mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-26 00:41:25 -06:00
e3840eef09
GID field should be enabled by default since the default group is posix. Was caused by option_widget_base not properly reporting value change while selecting the default value. It has to be notified with delay otherwise the event is consumed by FieldBinder. https://fedorahosted.org/freeipa/ticket/4325 Reviewed-By: Endi Sukma Dewata <edewata@redhat.com>
230 lines
8.6 KiB
Python
230 lines
8.6 KiB
Python
# Authors:
|
|
# Petr Vobornik <pvoborni@redhat.com>
|
|
#
|
|
# Copyright (C) 2013 Red Hat
|
|
# see file 'COPYING' for use and warranty information
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
"""
|
|
Group tests
|
|
"""
|
|
|
|
from ipatests.test_webui.ui_driver import UI_driver
|
|
from ipatests.test_webui.ui_driver import screenshot
|
|
import ipatests.test_webui.data_group as group
|
|
import ipatests.test_webui.data_user as user
|
|
import ipatests.test_webui.data_netgroup as netgroup
|
|
import ipatests.test_webui.data_hbac as hbac
|
|
import ipatests.test_webui.test_rbac as rbac
|
|
import ipatests.test_webui.data_sudo as sudo
|
|
|
|
|
|
class test_group(UI_driver):
|
|
|
|
@screenshot
|
|
def test_crud(self):
|
|
"""
|
|
Basic CRUD: group
|
|
"""
|
|
self.init_app()
|
|
self.basic_crud(group.ENTITY, group.DATA,
|
|
default_facet=group.DEFAULT_FACET)
|
|
|
|
@screenshot
|
|
def test_group_types(self):
|
|
"""
|
|
Test group types in adder dialog
|
|
"""
|
|
self.init_app()
|
|
|
|
pkey = 'itest-group'
|
|
data = {
|
|
'pkey': pkey,
|
|
'add': [
|
|
('callback', self.check_posix_enabled, True),
|
|
('textbox', 'cn', pkey),
|
|
('textarea', 'description', 'test-group desc'),
|
|
('radio', 'type', 'normal'),
|
|
('callback', self.check_posix_enabled, False),
|
|
('radio', 'type', 'posix'),
|
|
('callback', self.check_posix_enabled, True),
|
|
('radio', 'type', 'external'),
|
|
('callback', self.check_posix_enabled, False),
|
|
('radio', 'type', 'posix'),
|
|
('callback', self.check_posix_enabled, True),
|
|
],
|
|
}
|
|
|
|
self.add_record(group.ENTITY, data)
|
|
self.delete(group.ENTITY, [data], navigate=False)
|
|
|
|
def check_posix_enabled(self, enabled):
|
|
self.assert_disabled("[name=gidnumber]", negative=enabled)
|
|
|
|
@screenshot
|
|
def test_actions(self):
|
|
"""
|
|
Test group actions
|
|
"""
|
|
|
|
self.init_app()
|
|
|
|
self.add_record(group.ENTITY, group.DATA)
|
|
self.navigate_to_record(group.PKEY)
|
|
self.switch_to_facet('details')
|
|
self.make_posix_action()
|
|
self.delete_action()
|
|
|
|
self.add_record(group.ENTITY, group.DATA, navigate=False)
|
|
self.navigate_to_record(group.PKEY)
|
|
self.switch_to_facet('details')
|
|
self.facet_button_click('refresh') # workaround for BUG: #3702
|
|
self.make_external_action()
|
|
self.delete_action()
|
|
|
|
def make_external_action(self):
|
|
self.action_list_action('make_external')
|
|
self.wait_for_request(n=2)
|
|
self.assert_no_error_dialog()
|
|
self.assert_text_field('external', 'External', element='span')
|
|
|
|
def make_posix_action(self):
|
|
self.action_list_action('make_posix')
|
|
self.wait_for_request(n=2)
|
|
self.assert_no_error_dialog()
|
|
self.assert_text_field('external', 'POSIX', element='span')
|
|
|
|
def delete_action(self, entity=group.ENTITY, pkey=group.PKEY):
|
|
self.action_list_action('delete')
|
|
self.wait_for_request(n=4)
|
|
self.assert_no_error_dialog()
|
|
self.assert_facet(entity, 'search')
|
|
self.assert_record(pkey, negative=True)
|
|
|
|
@screenshot
|
|
def test_associations(self):
|
|
"""
|
|
Test group associations
|
|
"""
|
|
self.init_app()
|
|
|
|
# prepare
|
|
# -------
|
|
self.add_record(group.ENTITY, group.DATA)
|
|
self.add_record(group.ENTITY, group.DATA2, navigate=False)
|
|
self.add_record(group.ENTITY, group.DATA3, navigate=False)
|
|
self.add_record(user.ENTITY, user.DATA)
|
|
self.add_record(netgroup.ENTITY, netgroup.DATA)
|
|
self.add_record(rbac.ROLE_ENTITY, rbac.ROLE_DATA)
|
|
self.add_record(hbac.RULE_ENTITY, hbac.RULE_DATA)
|
|
self.add_record(sudo.RULE_ENTITY, sudo.RULE_DATA)
