mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-25 16:31:08 -06:00
0a64e9bd70
Web UI tests were marked as tier1 tests. The tier system is intended to be used together with CI system to make sure the more complicated tests are being run only when all of the basic functionality is working. The system is using pytest's marker system. E.g. an invocation of all tier1 tests with listing will look like: $ py.test -v -m tier1 ipatests or in case of out of tree tests: $ ipa-run-tests -m tier1 Reviewed-By: Ales 'alich' Marecek <amarecek@redhat.com>
169 lines
6.0 KiB
Python
169 lines
6.0 KiB
Python
# Authors:
|
|
# Martin Kosek <mkosek@redhat.com>
|
|
#
|
|
# Copyright (C) 2010 Red Hat
|
|
# see file 'COPYING' for use and warranty information
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
"""
|
|
Test the `ipalib/plugins/trust.py` module.
|
|
"""
|
|
|
|
import nose
|
|
import six
|
|
|
|
from ipalib import api, errors
|
|
from ipapython.dn import DN
|
|
from ipatests.test_xmlrpc import objectclasses
|
|
from ipatests.test_xmlrpc.xmlrpc_test import (
|
|
Declarative, fuzzy_guid, fuzzy_domain_sid, fuzzy_string, fuzzy_uuid,
|
|
fuzzy_digits)
|
|
import pytest
|
|
|
|
if six.PY3:
|
|
unicode = str
|
|
|
|
|
|
trustconfig_ad_config = DN(('cn', api.env.domain),
|
|
api.env.container_cifsdomains, api.env.basedn)
|
|
testgroup = u'adtestgroup'
|
|
testgroup_dn = DN(('cn', testgroup), api.env.container_group, api.env.basedn)
|
|
|
|
default_group = u'Default SMB Group'
|
|
default_group_dn = DN(('cn', default_group), api.env.container_group, api.env.basedn)
|
|
|
|
|
|
@pytest.mark.tier1
|
|
class test_trustconfig(Declarative):
|
|
|
|
@classmethod
|
|
def setup_class(cls):
|
|
super(test_trustconfig, cls).setup_class()
|
|
if not api.Backend.rpcclient.isconnected():
|
|
api.Backend.rpcclient.connect(fallback=False)
|
|
try:
|
|
api.Command['trustconfig_show'](trust_type=u'ad')
|
|
except errors.NotFound:
|
|
raise nose.SkipTest('Trusts are not configured')
|
|
|
|
cleanup_commands = [
|
|
('group_del', [testgroup], {}),
|
|
('trustconfig_mod', [], {'trust_type': u'ad',
|
|
'ipantfallbackprimarygroup': default_group}),
|
|
]
|
|
|
|
tests = [
|
|
|
|
dict(
|
|
desc='Retrieve trust configuration for AD domains',
|
|
command=('trustconfig_show', [], {'trust_type': u'ad'}),
|
|
expected={
|
|
'value': u'ad',
|
|
'summary': None,
|
|
'result': {
|
|
'dn': trustconfig_ad_config,
|
|
'cn': [api.env.domain],
|
|
'ipantdomainguid': [fuzzy_guid],
|
|
'ipantfallbackprimarygroup': [default_group],
|
|
'ipantflatname': [fuzzy_string],
|
|
'ipantsecurityidentifier': [fuzzy_domain_sid]
|
|
},
|
|
},
|
|
),
|
|
|
|
dict(
|
|
desc='Retrieve trust configuration for AD domains with --raw',
|
|
command=('trustconfig_show', [], {'trust_type': u'ad', 'raw': True}),
|
|
expected={
|
|
'value': u'ad',
|
|
'summary': None,
|
|
'result': {
|
|
'dn': trustconfig_ad_config,
|
|
'cn': [api.env.domain],
|
|
'ipantdomainguid': [fuzzy_guid],
|
|
'ipantfallbackprimarygroup': [default_group_dn],
|
|
'ipantflatname': [fuzzy_string],
|
|
'ipantsecurityidentifier': [fuzzy_domain_sid]
|
|
},
|
|
},
|
|
),
|
|
|
|
dict(
|
|
desc='Create auxiliary group %r' % testgroup,
|
|
command=(
|
|
'group_add', [testgroup], dict(description=u'Test group')
|
|
),
|
|
expected=dict(
|
|
value=testgroup,
|
|
summary=u'Added group "%s"' % testgroup,
|
|
result=dict(
|
|
cn=[testgroup],
|
|
description=[u'Test group'],
|
|
gidnumber=[fuzzy_digits],
|
|
objectclass=objectclasses.group + [u'posixgroup'],
|
|
ipauniqueid=[fuzzy_uuid],
|
|
dn=testgroup_dn,
|
|
),
|
|
),
|
|
),
|
|
|
|
dict(
|
|
desc='Try to change primary fallback group to nonexistent group',
|
|
command=('trustconfig_mod', [],
|
|
{'trust_type': u'ad', 'ipantfallbackprimarygroup': u'doesnotexist'}),
|
|
expected=errors.NotFound(reason=u'%s: group not found' % 'doesnotexist')
|
|
),
|
|
|
|
dict(
|
|
desc='Try to change primary fallback group to nonexistent group DN',
|
|
command=('trustconfig_mod', [], {'trust_type': u'ad',
|
|
'ipantfallbackprimarygroup': u'cn=doesnotexist,dc=test'}),
|
|
expected=errors.NotFound(reason=u'%s: group not found' % 'cn=doesnotexist,dc=test')
|
|
),
|
|
|
|
dict(
|
|
desc='Change primary fallback group to "%s"' % testgroup,
|
|
command=('trustconfig_mod', [], {'trust_type': u'ad',
|
|
'ipantfallbackprimarygroup': testgroup}),
|
|
expected={
|
|
'value': u'ad',
|
|
'summary': u'Modified "ad" trust configuration',
|
|
'result': {
|
|
'cn': [api.env.domain],
|
|
'ipantdomainguid': [fuzzy_guid],
|
|
'ipantfallbackprimarygroup': [testgroup],
|
|
'ipantflatname': [fuzzy_string],
|
|
'ipantsecurityidentifier': [fuzzy_domain_sid]
|
|
},
|
|
},
|
|
),
|
|
|
|
dict(
|
|
desc='Change primary fallback group back to "%s" using DN' % default_group,
|
|
command=('trustconfig_mod', [], {'trust_type': u'ad',
|
|
'ipantfallbackprimarygroup': unicode(default_group_dn)}),
|
|
expected={
|
|
'value': u'ad',
|
|
'summary': u'Modified "ad" trust configuration',
|
|
'result': {
|
|
'cn': [api.env.domain],
|
|
'ipantdomainguid': [fuzzy_guid],
|
|
'ipantfallbackprimarygroup': [default_group],
|
|
'ipantflatname': [fuzzy_string],
|
|
'ipantsecurityidentifier': [fuzzy_domain_sid]
|
|
},
|
|
},
|
|
),
|
|
]
|