mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-22 23:23:30 -06:00
d8b8f54bce
Add test_range_auto_private_groups test case to test_trust WebUI test suite to cover the field. Ticket: https://pagure.io/freeipa/issue/8837 Signed-off-by: Serhii Tsymbaliuk <stsymbal@redhat.com> Reviewed-By: Rob Crittenden <rcritten@redhat.com> Reviewed-By: Florence Blanc-Renaud <flo@redhat.com> Reviewed-By: Armando Neto <abiagion@redhat.com>
240 lines
7.3 KiB
Python
240 lines
7.3 KiB
Python
# Authors:
|
|
# Petr Vobornik <pvoborni@redhat.com>
|
|
#
|
|
# Copyright (C) 2013 Red Hat
|
|
# see file 'COPYING' for use and warranty information
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
"""
|
|
Trust tests
|
|
"""
|
|
|
|
import pytest
|
|
|
|
import ipatests.test_webui.data_group as group
|
|
import ipatests.test_webui.data_idviews as idview
|
|
from ipatests.test_webui.ui_driver import UI_driver
|
|
from ipatests.test_webui.ui_driver import screenshot
|
|
from ipatests.test_webui.task_range import TRUSTED_ID_RANGE, range_tasks
|
|
|
|
ENTITY = 'trust'
|
|
CONFIG_ENTITY = 'trustconfig'
|
|
|
|
DEFAULT_TRUST_VIEW = 'Default Trust View'
|
|
|
|
CONFIG_DATA = {
|
|
'mod': [
|
|
['combobox', 'ipantfallbackprimarygroup', 'admins'],
|
|
]
|
|
}
|
|
|
|
CONFIG_DATA2 = {
|
|
'mod': [
|
|
['combobox', 'ipantfallbackprimarygroup', 'Default SMB Group']
|
|
]
|
|
}
|
|
|
|
|
|
@pytest.mark.tier1
|
|
class trust_tasks(UI_driver):
|
|
|
|
@pytest.fixture(autouse=True)
|
|
def trusttasks_setup(self, ui_driver_fsetup):
|
|
pass
|
|
|
|
def get_data(self, add_data=None):
|
|
|
|
domain = self.config.get('ad_domain')
|
|
|
|
if not add_data:
|
|
add_data = self.get_add_data()
|
|
|
|
data = {
|
|
'pkey': domain,
|
|
'add': add_data,
|
|
'mod': [
|
|
('multivalued', 'ipantsidblacklistincoming', [
|
|
('del', 'S-1-5-18'),
|
|
('add', 'S-1-5-21'),
|
|
]),
|
|
('multivalued', 'ipantsidblacklistoutgoing', [
|
|
('del', 'S-1-5-18'),
|
|
('add', 'S-1-5-21'),
|
|
]),
|
|
],
|
|
}
|
|
|
|
return data
|
|
|
|
def get_add_data(self, range_type=None, base_id=None, range_size=None):
|
|
|
|
domain = self.config.get('ad_domain')
|
|
admin = self.config.get('ad_admin')
|
|
psw = self.config.get('ad_password')
|
|
|
|
add = [
|
|
('textbox', 'realm_server', domain),
|
|
('textbox', 'realm_admin', admin),
|
|
('password', 'realm_passwd', psw),
|
|
]
|
|
|
|
if range_type:
|
|
add.append(('radio', 'range_type', range_type))
|
|
if base_id:
|
|
add.append(('textbox', 'base_id', base_id))
|
|
if range_size:
|
|
add.append(('textbox', 'range_size', range_size))
|
|
|
|
return add
|
|
|
|
def get_range_name(self):
|
|
domain = self.config.get('ad_domain')
|
|
return domain.upper() + '_id_range'
|
|
|
|
|
|
@pytest.mark.tier1
|
|
class test_trust(trust_tasks):
|
|
|
|
request_timeout = 120
|
|
|
|
@pytest.fixture(autouse=True)
|
|
def trust_setup(self, trusttasks_setup):
|
|
if not self.has_trusts():
|
|
self.skip('Trusts not configured')
|
|
|
|
@screenshot
|
|
def test_crud(self):
|
|
"""
|
|
Basic basic CRUD: trust
|
|
|
|
Test establishing trust by using Windows admin credentials
|
|
"""
|
|
self.init_app()
|
|
data = self.get_data()
|
|
self.navigate_to_entity('idrange')
|
|
self.delete_record(self.get_range_name())
|
|
self.basic_crud(ENTITY, data)
|
|
self.navigate_to_entity('idrange')
|
|
self.delete_record(self.get_range_name())
|
|
|
|
@screenshot
|
|
def test_range_types(self):
|
|
|
|
