mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-23 15:40:01 -06:00
292d686c0b
Even though Pytest supports xunit style setups, unittest and nose tests, this support is limited and may be dropped in the future releases. Worst of all is that the mixing of various test frameworks results in weird conflicts and of course, is not widely tested. This is a part of work to remove the mixing of test idioms in the IPA's test suite: 1) replace xunit style 2) employ the fixtures' interdependencies Related: https://pagure.io/freeipa/issue/7989 Signed-off-by: Stanislav Levin <slev@altlinux.org> Reviewed-By: Christian Heimes <cheimes@redhat.com>
167 lines
4.8 KiB
Python
167 lines
4.8 KiB
Python
# Authors:
|
|
# Petr Vobornik <pvoborni@redhat.com>
|
|
#
|
|
# Copyright (C) 2013 Red Hat
|
|
# see file 'COPYING' for use and warranty information
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
"""
|
|
Trust tests
|
|
"""
|
|
|
|
from ipatests.test_webui.ui_driver import UI_driver
|
|
from ipatests.test_webui.ui_driver import screenshot
|
|
from ipatests.test_webui.task_range import range_tasks
|
|
import pytest
|
|
|
|
ENTITY = 'trust'
|
|
CONFIG_ENTITY = 'trustconfig'
|
|
|
|
CONFIG_DATA = {
|
|
'mod': [
|
|
['combobox', 'ipantfallbackprimarygroup', 'admins'],
|
|
]
|
|
}
|
|
|
|
CONFIG_DATA2 = {
|
|
'mod': [
|
|
['combobox', 'ipantfallbackprimarygroup', 'Default SMB Group']
|
|
]
|
|
}
|
|
|
|
|
|
@pytest.mark.tier1
|
|
class trust_tasks(UI_driver):
|
|
|
|
@pytest.fixture(autouse=True)
|
|
def trusttasks_setup(self, ui_driver_fsetup):
|
|
pass
|
|
|
|
def get_data(self, add_data=None):
|
|
|
|
domain = self.config.get('ad_domain')
|
|
|
|
if not add_data:
|
|
add_data = self.get_add_data()
|
|
|
|
data = {
|
|
'pkey': domain,
|
|
'add': add_data,
|
|
'mod': [
|
|
('multivalued', 'ipantsidblacklistincoming', [
|
|
('del', 'S-1-5-18'),
|
|
('add', 'S-1-5-21'),
|
|
]),
|
|
('multivalued', 'ipantsidblacklistoutgoing', [
|
|
('del', 'S-1-5-18'),
|
|
('add', 'S-1-5-21'),
|
|
]),
|
|
],
|
|
}
|
|
|
|
return data
|
|
|
|
def get_add_data(self, range_type=None, base_id=None, range_size=None):
|
|
|
|
domain = self.config.get('ad_domain')
|
|
admin = self.config.get('ad_admin')
|
|
psw = self.config.get('ad_password')
|
|
|
|
add = [
|
|
('textbox', 'realm_server', domain),
|
|
('textbox', 'realm_admin', admin),
|
|
('password', 'realm_passwd', psw),
|
|
]
|
|
|
|
if range_type:
|
|
add.append(('radio', 'range_type', range_type))
|
|
if base_id:
|
|
add.append(('textbox', 'base_id', base_id))
|
|
if range_size:
|
|
add.append(('textbox', 'range_size', range_size))
|
|
|
|
return add
|
|
|
|
def get_range_name(self):
|
|
domain = self.config.get('ad_domain')
|
|
return domain.upper() + '_id_range'
|
|
|
|
|
|
@pytest.mark.tier1
|
|
class test_trust(trust_tasks):
|
|
|
|
request_timeout = 120
|
|
|
|
@pytest.fixture(autouse=True)
|
|
def trust_setup(self, trusttasks_setup):
|
|
if not self.has_trusts():
|
|
self.skip('Trusts not configured')
|
|
|
|
@screenshot
|
|
def test_crud(self):
|
|
"""
|
|
Basic basic CRUD: trust
|
|
|
|
Test establishing trust by using Windows admin credentials
|
|
"""
|
|
self.init_app()
|
|
data = self.get_data()
|
|
self.navigate_to_entity('idrange')
|
|
self.delete_record(self.get_range_name())
|
|
self.basic_crud(ENTITY, data)
|
|
self.navigate_to_entity('idrange')
|
|
self.delete_record(self.get_range_name())
|
|
|
|
@screenshot
|
|
def test_range_types(self):
|
|
|
|
self.init_app()
|
|
|
|
r_tasks = range_tasks()
|
|
r_tasks.driver = self.driver
|
|
r_tasks.config = self.config
|
|
r_tasks.get_shifts()
|
|
range_form = r_tasks.get_add_form_data('')
|
|
base_id = range_form.base_id
|
|
range_size = range_form.size
|
|
range_pkey = self.get_range_name()
|
|
column = 'iparangetype'
|
|
|
|
self.navigate_to_entity('idrange')
|
|
self.delete_record(range_pkey)
|
|
|
|
add = self.get_add_data('ipa-ad-trust', base_id, range_size)
|
|
data = self.get_data(add_data=add)
|
|
self.add_record(ENTITY, data, delete=True)
|
|
self.navigate_to_entity('idrange')
|
|
self.assert_record_value('Active Directory domain range', range_pkey, column)
|
|
self.delete_record(range_pkey)
|
|
|
|
add = self.get_add_data('ipa-ad-trust-posix', base_id, range_size)
|
|
data = self.get_data(add_data=add)
|
|
self.add_record(ENTITY, data, delete=True)
|
|
self.navigate_to_entity('idrange')
|
|
self.assert_record_value('Active Directory trust range with POSIX attributes', range_pkey, column)
|
|
self.delete_record(range_pkey)
|
|
|
|
@screenshot
|
|
def test_config_mod(self):
|
|
|
|
self.init_app()
|
|
self.navigate_to_entity(CONFIG_ENTITY)
|
|
|
|
self.mod_record(CONFIG_ENTITY, CONFIG_DATA)
|
|
self.mod_record(CONFIG_ENTITY, CONFIG_DATA2)
|