mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-23 07:33:27 -06:00
6ec5e5fec6
Tests modified to comply with PEP8 rules with exception of rule E501 (long lines). Done by autopep8 tool and 2 manual modifications. https://fedorahosted.org/freeipa/ticket/3744
124 lines
4.4 KiB
Python
124 lines
4.4 KiB
Python
# Authors:
|
|
# Petr Vobornik <pvoborni@redhat.com>
|
|
#
|
|
# Copyright (C) 2013 Red Hat
|
|
# see file 'COPYING' for use and warranty information
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
"""
|
|
Sudo tests
|
|
"""
|
|
|
|
from ipatests.test_webui.ui_driver import UI_driver
|
|
import ipatests.test_webui.data_sudo as sudo
|
|
import ipatests.test_webui.data_netgroup as netgroup
|
|
import ipatests.test_webui.data_user as user
|
|
import ipatests.test_webui.data_group as group
|
|
import ipatests.test_webui.data_hostgroup as hostgroup
|
|
from ipatests.test_webui.test_host import host_tasks, ENTITY as HOST_ENTITY
|
|
|
|
|
|
class test_sudo(UI_driver):
|
|
|
|
def test_crud(self):
|
|
"""
|
|
Basic CRUD: sudo
|
|
"""
|
|
self.init_app()
|
|
self.basic_crud(sudo.RULE_ENTITY, sudo.RULE_DATA)
|
|
self.basic_crud(sudo.CMDENTITY, sudo.CMD_DATA)
|
|
self.basic_crud(sudo.CMDGROUP_ENTITY, sudo.CMDGROUP_DATA,
|
|
default_facet=sudo.CMDGROUP_DEF_FACET)
|
|
|
|
def test_mod(self):
|
|
"""
|
|
Mod: sudo
|
|
"""
|
|
self.init_app()
|
|
host = host_tasks(self.driver, self.config)
|
|
|
|
self.add_record(netgroup.ENTITY, netgroup.DATA2)
|
|
|
|
self.add_record(user.ENTITY, user.DATA)
|
|
self.add_record(user.ENTITY, user.DATA2, navigate=False)
|
|
|
|
self.add_record(group.ENTITY, group.DATA)
|
|
self.add_record(group.ENTITY, group.DATA2, navigate=False)
|
|
|
|
self.add_record(HOST_ENTITY, host.data)
|
|
self.add_record(HOST_ENTITY, host.data2, navigate=False)
|
|
|
|
self.add_record(hostgroup.ENTITY, hostgroup.DATA)
|
|
self.add_record(hostgroup.ENTITY, hostgroup.DATA2, navigate=False)
|
|
|
|
self.add_record(sudo.CMDENTITY, sudo.CMD_DATA)
|
|
self.add_record(sudo.CMDENTITY, sudo.CMD_DATA2, navigate=False)
|
|
|
|
self.add_record(sudo.CMDGROUP_ENTITY, sudo.CMDGROUP_DATA)
|
|
self.add_record(sudo.CMDGROUP_ENTITY, sudo.CMDGROUP_DATA2, navigate=False)
|
|
|
|
self.add_record(sudo.RULE_ENTITY, sudo.RULE_DATA)
|
|
self.navigate_to_record(sudo.RULE_PKEY, entity=sudo.RULE_ENTITY)
|
|
|
|
tables = [
|
|
['memberuser_user', [user.PKEY, user.PKEY2], ],
|
|
['memberuser_group', [group.PKEY, group.PKEY2], ],
|
|
['memberhost_host', [host.pkey, host.pkey2], ],
|
|
['memberhost_hostgroup', [hostgroup.PKEY, hostgroup.PKEY2], ],
|
|
['memberallowcmd_sudocmd', [sudo.CMD_PKEY, sudo.CMD_PKEY2], ],
|
|
['memberallowcmd_sudocmdgroup', [sudo.CMD_GROUP_PKEY, sudo.CMD_GROUP_PKEY2], ],
|
|
['memberdenycmd_sudocmd', [sudo.CMD_PKEY, sudo.CMD_PKEY2], ],
|
|
['memberdenycmd_sudocmdgroup', [sudo.CMD_GROUP_PKEY, sudo.CMD_GROUP_PKEY2], ],
|
|
['ipasudorunas_user', ['admin'], ],
|
|
['ipasudorunas_group', ['editors', 'admins'], ],
|
|
['ipasudorunasgroup_group', ['editors', 'admins'], ],
|
|
]
|
|
|
|
categories = [
|
|
'usercategory',
|
|
'hostcategory',
|
|
'cmdcategory',
|
|
'ipasudorunasusercategory',
|
|
'ipasudorunasgroupcategory',
|
|
]
|
|
|
|
no_cats = [
|
|
'memberdenycmd_sudocmd',
|
|
'memberdenycmd_sudocmdgroup',
|
|
]
|
|
|
|
self.mod_rule_tables(tables, categories, no_cats)
|
|
|
|
# cleanup
|
|
# -------
|
|
self.delete(sudo.RULE_ENTITY, [sudo.RULE_DATA])
|
|
self.delete(user.ENTITY, [user.DATA, user.DATA2])
|
|
self.delete(group.ENTITY, [group.DATA, group.DATA2])
|
|
self.delete(HOST_ENTITY, [host.data, host.data2])
|
|
self.delete(hostgroup.ENTITY, [hostgroup.DATA, hostgroup.DATA2])
|
|
|
|
def test_actions(self):
|
|
"""
|
|
Test sudo rule actions
|
|
"""
|
|
self.init_app()
|
|
|
|
self.add_record(sudo.RULE_ENTITY, sudo.RULE_DATA)
|
|
self.navigate_to_record(sudo.RULE_PKEY)
|
|
|
|
self.disable_action()
|
|
self.enable_action()
|
|
self.delete_action(sudo.RULE_ENTITY, sudo.RULE_PKEY)
|