mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-30 10:47:08 -06:00
bed6e81935
Basically, make 'all' mutually exclusive. This makes debugging lots easier. If say usercat='all' there is no point adding specific users to the rule because it will always apply to everyone. ticket 164
419 lines
16 KiB
Python
419 lines
16 KiB
Python
# Authors:
|
|
# Pavel Zuna <pzuna@redhat.com>
|
|
#
|
|
# Copyright (C) 2009 Red Hat
|
|
# see file 'COPYING' for use and warranty information
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License as
|
|
# published by the Free Software Foundation; version 2 only
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
"""
|
|
Test the `ipalib/plugins/hbac.py` module.
|
|
"""
|
|
|
|
from xmlrpc_test import XMLRPC_test, assert_attr_equal
|
|
from ipalib import api
|
|
from ipalib import errors
|
|
|
|
|
|
class test_hbac(XMLRPC_test):
|
|
"""
|
|
Test the `hbac` plugin.
|
|
"""
|
|
rule_name = u'testing_rule1234'
|
|
rule_type = u'allow'
|
|
rule_type_fail = u'value not allowed'
|
|
rule_service = u'ssh'
|
|
rule_time = u'absolute 20081010000000 ~ 20081015120000'
|
|
rule_time2 = u'absolute 20081010000000 ~ 20081016120000'
|
|
# wrong time, has 30th day in February in first date
|
|
rule_time_fail = u'absolute 20080230000000 ~ 20081015120000'
|
|
rule_desc = u'description'
|
|
rule_desc_mod = u'description modified'
|
|
|
|
test_user = u'hbac_test_user'
|
|
test_group = u'hbac_test_group'
|
|
test_host = u'hbac._test_netgroup'
|
|
test_hostgroup = u'hbac_test_hostgroup'
|
|
test_sourcehost = u'hbac._test_src_host'
|
|
test_sourcehostgroup = u'hbac_test_src_hostgroup'
|
|
test_service = u'sshd'
|
|
|
|
def test_0_hbac_add(self):
|
|
"""
|
|
Test adding a new HBAC rule using `xmlrpc.hbac_add`.
|
|
"""
|
|
ret = self.failsafe_add(api.Object.hbac,
|
|
self.rule_name,
|
|
accessruletype=self.rule_type,
|
|
accesstime=self.rule_time,
|
|
description=self.rule_desc,
|
|
)
|
|
entry = ret['result']
|
|
assert_attr_equal(entry, 'cn', self.rule_name)
|
|
assert_attr_equal(entry, 'accessruletype', self.rule_type)
|
|
assert_attr_equal(entry, 'accesstime', self.rule_time)
|
|
assert_attr_equal(entry, 'ipaenabledflag', 'TRUE')
|
|
assert_attr_equal(entry, 'description', self.rule_desc)
|
|
|
|
def test_1_hbac_add(self):
|
|
"""
|
|
Test adding an existing HBAC rule using `xmlrpc.hbac_add'.
|
|
"""
|
|
try:
|
|
api.Command['hbac_add'](
|
|
self.rule_name, accessruletype=self.rule_type
|
|
)
|
|
except errors.DuplicateEntry:
|
|
pass
|
|
else:
|
|
assert False
|
|
|
|
def test_2_hbac_show(self):
|
|
"""
|
|
Test displaying a HBAC rule using `xmlrpc.hbac_show`.
|
|
"""
|
|
entry = api.Command['hbac_show'](self.rule_name)['result']
|
|
assert_attr_equal(entry, 'cn', self.rule_name)
|
|
assert_attr_equal(entry, 'accessruletype', self.rule_type)
|
|
assert_attr_equal(entry, 'accesstime', self.rule_time)
|
|
assert_attr_equal(entry, 'ipaenabledflag', 'TRUE')
|
|
assert_attr_equal(entry, 'description', self.rule_desc)
|
|
|
|
def test_3_hbac_mod(self):
|
|
"""
|
|
Test modifying a HBAC rule using `xmlrpc.hbac_mod`.
|
|
"""
|
|
ret = api.Command['hbac_mod'](
|
|
self.rule_name, description=self.rule_desc_mod
|
|
)
|
|
entry = ret['result']
|
|
assert_attr_equal(entry, 'description', self.rule_desc_mod)
|
|
|
|
def test_4_hbac_add_accesstime(self):
|
|
"""
|
|
Test adding access time to HBAC rule using `xmlrpc.hbac_add_accesstime`.
|
|
"""
|
|
return
|
|
ret = api.Command['hbac_add_accesstime'](
|
|
self.rule_name, accesstime=self.rule_time2
|
|
)
|
|
entry = ret['result']
|
|
assert_attr_equal(entry, 'accesstime', self.rule_time);
|
|
assert_attr_equal(entry, 'accesstime', self.rule_time2);
|
|
|
|
def test_5_hbac_add_accesstime(self):
|
|
"""
|
|
Test adding invalid access time to HBAC rule using `xmlrpc.hbac_add_accesstime`.
