mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-26 00:41:25 -06:00
4314d02fbf
Also return list of primary keys instead of a single unicode CSV value from LDAPDelete-based commands. This introduces a new capability 'primary_key_types' for backward compatibility with old clients. Reviewed-By: Tomas Babej <tbabej@redhat.com>
393 lines
13 KiB
Python
393 lines
13 KiB
Python
# Authors:
|
|
# Petr Viktorin <pviktori@redhat.com>
|
|
#
|
|
# Copyright (C) 2013 Red Hat
|
|
# see file 'COPYING' for use and warranty information
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
from ipalib import errors, api, _
|
|
from ipapython.dn import DN
|
|
from ipatests.test_xmlrpc.xmlrpc_test import Declarative
|
|
from ipatests.test_xmlrpc.test_user_plugin import get_user_result
|
|
from ipatests.test_xmlrpc import objectclasses
|
|
|
|
radius1 = u'testradius'
|
|
radius1_fqdn = u'testradius.test'
|
|
radius1_dn = DN(('cn=testradius'), ('cn=radiusproxy'), api.env.basedn)
|
|
user1 = u'tuser1'
|
|
password1 = u'very*secure123'
|
|
|
|
|
|
class test_raduisproxy(Declarative):
|
|
|
|
cleanup_commands = [
|
|
('radiusproxy_del', [radius1], {}),
|
|
('user_del', [user1], {}),
|
|
]
|
|
|
|
tests = [
|
|
|
|
dict(
|
|
desc='Try to retrieve non-existent %r' % radius1,
|
|
command=('radiusproxy_show', [radius1], {}),
|
|
expected=errors.NotFound(
|
|
reason=u'%s: RADIUS proxy server not found' % radius1),
|
|
),
|
|
|
|
|
|
dict(
|
|
desc='Try to update non-existent %r' % radius1,
|
|
command=('radiusproxy_mod', [radius1], {}),
|
|
expected=errors.NotFound(
|
|
reason=_('%s: RADIUS proxy server not found') % radius1),
|
|
),
|
|
|
|
|
|
dict(
|
|
desc='Try to delete non-existent %r' % radius1,
|
|
command=('radiusproxy_del', [radius1], {}),
|
|
expected=errors.NotFound(
|
|
reason=_('%s: RADIUS proxy server not found') % radius1),
|
|
),
|
|
|
|
|
|
dict(
|
|
desc='Create %r' % radius1,
|
|
command=('radiusproxy_add', [radius1],
|
|
dict(
|
|
ipatokenradiusserver=radius1_fqdn,
|
|
ipatokenradiussecret=password1,
|
|
),
|
|
),
|
|
expected=dict(
|
|
value=radius1,
|
|
summary=u'Added RADIUS proxy server "%s"' % radius1,
|
|
result=dict(
|
|
cn=[radius1],
|
|
dn=radius1_dn,
|
|
ipatokenradiussecret=[str(password1)],
|
|
ipatokenradiusserver=[radius1_fqdn],
|
|
objectclass=objectclasses.radiusproxy,
|
|
|
|
),
|
|
),
|
|
),
|
|
|
|
|
|
dict(
|
|
desc='Try to create duplicate %r' % radius1,
|
|
command=('radiusproxy_add', [radius1],
|
|
dict(
|
|
ipatokenradiusserver=radius1_fqdn,
|
|
ipatokenradiussecret=password1,
|
|
),
|
|
),
|
|
expected=errors.DuplicateEntry(message=_('RADIUS proxy server '
|
|
'with name "%s" already exists') % radius1),
|
|
),
|
|
|
|
|
|
dict(
|
|
desc='Retrieve %r' % radius1,
|
|
command=('radiusproxy_show', [radius1], {}),
|
|
expected=dict(
|
|
value=radius1,
|
|
summary=None,
|
|
