mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2025-02-25 18:55:28 -06:00
Add xmlrpc test with input validation check for kerberos ticket policy.
This checks that valid/invalid inputs for subtypes of authentication indicator kerberos ticket policy options. Signed-off-by: Anuja More <amore@redhat.com> Reviewed-By: Florence Blanc-Renaud <flo@redhat.com>
This commit is contained in:
parent
e2d69380fb
commit
f35738ef22
@ -28,6 +28,33 @@ import pytest
|
|||||||
|
|
||||||
user1 = u'tuser1'
|
user1 = u'tuser1'
|
||||||
|
|
||||||
|
invalid_values = [(u'abc123', 'must be an integer'),
|
||||||
|
(u'2147483648', 'can be at most 2147483647'),
|
||||||
|
(u'0', 'must be at least 1'),
|
||||||
|
(u'-1', 'must be at least 1')]
|
||||||
|
parameters = [('krbauthindmaxrenewableage_radius', 'radius_maxrenew'),
|
||||||
|
('krbauthindmaxticketlife_radius', 'radius_maxlife'),
|
||||||
|
('krbauthindmaxrenewableage_pkinit', 'pkinit_maxrenew'),
|
||||||
|
('krbauthindmaxticketlife_pkinit', 'pkinit_maxlife'),
|
||||||
|
('krbauthindmaxrenewableage_otp', 'otp_maxrenew'),
|
||||||
|
('krbauthindmaxticketlife_otp', 'otp_maxlife'),
|
||||||
|
('krbauthindmaxrenewableage_hardened', 'hardened_maxrenew'),
|
||||||
|
('krbauthindmaxticketlife_hardened', 'hardened_maxlife'),
|
||||||
|
]
|
||||||
|
|
||||||
|
|
||||||
|
def create_dict(desc, param, param_name, value, error):
|
||||||
|
cmd_args = dict()
|
||||||
|
cmd_args[param] = value
|
||||||
|
if value != u'abc123':
|
||||||
|
return dict(desc=desc, command=('krbtpolicy_mod', [user1], cmd_args),
|
||||||
|
expected=errors.ValidationError(name=param_name,
|
||||||
|
error=error))
|
||||||
|
else:
|
||||||
|
return dict(desc=desc, command=('krbtpolicy_mod', [user1], cmd_args),
|
||||||
|
expected=errors.ConversionError(name=param_name,
|
||||||
|
error=error))
|
||||||
|
|
||||||
|
|
||||||
@pytest.mark.tier1
|
@pytest.mark.tier1
|
||||||
class test_krbtpolicy(Declarative):
|
class test_krbtpolicy(Declarative):
|
||||||
@ -116,17 +143,144 @@ class test_krbtpolicy(Declarative):
|
|||||||
),
|
),
|
||||||
),
|
),
|
||||||
|
|
||||||
|
|
||||||
dict(
|
dict(
|
||||||
desc='Update user ticket policy for auth indicator pkinit',
|
desc='Update user ticket policy for auth indicator pkinit',
|
||||||
command=('krbtpolicy_mod', [user1],
|
command=('krbtpolicy_mod', [user1],
|
||||||
dict(krbauthindmaxticketlife_pkinit=3600)),
|
dict(krbauthindmaxticketlife_pkinit=3800)),
|
||||||
expected=dict(
|
expected=dict(
|
||||||
value=user1,
|
value=user1,
|
||||||
summary=None,
|
summary=None,
|
||||||
result=dict(
|
result=dict(
|
||||||
krbmaxticketlife=[u'3600'],
|
krbmaxticketlife=[u'3600'],
|
||||||
krbauthindmaxticketlife_pkinit=[u'3600'],