|
|
"""
|
|
try:
|
|
api.Command['hbac_add_accesstime'](
|
|
self.rule_name, accesstime=self.rule_time_fail
|
|
)
|
|
except errors.ValidationError:
|
|
pass
|
|
else:
|
|
assert False
|
|
|
|
def test_6_hbac_find(self):
|
|
"""
|
|
Test searching for HBAC rules using `xmlrpc.hbac_find`.
|
|
"""
|
|
ret = api.Command['hbac_find'](
|
|
name=self.rule_name, accessruletype=self.rule_type,
|
|
description=self.rule_desc_mod
|
|
)
|
|
assert ret['truncated'] is False
|
|
entries = ret['result']
|
|
assert_attr_equal(entries[0], 'cn', self.rule_name)
|
|
assert_attr_equal(entries[0], 'accessruletype', self.rule_type)
|
|
assert_attr_equal(entries[0], 'description', self.rule_desc_mod)
|
|
|
|
def test_7_hbac_init_testing_data(self):
|
|
"""
|
|
Initialize data for more HBAC plugin testing.
|
|
"""
|
|
self.failsafe_add(api.Object.user,
|
|
self.test_user, givenname=u'first', sn=u'last'
|
|
)
|
|
self.failsafe_add(api.Object.group,
|
|
self.test_group, description=u'description'
|
|
)
|
|
self.failsafe_add(api.Object.host,
|
|
self.test_host, force=True
|
|
)
|
|
self.failsafe_add(api.Object.hostgroup,
|
|
self.test_hostgroup, description=u'description'
|
|
)
|
|
self.failsafe_add(api.Object.host,
|
|
self.test_sourcehost, force=True
|
|
)
|
|
self.failsafe_add(api.Object.hostgroup,
|
|
self.test_sourcehostgroup, description=u'desc'
|
|
)
|
|
self.failsafe_add(api.Object.hbacsvc,
|
|
self.test_service, description=u'desc', force=True
|
|
)
|
|
|
|
def test_8_hbac_add_user(self):
|
|
"""
|
|
Test adding user and group to HBAC rule using `xmlrpc.hbac_add_user`.
|
|
"""
|
|
ret = api.Command['hbac_add_user'](
|
|
self.rule_name, user=self.test_user, group=self.test_group
|
|
)
|
|
assert ret['completed'] == 2
|
|
failed = ret['failed']
|
|
assert 'memberuser' in failed
|
|
assert 'user' in failed['memberuser']
|
|
assert not failed['memberuser']['user']
|
|
assert 'group' in failed['memberuser']
|
|
assert not failed['memberuser']['group']
|
|
entry = ret['result']
|
|
assert_attr_equal(entry, 'memberuser_user', self.test_user)
|
|
assert_attr_equal(entry, 'memberuser_group', self.test_group)
|
|
|
|
def test_9_hbac_remove_user(self):
|
|
"""
|
|
Test removing user and group from HBAC rule using `xmlrpc.hbac_remove_user'.
|
|
"""
|
|
ret = api.Command['hbac_remove_user'](
|
|
self.rule_name, user=self.test_user, group=self.test_group
|
|
)
|
|
assert ret['completed'] == 2
|
|
failed = ret['failed']
|
|
assert 'memberuser' in failed
|
|
assert 'user' in failed['memberuser']
|
|
assert not failed['memberuser']['user']
|
|
assert 'group' in failed['memberuser']
|
|
assert not failed['memberuser']['group']
|
|
entry = ret['result']
|
|
assert 'memberuser_user' not in entry
|
|
assert 'memberuser_group' not in entry
|
|
|
|
def test_a_hbac_add_host(self):
|
|
"""
|
|
Test adding host and hostgroup to HBAC rule using `xmlrpc.hbac_add_host`.
|
|
"""
|
|
ret = api.Command['hbac_add_host'](
|
|
self.rule_name, host=self.test_host, hostgroup=self.test_hostgroup
|
|
)
|
|
assert ret['completed'] == 2
|
|
failed = ret['failed']
|
|
assert 'memberhost' in failed
|
|
assert 'host' in failed['memberhost']
|
|
assert not failed['memberhost']['host']
|
|
assert 'hostgroup' in failed['memberhost']
|
|
assert not failed['memberhost']['hostgroup']
|
|
entry = ret['result']
|
|
assert_attr_equal(entry, 'memberhost_host', self.test_host)
|
|
assert_attr_equal(entry, 'memberhost_hostgroup', self.test_hostgroup)
|
|
|
|
def test_b_hbac_remove_host(self):
|
|
"""
|
|
Test removing host and hostgroup from HBAC rule using `xmlrpc.hbac_remove_host`.
