mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-24 08:00:02 -06:00
12da43c54f
As described in the commit [1] and ticket [2], it should not be possible to
change the range of a local IPA domain.
The basic_crud was changed to make it flexible to do not run the mod operation
if needed.
[1] 55feea500b
[2] https://pagure.io/freeipa/issue/4826
Reviewed-By: Petr Vobornik <pvoborni@redhat.com>
124 lines
3.9 KiB
Python
124 lines
3.9 KiB
Python
# Authors:
|
|
# Petr Vobornik <pvoborni@redhat.com>
|
|
#
|
|
# Copyright (C) 2013 Red Hat
|
|
# see file 'COPYING' for use and warranty information
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
"""
|
|
Range tests
|
|
"""
|
|
|
|
import ipatests.test_webui.test_trust as trust_mod
|
|
from ipatests.test_webui.ui_driver import screenshot
|
|
from ipatests.test_webui.task_range import range_tasks
|
|
import pytest
|
|
|
|
ENTITY = 'idrange'
|
|
PKEY = 'itest-range'
|
|
|
|
|
|
@pytest.mark.tier1
|
|
class test_range(range_tasks):
|
|
|
|
@screenshot
|
|
def test_crud(self):
|
|
"""
|
|
Basic CRUD: range
|
|
"""
|
|
self.init_app()
|
|
self.get_shifts()
|
|
self.basic_crud(ENTITY, self.get_data(PKEY), mod=False)
|
|
|
|
@screenshot
|
|
def test_mod(self):
|
|
"""
|
|
Test mod operating in a new range
|
|
"""
|
|
|
|
self.init_app()
|
|
self.navigate_to_entity(ENTITY)
|
|
self.get_shifts()
|
|
|
|
add = self.get_add_data(PKEY)
|
|
data = self.get_data(PKEY, add_data=add)
|
|
|
|
self.add_record(ENTITY, data, facet='search', navigate=False,
|
|
facet_btn='add', dialog_name='add',
|
|
dialog_btn='add')
|
|
self.navigate_to_record(PKEY)
|
|
|
|
# changes idrange and tries to save it
|
|
self.fill_fields(data['mod'], undo=True)
|
|
self.assert_facet_button_enabled('save')
|
|
self.facet_button_click('save')
|
|
self.wait_for_request(n=2)
|
|
|
|
# the user should not be able to change the ID allocation for
|
|
# IPA domain, as it's explained in https://pagure.io/freeipa/issue/4826
|
|
dialog = self.get_last_error_dialog()
|
|
assert ("can not be used to change ID allocation for local IPA domain"
|
|
in dialog.text)
|
|
self.dialog_button_click('cancel')
|
|
self.navigate_to_entity(ENTITY)
|
|
self.wait_for_request()
|
|
self.delete_record(PKEY)
|
|
|
|
@screenshot
|
|
def test_types(self):
|
|
"""
|
|
Test range types
|
|
|
|
Only 'local' and 'ipa-ad-trust' types are tested since range validation
|
|
made quite hard to test the other types:
|
|
|
|
- 'ipa-ad-trust-posix' can be tested only with subdomains.
|
|
- 'ipa-ad-winsync' and 'ipa-ipa-trust' and are not supported yet
|
|
https://fedorahosted.org/freeipa/ticket/4323
|
|
"""
|
|
self.init_app()
|
|
self.get_shifts()
|
|
|
|
pkey_local = 'itest-local'
|
|
pkey_ad = 'itest-ad'
|
|
column = 'iparangetype'
|
|
|
|
add = self.get_add_data(pkey_local)
|
|
data = self.get_data(pkey_local, add_data=add)
|
|
self.add_record(ENTITY, data)
|
|
self.assert_record_value('local domain range', pkey_local, column)
|
|
|
|
if self.has_trusts():
|
|
|
|
trust_tasks = trust_mod.trust_tasks()
|
|
trust_data = trust_tasks.get_data()
|
|
|
|
self.add_record(trust_mod.ENTITY, trust_data)
|
|
|
|
domain = self.get_domain()
|
|
|
|
self.navigate_to_entity(ENTITY)
|
|
|
|
add = self.get_add_data(pkey_ad, range_type='ipa-ad-trust', domain=domain)
|
|
data = self.get_data(pkey_ad, add_data=add)
|
|
self.add_record(ENTITY, data, navigate=False)
|
|
self.assert_record_value('Active Directory domain range', pkey_ad, column)
|
|
|
|
self.delete(trust_mod.ENTITY, [trust_data])
|
|
self.navigate_to_entity(ENTITY)
|
|
self.delete_record(pkey_ad)
|
|
|
|
self.delete_record(pkey_local)
|