|
krbauthindmaxticketlife_pkinit=[u'3800'],
|
||||||
|
),
|
||||||
|
),
|
||||||
|
),
|
||||||
|
|
||||||
|
|
||||||
|
dict(
|
||||||
|
desc='Update user ticket policy for auth indicator otp',
|
||||||
|
command=('krbtpolicy_mod', [user1],
|
||||||
|
dict(krbauthindmaxticketlife_otp=3700)),
|
||||||
|
expected=dict(
|
||||||
|
value=user1,
|
||||||
|
summary=None,
|
||||||
|
result=dict(
|
||||||
|
krbmaxticketlife=[u'3600'],
|
||||||
|
krbauthindmaxticketlife_pkinit=[u'3800'],
|
||||||
|
krbauthindmaxticketlife_otp=[u'3700'],
|
||||||
|
),
|
||||||
|
),
|
||||||
|
),
|
||||||
|
|
||||||
|
dict(
|
||||||
|
desc='Update user ticket policy for auth indicator radius',
|
||||||
|
command=('krbtpolicy_mod', [user1],
|
||||||
|
dict(krbauthindmaxticketlife_radius=1)),
|
||||||
|
expected=dict(
|
||||||
|
value=user1,
|
||||||
|
summary=None,
|
||||||
|
result=dict(
|
||||||
|
krbmaxticketlife=[u'3600'],
|
||||||
|
krbauthindmaxticketlife_otp=[u'3700'],
|
||||||
|
krbauthindmaxticketlife_pkinit=[u'3800'],
|
||||||
|
krbauthindmaxticketlife_radius=[u'1'],
|
||||||
|
),
|
||||||
|
),
|
||||||
|
),
|
||||||
|
|
||||||
|
dict(
|
||||||
|
desc='Update user ticket policy for auth indicator hardened',
|
||||||
|
command=('krbtpolicy_mod', [user1],
|
||||||
|
dict(krbauthindmaxticketlife_hardened=2147483647)),
|
||||||
|
expected=dict(
|
||||||
|
value=user1,
|
||||||
|
summary=None,
|
||||||
|
result=dict(
|
||||||
|
krbmaxticketlife=[u'3600'],
|
||||||
|
krbauthindmaxticketlife_otp=[u'3700'],
|
||||||
|
krbauthindmaxticketlife_pkinit=[u'3800'],
|
||||||
|
krbauthindmaxticketlife_radius=[u'1'],
|
||||||
|
krbauthindmaxticketlife_hardened=[u'2147483647'],
|
||||||
|
),
|
||||||
|
),
|
||||||
|
),
|
||||||
|
|
||||||
|
dict(
|
||||||
|
desc='Update maxrenew user ticket policy for '
|
||||||
|
'auth indicator hardened',
|
||||||
|
command=('krbtpolicy_mod', [user1],
|
||||||
|
dict(krbauthindmaxrenewableage_hardened=2147483647)),
|
||||||
|
expected=dict(
|
||||||
|
value=user1,
|
||||||
|
summary=None,
|
||||||
|
result=dict(
|
||||||
|
krbmaxticketlife=[u'3600'],
|
||||||
|
krbauthindmaxticketlife_otp=[u'3700'],
|
||||||
|
krbauthindmaxticketlife_pkinit=[u'3800'],
|
||||||
|
krbauthindmaxticketlife_radius=[u'1'],
|
||||||
|
krbauthindmaxticketlife_hardened=[u'2147483647'],
|
||||||
|
krbauthindmaxrenewableage_hardened=[u'2147483647'],
|
||||||
|
),
|
||||||
|
),
|
||||||
|
),
|
||||||
|
dict(
|
||||||
|
desc='Update maxrenew user ticket policy for '
|
||||||
|
'auth indicator otp',
|
||||||
|
command=('krbtpolicy_mod', [user1],
|
||||||
|
dict(krbauthindmaxrenewableage_otp=3700)),
|
||||||
|
expected=dict(
|
||||||
|
value=user1,
|
||||||
|
summary=None,
|
||||||