self.init_app()
|
|
|
|
r_tasks = range_tasks()
|
|
r_tasks.driver = self.driver
|
|
r_tasks.config = self.config
|
|
r_tasks.get_shifts()
|
|
range_form = r_tasks.get_add_form_data('')
|
|
base_id = range_form.base_id
|
|
range_size = range_form.size
|
|
range_pkey = self.get_range_name()
|
|
column = 'iparangetype'
|
|
|
|
self.navigate_to_entity('idrange')
|
|
self.delete_record(range_pkey)
|
|
|
|
add = self.get_add_data('ipa-ad-trust', base_id, range_size)
|
|
data = self.get_data(add_data=add)
|
|
self.add_record(ENTITY, data, delete=True)
|
|
self.navigate_to_entity('idrange')
|
|
self.assert_record_value('Active Directory domain range', range_pkey, column)
|
|
self.delete_record(range_pkey)
|
|
|
|
add = self.get_add_data('ipa-ad-trust-posix', base_id, range_size)
|
|
data = self.get_data(add_data=add)
|
|
self.add_record(ENTITY, data, delete=True)
|
|
self.navigate_to_entity('idrange')
|
|
self.assert_record_value('Active Directory trust range with POSIX attributes', range_pkey, column)
|
|
self.delete_record(range_pkey)
|
|
|
|
@screenshot
|
|
def test_range_auto_private_groups(self):
|
|
self.init_app()
|
|
|
|
r_tasks = range_tasks()
|
|
r_tasks.driver = self.driver
|
|
r_tasks.config = self.config
|
|
r_tasks.get_shifts()
|
|
|
|
trust_data = self.get_data()
|
|
self.add_record(ENTITY, trust_data, navigate=True)
|
|
|
|
range_pkeys = []
|
|
try:
|
|
for auto_private_groups in ['true', 'false', 'hybrid']:
|
|
pkey = 'itest-range-apg-{}'.format(auto_private_groups)
|
|
form_data = r_tasks.get_add_form_data(
|
|
pkey,
|
|
range_type=TRUSTED_ID_RANGE,
|
|
domain=trust_data['pkey'],
|
|
auto_private_groups=auto_private_groups
|
|
)
|
|
range_data = r_tasks.get_data(pkey, form_data=form_data)
|
|
self.add_record('idrange', range_data, navigate=True)
|
|
range_pkeys.append(pkey)
|
|
finally:
|
|
self.navigate_to_entity(ENTITY)
|
|
self.delete_record(trust_data['pkey'])
|
|
self.navigate_to_entity('idrange')
|
|
self.delete_record(range_pkeys)
|
|
|
|
@screenshot
|
|
def test_config_mod(self):
|
|
|
|
self.init_app()
|
|
self.navigate_to_entity(CONFIG_ENTITY)
|
|
|
|
self.mod_record(CONFIG_ENTITY, CONFIG_DATA)
|
|
self.mod_record(CONFIG_ENTITY, CONFIG_DATA2)
|
|
|
|
@screenshot
|
|
def test_group_member_idoverrideuser(self):
|
|
|
|
self.init_app()
|
|
|
|
# Create new trust
|
|
data = self.get_data()
|
|
self.add_record(ENTITY, data)
|
|
|
|
# Create an user ID override
|
|
ad_domain = self.config.get('ad_domain')
|
|
ad_admin = self.config.get('ad_admin')
|
|
idoverrideuser_pkey = '{}@{}'.format(ad_admin, ad_domain).lower()
|
|
|
|
self.navigate_to_record(DEFAULT_TRUST_VIEW, entity=idview.ENTITY)
|
|
self.add_record(idview.ENTITY, {
|
|
'pkey': idoverrideuser_pkey,
|
|
'add': [
|
|
('textbox', 'ipaanchoruuid_default', idoverrideuser_pkey),
|
|
],
|
|
}, facet='idoverrideuser')
|
|
|
|
# Create new group and add the user ID override there
|
|
self.navigate_to_entity(group.ENTITY)
|
|
self.add_record(group.ENTITY, group.DATA)
|
|
self.navigate_to_record(group.PKEY)
|
|
self.add_associations([idoverrideuser_pkey],
|
|
facet='member_idoverrideuser', delete=True)
|
|
|
|
# Clean up data
|
|
self.navigate_to_entity(group.ENTITY)
|
|
self.delete_record(group.PKEY)
|
|
self.navigate_to_record(DEFAULT_TRUST_VIEW, entity=idview.ENTITY)
|
|
self.delete_record(idoverrideuser_pkey)
|
|
self.navigate_to_entity(ENTITY)
|
|
self.delete_record(ad_domain)
|