|
|
"""
|
|
ret = api.Command['hbac_remove_host'](
|
|
self.rule_name, host=self.test_host, hostgroup=self.test_hostgroup
|
|
)
|
|
assert ret['completed'] == 2
|
|
failed = ret['failed']
|
|
assert 'memberhost' in failed
|
|
assert 'host' in failed['memberhost']
|
|
assert not failed['memberhost']['host']
|
|
assert 'hostgroup' in failed['memberhost']
|
|
assert not failed['memberhost']['hostgroup']
|
|
entry = ret['result']
|
|
assert 'memberhost_host' not in res[1]
|
|
assert 'memberhost_hostgroup' not in res[1]
|
|
|
|
def test_a_hbac_add_sourcehost(self):
|
|
"""
|
|
Test adding source host and hostgroup to HBAC rule using `xmlrpc.hbac_add_host`.
|
|
"""
|
|
ret = api.Command['hbac_add_sourcehost'](
|
|
self.rule_name, host=self.test_host, hostgroup=self.test_hostgroup
|
|
)
|
|
assert ret['completed'] == 2
|
|
failed = ret['failed']
|
|
assert 'sourcehost' in failed
|
|
assert 'host' in failed['sourcehost']
|
|
assert not failed['sourcehost']['host']
|
|
assert 'hostgroup' in failed['sourcehost']
|
|
assert not failed['sourcehost']['hostgroup']
|
|
entry = ret['result']
|
|
assert_attr_equal(entry, 'sourcehost_host', self.test_host)
|
|
assert_attr_equal(entry, 'sourcehost_hostgroup', self.test_hostgroup)
|
|
|
|
def test_a_hbac_add_service(self):
|
|
"""
|
|
Test adding service to HBAC rule using `xmlrpc.hbac_add_service`.
|
|
"""
|
|
ret = api.Command['hbac_add_service'](
|
|
self.rule_name, hbacsvc=self.test_service
|
|
)
|
|
assert ret['completed'] == 1
|
|
failed = ret['failed']
|
|
assert 'memberservice' in failed
|
|
assert 'hbacsvc' in failed['memberservice']
|
|
assert not failed['memberservice']['hbacsvc']
|
|
entry = ret['result']
|
|
assert_attr_equal(entry, 'memberservice_service', self.test_service)
|
|
|
|
def test_a_hbac_remove_service(self):
|
|
"""
|
|
Test removing service to HBAC rule using `xmlrpc.hbac_remove_service`.
|
|
"""
|
|
ret = api.Command['hbac_remove_service'](
|
|
self.rule_name, hbacsvc=self.test_service
|
|
)
|
|
assert ret['completed'] == 1
|
|
failed = ret['failed']
|
|
assert 'memberservice' in failed
|
|
assert 'hbacsvc' in failed['memberservice']
|
|
assert not failed['memberservice']['hbacsvc']
|
|
entry = ret['result']
|
|
assert 'memberservice service' not in entry
|
|
|
|
def test_b_hbac_remove_host(self):
|
|
"""
|
|
Test removing source host and hostgroup from HBAC rule using `xmlrpc.hbac_remove_host`.
|
|
"""
|
|
ret = api.Command['hbac_remove_sourcehost'](
|
|
self.rule_name, host=self.test_host, hostgroup=self.test_hostgroup
|
|
)
|
|
assert ret['completed'] == 2
|
|
failed = ret['failed']
|
|
assert 'sourcehost' in failed
|
|
assert 'host' in failed['sourcehost']
|
|
assert not failed['sourcehost']['host']
|
|
assert 'hostgroup' in failed['sourcehost']
|
|
assert not failed['sourcehost']['hostgroup']
|
|
entry = ret['result']
|
|
assert 'sourcehost host' not in entry
|
|
assert 'sourcehost hostgroup' not in entry
|
|
|
|
def test_c_hbac_clear_testing_data(self):
|
|
"""
|
|
Clear data for HBAC plugin testing.
|
|
"""
|
|
api.Command['hbac_remove_host'](self.rule_name, host=self.test_host)
|
|
api.Command['hbac_remove_host'](self.rule_name, hostgroup=self.test_hostgroup)
|
|
api.Command['user_del'](self.test_user)
|
|
api.Command['group_del'](self.test_group)
|
|
api.Command['host_del'](self.test_host)
|
|
api.Command['hostgroup_del'](self.test_hostgroup)
|
|
api.Command['host_del'](self.test_sourcehost)
|
|
api.Command['hostgroup_del'](self.test_sourcehostgroup)
|
|
api.Command['hbacsvc_del'](self.test_service)
|
|
|
|
def test_d_hbac_disable(self):
|
|
"""
|
|
Test disabling HBAC rule using `xmlrpc.hbac_disable`.