|
result=dict(
|
||||||
|
krbmaxticketlife=[u'3600'],
|
||||||
|
krbauthindmaxticketlife_otp=[u'3700'],
|
||||||
|
krbauthindmaxticketlife_pkinit=[u'3800'],
|
||||||
|
krbauthindmaxticketlife_radius=[u'1'],
|
||||||
|
krbauthindmaxticketlife_hardened=[u'2147483647'],
|
||||||
|
krbauthindmaxrenewableage_hardened=[u'2147483647'],
|
||||||
|
krbauthindmaxrenewableage_otp=[u'3700'],
|
||||||
|
),
|
||||||
|
),
|
||||||
|
),
|
||||||
|
dict(
|
||||||
|
desc='Update maxrenew user ticket policy for '
|
||||||
|
'auth indicator radius',
|
||||||
|
command=('krbtpolicy_mod', [user1],
|
||||||
|
dict(krbauthindmaxrenewableage_radius=1)),
|
||||||
|
expected=dict(
|
||||||
|
value=user1,
|
||||||
|
summary=None,
|
||||||
|
result=dict(
|
||||||
|
krbmaxticketlife=[u'3600'],
|
||||||
|
krbauthindmaxticketlife_otp=[u'3700'],
|
||||||
|
krbauthindmaxticketlife_pkinit=[u'3800'],
|
||||||
|
krbauthindmaxticketlife_radius=[u'1'],
|
||||||
|
krbauthindmaxticketlife_hardened=[u'2147483647'],
|
||||||
|
krbauthindmaxrenewableage_hardened=[u'2147483647'],
|
||||||
|
krbauthindmaxrenewableage_otp=[u'3700'],
|
||||||
|
krbauthindmaxrenewableage_radius=[u'1'],
|
||||||
|
),
|
||||||
|
),
|
||||||
|
),
|
||||||
|
dict(
|
||||||
|
desc='Update maxrenew user ticket policy for '
|
||||||
|
'auth indicator pkinit',
|
||||||
|
command=('krbtpolicy_mod', [user1],
|
||||||
|
dict(krbauthindmaxrenewableage_pkinit=3800)),
|
||||||
|
expected=dict(
|
||||||
|
value=user1,
|
||||||
|
summary=None,
|
||||||
|
result=dict(
|
||||||
|
krbmaxticketlife=[u'3600'],
|
||||||
|
krbauthindmaxticketlife_otp=[u'3700'],
|
||||||
|
krbauthindmaxticketlife_pkinit=[u'3800'],
|
||||||
|
krbauthindmaxticketlife_radius=[u'1'],
|
||||||
|
krbauthindmaxticketlife_hardened=[u'2147483647'],
|
||||||
|
krbauthindmaxrenewableage_hardened=[u'2147483647'],
|
||||||
|
krbauthindmaxrenewableage_otp=[u'3700'],
|
||||||
|
krbauthindmaxrenewableage_radius=[u'1'],
|
||||||
|
krbauthindmaxrenewableage_pkinit=[u'3800'],
|
||||||
),
|
),
|
||||||
),
|
),
|
||||||
),
|
),
|
||||||
@ -138,6 +292,10 @@ class test_krbtpolicy(Declarative):
|
|||||||
),
|
),
|
||||||
expected=errors.ObjectclassViolation(info='attribute "givenname" not allowed'),
|
expected=errors.ObjectclassViolation(info='attribute "givenname" not allowed'),
|
||||||
),
|
),
|
||||||
|
|
||||||
|
|
||||||
]
|
]
|
||||||
|
for (value, error) in invalid_values:
|
||||||
|
for (param, param_name) in parameters:
|
||||||
|
tests.append(create_dict(desc='Try updating invalid {0} with {1}'.
|
||||||
|
format(param_name, value),
|
||||||
|
param=param, param_name=param_name,
|
||||||
|
value=value, error=error))
|
||||||
|
Loading…
Reference in New Issue
Block a user