|
|
|
|
# add & remove associations
|
|
# -------------------------
|
|
self.navigate_to_record(group.PKEY, entity=group.ENTITY)
|
|
|
|
# members
|
|
self.add_associations([group.PKEY2], facet='member_group', delete=True)
|
|
self.add_associations([user.PKEY], facet='member_user', delete=True)
|
|
# TODO: external
|
|
|
|
# member of
|
|
self.add_associations([group.PKEY3], facet='memberof_group', delete=True)
|
|
self.add_associations([netgroup.PKEY], facet='memberof_netgroup', delete=True)
|
|
self.add_associations([rbac.ROLE_PKEY], facet='memberof_role', delete=True)
|
|
self.add_associations([hbac.RULE_PKEY], facet='memberof_hbacrule', delete=True)
|
|
self.navigate_to_record(group.PKEY, entity=group.ENTITY)
|
|
self.add_associations([sudo.RULE_PKEY], facet='memberof_sudorule', delete=True)
|
|
|
|
# cleanup
|
|
# -------
|
|
self.delete(group.ENTITY, [group.DATA, group.DATA2, group.DATA3])
|
|
self.delete(user.ENTITY, [user.DATA])
|
|
self.delete(netgroup.ENTITY, [netgroup.DATA])
|
|
self.delete(rbac.ROLE_ENTITY, [rbac.ROLE_DATA])
|
|
self.delete(hbac.RULE_ENTITY, [hbac.RULE_DATA])
|
|
self.delete(sudo.RULE_ENTITY, [sudo.RULE_DATA])
|
|
|
|
@screenshot
|
|
def test_indirect_associations(self):
|
|
"""
|
|
Group indirect associations
|
|
"""
|
|
self.init_app()
|
|
|
|
# add
|
|
# ---
|
|
self.add_record(group.ENTITY, group.DATA)
|
|
self.add_record(group.ENTITY, group.DATA2, navigate=False)
|
|
self.add_record(group.ENTITY, group.DATA3, navigate=False)
|
|
self.add_record(group.ENTITY, group.DATA4, navigate=False)
|
|
self.add_record(group.ENTITY, group.DATA5, navigate=False)
|
|
self.add_record(user.ENTITY, user.DATA)
|
|
|
|
# prepare indirect member
|
|
self.navigate_to_entity(group.ENTITY, 'search')
|
|
self.navigate_to_record(group.PKEY2)
|
|
self.add_associations([user.PKEY])
|
|
self.add_associations([group.PKEY3], 'member_group')
|
|
|
|
self.navigate_to_entity(group.ENTITY, 'search')
|
|
self.navigate_to_record(group.PKEY)
|
|
self.add_associations([group.PKEY2], 'member_group')
|
|
|
|
# prepare indirect memberof
|
|
self.navigate_to_entity(group.ENTITY, 'search')
|
|
self.navigate_to_record(group.PKEY4)
|
|
self.add_associations([group.PKEY], 'member_group')
|
|
self.add_associations([group.PKEY5], 'memberof_group')
|
|
|
|
self.add_record(netgroup.ENTITY, netgroup.DATA)
|
|
self.navigate_to_record(netgroup.PKEY)
|
|
self.add_table_associations('memberuser_group', [group.PKEY4])
|
|
|
|
self.add_record(rbac.ROLE_ENTITY, rbac.ROLE_DATA)
|
|
self.navigate_to_record(rbac.ROLE_PKEY)
|
|
self.add_associations([group.PKEY4], facet='member_group')
|
|
|
|
self.add_record(hbac.RULE_ENTITY, hbac.RULE_DATA)
|
|
self.navigate_to_record(hbac.RULE_PKEY)
|
|
self.add_table_associations('memberuser_group', [group.PKEY4])
|
|
|
|
self.add_record(sudo.RULE_ENTITY, sudo.RULE_DATA)
|
|
self.navigate_to_record(sudo.RULE_PKEY)
|
|
self.add_table_associations('memberuser_group', [group.PKEY4])
|
|
|
|
# check indirect associations
|
|
# ---------------------------
|
|
self.navigate_to_entity(group.ENTITY, 'search')
|
|
self.navigate_to_record(group.PKEY)
|
|
|
|
self.assert_indirect_record(user.PKEY, group.ENTITY, 'member_user')
|
|
self.assert_indirect_record(group.PKEY3, group.ENTITY, 'member_group')
|
|
|
|
self.assert_indirect_record(group.PKEY5, group.ENTITY, 'memberof_group')
|
|
self.assert_indirect_record(netgroup.PKEY, group.ENTITY, 'memberof_netgroup')
|
|
self.assert_indirect_record(rbac.ROLE_PKEY, group.ENTITY, 'memberof_role')
|
|
self.assert_indirect_record(hbac.RULE_PKEY, group.ENTITY, 'memberof_hbacrule')
|
|
self.assert_indirect_record(sudo.RULE_PKEY, group.ENTITY, 'memberof_sudorule')
|
|
|
|
## cleanup
|
|
## -------
|
|
self.delete(group.ENTITY, [group.DATA, group.DATA2, group.DATA3, group.DATA4, group.DATA5])
|
|
self.delete(user.ENTITY, [user.DATA])
|
|
self.delete(netgroup.ENTITY, [netgroup.DATA])
|
|
self.delete(rbac.ROLE_ENTITY, [rbac.ROLE_DATA])
|
|
self.delete(hbac.RULE_ENTITY, [hbac.RULE_DATA])
|
|
self.delete(sudo.RULE_ENTITY, [sudo.RULE_DATA])
|