|
|
"""
|
|
assert api.Command['hbac_disable'](self.rule_name)['result'] is True
|
|
entry = api.Command['hbac_show'](self.rule_name)['result']
|
|
# FIXME: Should this be 'disabled' or 'FALSE'?
|
|
assert_attr_equal(entry, 'ipaenabledflag', 'FALSE')
|
|
|
|
def test_e_hbac_enabled(self):
|
|
"""
|
|
Test enabling HBAC rule using `xmlrpc.hbac_enable`.
|
|
"""
|
|
assert api.Command['hbac_enable'](self.rule_name)['result'] is True
|
|
# check it's really enabled
|
|
entry = api.Command['hbac_show'](self.rule_name)['result']
|
|
# FIXME: Should this be 'enabled' or 'TRUE'?
|
|
assert_attr_equal(entry, 'ipaenabledflag', 'TRUE')
|
|
|
|
def test_f_hbac_exclusiveuser(self):
|
|
"""
|
|
Test adding a user to an HBAC rule when usercat='all'
|
|
"""
|
|
api.Command['hbac_mod'](self.rule_name, usercategory=u'all')
|
|
try:
|
|
api.Command['hbac_add_user'](self.rule_name, users='admin')
|
|
except errors.MutuallyExclusiveError:
|
|
pass
|
|
api.Command['hbac_mod'](self.rule_name, usercategory=u'')
|
|
|
|
def test_g_hbac_exclusiveuser(self):
|
|
"""
|
|
Test setting usercat='all' in an HBAC rule when there are users
|
|
"""
|
|
api.Command['hbac_add_user'](self.rule_name, users='admin')
|
|
try:
|
|
api.Command['hbac_mod'](self.rule_name, usercategory=u'all')
|
|
except errors.MutuallyExclusiveError:
|
|
pass
|
|
finally:
|
|
api.Command['hbac_remove_user'](self.rule_name, users='admin')
|
|
|
|
def test_h_hbac_exclusivehost(self):
|
|
"""
|
|
Test adding a host to an HBAC rule when hostcat='all'
|
|
"""
|
|
api.Command['hbac_mod'](self.rule_name, hostcategory=u'all')
|
|
try:
|
|
api.Command['hbac_add_host'](self.rule_name, host=self.test_host)
|
|
except errors.MutuallyExclusiveError:
|
|
pass
|
|
api.Command['hbac_mod'](self.rule_name, hostcategory=u'')
|
|
|
|
def test_i_hbac_exclusivehost(self):
|
|
"""
|
|
Test setting hostcat='all' in an HBAC rule when there are hosts
|
|
"""
|
|
api.Command['hbac_add_host'](self.rule_name, host=self.test_host)
|
|
try:
|
|
api.Command['hbac_mod'](self.rule_name, hostcategory=u'all')
|
|
except errors.MutuallyExclusiveError:
|
|
pass
|
|
finally:
|
|
api.Command['hbac_remove_host'](self.rule_name, host=self.test_host)
|
|
|
|
def test_j_hbac_exclusiveservice(self):
|
|
"""
|
|
Test adding a service to an HBAC rule when servicecat='all'
|
|
"""
|
|
api.Command['hbac_mod'](self.rule_name, servicecategory=u'all')
|
|
try:
|
|
api.Command['hbac_add_host'](self.rule_name, hbacsvc=self.test_service)
|
|
except errors.MutuallyExclusiveError:
|
|
pass
|
|
api.Command['hbac_mod'](self.rule_name, servicecategory=u'')
|
|
|
|
def test_k_hbac_exclusiveservice(self):
|
|
"""
|
|
Test setting servicecat='all' in an HBAC rule when there are services
|
|
"""
|
|
api.Command['hbac_add_service'](self.rule_name, hbacsvc=self.test_service)
|
|
try:
|
|
api.Command['hbac_mod'](self.rule_name, servicecategory=u'all')
|
|
except errors.MutuallyExclusiveError:
|
|
pass
|
|
finally:
|
|
api.Command['hbac_remove_service'](self.rule_name, hbacsvc=self.test_service)
|
|
|
|
def test_z_hbac_del(self):
|
|
"""
|
|
Test deleting a HBAC rule using `xmlrpc.hbac_del`.
|
|
"""
|
|
assert api.Command['hbac_del'](self.rule_name)['result'] is True
|
|
# verify that it's gone
|
|
try:
|
|
api.Command['hbac_show'](self.rule_name)
|
|
except errors.NotFound:
|
|
pass
|
|
else:
|
|
assert False
|