mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-27 09:21:59 -06:00
2673782aec
We have a larger goal of replacing all DN creation via string formatting/concatenation with DN object operations because string operations are not a safe way to form a DN nor to compare a DN. This work needs to be broken into smaller chunks for easier review and testing. Addressing the unit tests first makes sense because we don't want to be modifying both the core code and the tests used to verify the core code simultaneously. If we modify the unittests first with existing core code and no regressions are found then we can move on to modifying parts of the core code with the belief the unittests can validate the changes in the core code. Also by doing the unittests first we also help to validate the DN objects are working correctly (although they do have an extensive unittest). The fundamental changes are: * replace string substitution & concatenation with DN object constructor * when comparing dn's the comparision is done after promotion to a DN object, then two DN objects are compared * when a list of string dn's are to be compared a new list is formed where each string dn is replaced by a DN object * because the unittest framework accepts a complex data structure of expected values where dn's are represeted as strings the unittest needs to express the expected value of a dn as a callable object (e.g. a lambda expression) which promotes the dn string to a DN object in order to do the comparision.
151 lines
5.0 KiB
Python
151 lines
5.0 KiB
Python
# Authors:
|
|
# Rob Crittenden <rcritten@redhat.com>
|
|
#
|
|
# Copyright (C) 2010 Red Hat
|
|
# see file 'COPYING' for use and warranty information
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
"""
|
|
Test `ipa-getkeytab`
|
|
"""
|
|
|
|
import os
|
|
import shutil
|
|
from cmdline import cmdline_test
|
|
from ipalib import api
|
|
from ipalib import errors
|
|
import tempfile
|
|
from ipapython import ipautil
|
|
import nose
|
|
import tempfile
|
|
import krbV
|
|
from ipaserver.plugins.ldap2 import ldap2
|
|
from ipalib.dn import *
|
|
|
|
def use_keytab(principal, keytab):
|
|
try:
|
|
tmpdir = tempfile.mkdtemp(prefix = "tmp-")
|
|
ccache_file = 'FILE:%s/ccache' % tmpdir
|
|
krbcontext = krbV.default_context()
|
|
principal = str(principal)
|
|
keytab = krbV.Keytab(name=keytab, context=krbcontext)
|
|
principal = krbV.Principal(name=principal, context=krbcontext)
|
|
os.environ['KRB5CCNAME'] = ccache_file
|
|
ccache = krbV.CCache(name=ccache_file, context=krbcontext, primary_principal=principal)
|
|
ccache.init(principal)
|
|
ccache.init_creds_keytab(keytab=keytab, principal=principal)
|
|
conn = ldap2(shared_instance=False, ldap_uri=api.env.ldap_uri, base_dn=api.env.basedn)
|
|
conn.connect(ccache=ccache.name)
|
|
conn.disconnect()
|
|
except krbV.Krb5Error, e:
|
|
raise StandardError('Unable to bind to LDAP. Error initializing principal %s in %s: %s' % (principal.name, keytab, str(e)))
|
|
finally:
|
|
del os.environ['KRB5CCNAME']
|
|
if tmpdir:
|
|
shutil.rmtree(tmpdir)
|
|
|
|
class test_ipagetkeytab(cmdline_test):
|
|
"""
|
|
Test `ipa-getkeytab`.
|
|
"""
|
|
command = "ipa-client/ipa-getkeytab"
|
|
host_fqdn = u'ipatest.%s' % api.env.domain
|
|
service_princ = u'test/%s@%s' % (host_fqdn, api.env.realm)
|
|
[keytabfd, keytabname] = tempfile.mkstemp()
|
|
os.close(keytabfd)
|
|
|
|
def test_0_setup(self):
|
|
"""
|
|
Create a host to test against.
|
|
"""
|
|
# Create the service
|
|
try:
|
|
api.Command['host_add'](self.host_fqdn, force=True)
|
|
except errors.DuplicateEntry:
|
|
# it already exists, no problem
|
|
pass
|
|
|
|
def test_1_run(self):
|
|
"""
|
|
Create a keytab with `ipa-getkeytab` for a non-existent service.
|
|
"""
|
|
new_args = [self.command,
|
|
"-s", api.env.host,
|
|
"-p", "test/notfound.example.com",
|
|
"-k", self.keytabname,
|
|
]
|
|
(out, err, rc) = ipautil.run(new_args, stdin=None, raiseonerr=False)
|
|
assert err == 'Operation failed! PrincipalName not found.\n\n'
|
|
|
|
def test_2_run(self):
|
|
"""
|
|
Create a keytab with `ipa-getkeytab` for an existing service.
|
|
"""
|
|
# Create the service
|
|
try:
|
|
api.Command['service_add'](self.service_princ, force=True)
|
|
except errors.DuplicateEntry:
|
|
# it already exists, no problem
|
|
pass
|
|
|
|
os.unlink(self.keytabname)
|
|
new_args = [self.command,
|
|
"-s", api.env.host,
|
|
"-p", self.service_princ,
|
|
"-k", self.keytabname,
|
|
]
|
|
try:
|
|
(out, err, rc) = ipautil.run(new_args, None)
|
|
assert err == 'Keytab successfully retrieved and stored in: %s\n' % self.keytabname
|
|
except ipautil.CalledProcessError, e:
|
|
assert (False)
|
|
|
|
def test_3_use(self):
|
|
"""
|
|
Try to use the service keytab.
|
|
"""
|
|
use_keytab(self.service_princ, self.keytabname)
|
|
|
|
def test_4_disable(self):
|
|
"""
|
|
Disable a kerberos principal
|
|
"""
|
|
# Verify that it has a principal key
|
|
entry = api.Command['service_show'](self.service_princ)['result']
|
|
assert(entry['has_keytab'] == True)
|
|
|
|
# Disable it
|
|
api.Command['service_disable'](self.service_princ)
|
|
|
|
# Verify that it looks disabled
|
|
entry = api.Command['service_show'](self.service_princ)['result']
|
|
assert(entry['has_keytab'] == False)
|
|
|
|
def test_5_use_disabled(self):
|
|
"""
|
|
Try to use the disabled keytab
|
|
"""
|
|
try:
|
|
use_keytab(self.service_princ, self.keytabname)
|
|
except StandardError, errmsg:
|
|
assert('Unable to bind to LDAP. Error initializing principal' in str(errmsg))
|
|
|
|
def test_9_cleanup(self):
|
|
"""
|
|
Clean up test data
|
|
"""
|
|
# First create the host that will use this policy
|
|
os.unlink(self.keytabname)
|
|
api.Command['host_del'](self.host_fqdn)
|