
krbpwdhistorylen = self.get_text('label[name="krbpwdhistorylength"]')
|
||||
krbpwdfailurecountinterval = \
|
||||
self.get_text('label[name="krbpwdfailurecountinterval"]')
|
||||
krbpwdlockoutduration = \
|
||||
self.get_text('label[name="krbpwdlockoutduration"]')
|
||||
assert "Max lifetime (days)" in krbmaxpwdlife
|
||||
assert "Min lifetime (hours)" in krbminpwdlife
|
||||
assert "History size (number of passwords)" in krbpwdhistorylen
|
||||
assert "Failure reset interval (seconds)" in krbpwdfailurecountinterval
|
||||
assert "Lockout duration (seconds)" in krbpwdlockoutduration
|
||||
|
Loading…
Reference in New Issue
Block a user