result=dict(
|
|
cn=[radius1],
|
|
dn=radius1_dn,
|
|
ipatokenradiusserver=[radius1_fqdn],
|
|
),
|
|
),
|
|
),
|
|
|
|
|
|
dict(
|
|
desc='Retrieve %r with all=True' % radius1,
|
|
command=('radiusproxy_show', [radius1], dict(all=True)),
|
|
expected=dict(
|
|
value=radius1,
|
|
summary=None,
|
|
result=dict(
|
|
cn=[radius1],
|
|
dn=radius1_dn,
|
|
ipatokenradiussecret=[str(password1)],
|
|
ipatokenradiusserver=[radius1_fqdn],
|
|
objectclass=objectclasses.radiusproxy,
|
|
),
|
|
),
|
|
),
|
|
|
|
] + [
|
|
dict(
|
|
desc='Set timeout of %s to %s (valid)' % (radius1, num),
|
|
command=('radiusproxy_mod', [radius1],
|
|
dict(ipatokenradiustimeout=num)),
|
|
expected=dict(
|
|
value=radius1,
|
|
summary=u'Modified RADIUS proxy server "%s"' % radius1,
|
|
result=dict(
|
|
cn=[radius1],
|
|
ipatokenradiusserver=[radius1_fqdn],
|
|
ipatokenradiustimeout=[unicode(num)],
|
|
),
|
|
),
|
|
)
|
|
for num in (1, 100)
|
|
] + [
|
|
|
|
dict(
|
|
desc='Set timeout of %s to 0 (invalid)' % radius1,
|
|
command=('radiusproxy_mod', [radius1],
|
|
dict(ipatokenradiustimeout=0)),
|
|
expected=errors.ValidationError(
|
|
name='timeout', error=_('must be at least 1')),
|
|
),
|
|
|
|
dict(
|
|
desc='Unset timeout of %s' % radius1,
|
|
command=('radiusproxy_mod', [radius1],
|
|
dict(ipatokenradiustimeout=None)),
|
|
expected=dict(
|
|
value=radius1,
|
|
summary=u'Modified RADIUS proxy server "%s"' % radius1,
|
|
result=dict(
|
|
cn=[radius1],
|
|
ipatokenradiusserver=[radius1_fqdn],
|
|
),
|
|
),
|
|
),
|
|
|
|
] + [
|
|
dict(
|
|
desc='Set retries of %s to %s (valid)' % (radius1, num),
|
|
command=('radiusproxy_mod', [radius1],
|
|
dict(ipatokenradiusretries=num)),
|
|
expected=dict(
|
|
value=radius1,
|
|
summary=u'Modified RADIUS proxy server "%s"' % radius1,
|
|
result=dict(
|
|
cn=[radius1],
|
|
ipatokenradiusserver=[radius1_fqdn],
|
|
ipatokenradiusretries=[unicode(num)],
|
|
),
|
|
),
|
|
)
|
|
for num in (0, 4, 10)
|
|
] + [
|
|
dict(
|
|
desc='Set retries of %s to %s (invalid)' % (radius1, num),
|
|
command=('radiusproxy_mod', [radius1],
|
|
dict(ipatokenradiusretries=num)),
|
|
expected=errors.ValidationError(
|
|
name='retries', error=reason),
|
|
)
|
|
for num, reason in ((-1, 'must be at least 0'),
|
|
(11, 'can be at most 10'),
|
|
(100, 'can be at most 10'))
|
|
] + [
|
|
|
|
dict(
|
|
desc='Unset retries of %s' % radius1,
|
|
command=('radiusproxy_mod', [radius1],
|
|
dict(ipatokenradiusretries=None)),
|
|
expected=dict(
|
|
value=radius1,
|
|
summary=u'Modified RADIUS proxy server "%s"' % radius1,
|
|
result=dict(
|
|
cn=[radius1],
|
|
ipatokenradiusserver=[radius1_fqdn],
|
|
),
|
|
),
|
|
),
|
|
|
|
] + [
|
|
dict(
|
|
desc='Set server string of %s to %s (valid)' % (radius1, fqdn),
|
|
command=('radiusproxy_mod', [radius1],
|
|
dict(ipatokenradiusserver=fqdn)),
|
|
expected=dict(
|
|
value=radius1,
|
|
summary=u'Modified RADIUS proxy server "%s"' % radius1,
|
|
result=dict(
|
|
cn=[radius1],
|
|
ipatokenradiusserver=[fqdn],
|
|
),
|
|
),
|
|
)
|
|
for fqdn in (radius1_fqdn + u':12345', radius1_fqdn)
|
|
] + [
|
|
dict(
|
|
desc='Set server string of %s to %s (invalid)' % (radius1, fqdn),
|
|
command=('radiusproxy_mod', [radius1],
|
|
dict(ipatokenradiusserver=fqdn)),
|
|
expected=errors.ValidationError(name='ipatokenradiusserver',
|
|
error=error),
|
|
)
|
|
for fqdn, error in (
|
|
(radius1_fqdn + u':0x5a', 'invalid port number'),
|
|
(radius1_fqdn + u':1:2:3',
|
|
"only letters, numbers, '_', '-' are allowed. DNS label may not "
|
|
"start or end with '-'"),
|
|
(u'bogus', 'not fully qualified'),
|
|
)
|
|
] + [
|
|
|
|
dict(
|
|
desc='Try to unset server string of %s' % radius1,
|
|
command=('radiusproxy_mod', [radius1],
|
|
dict(ipatokenradiusserver=None)),
|
|
expected=errors.RequirementError(name='server'),
|
|
),
|
|
|
|
dict(
|
|
desc='Set userattr of %s to %s (valid)' % (radius1, u'cn'),
|
|
command=('radiusproxy_mod', [radius1],
|
|
dict(ipatokenusermapattribute=u'cn')),
|
|
expected=dict(
|
|
value=radius1,
|
|
summary=u'Modified RADIUS proxy server "%s"' % radius1,
|
|
result=dict(
|
|
cn=[radius1],
|
|
ipatokenradiusserver=[radius1_fqdn],
|
|
ipatokenusermapattribute=[u'cn'],
|
|
),
|
|
),
|
|
),
|
|
|
|
dict(
|
|
desc='Set userattr of %s to %s (invalid)' % (radius1, u'$%^&*'),
|
|
command=('radiusproxy_mod', [radius1],
|
|
dict(ipatokenusermapattribute=u'$%^&*')),
|
|
expected=errors.ValidationError(name='ipatokenusermapattribute',
|
|
error=u'invalid attribute name'),
|
|
),
|
|
|
|
dict(
|
|
desc='Unset userattr of %s' % radius1,
|
|
command=('radiusproxy_mod', [radius1],
|
|
dict(ipatokenusermapattribute=None)),
|
|
expected=dict(
|
|
value=radius1,
|
|
summary=u'Modified RADIUS proxy server "%s"' % radius1,
|
|
result=dict(
|
|
cn=[radius1],
|
|
ipatokenradiusserver=[radius1_fqdn],
|
|
),
|
|
),
|
|
),
|
|
|
|
dict(
|
|
desc='Set desc of %s' % radius1,
|
|
command=('radiusproxy_mod', [radius1],
|
|
dict(description=u'a virtual radius server')),
|
|
expected=dict(
|
|
value=radius1,
|
|
summary=u'Modified RADIUS proxy server "%s"' % radius1,
|
|
result=dict(
|
|
cn=[radius1],
|
|
ipatokenradiusserver=[radius1_fqdn],
|
|
description=[u'a virtual radius server'],
|
|
),
|
|
),
|
|
),
|
|
|
|
dict(
|
|
desc='Unset desc of %s' % radius1,
|
|
command=('radiusproxy_mod', [radius1],
|
|
dict(description=None)),
|
|
expected=dict(
|
|
value=radius1,
|
|
summary=u'Modified RADIUS proxy server "%s"' % radius1,
|
|
result=dict(
|
|
cn=[radius1],
|
|
ipatokenradiusserver=[radius1_fqdn],
|
|
),
|
|
),
|
|
),
|
|
|
|
dict(
|
|
desc='Create "%s"' % user1,
|
|
command=(
|
|
'user_add', [user1], dict(givenname=u'Test', sn=u'User1')
|
|
),
|
|
expected=dict(
|
|
value=user1,
|
|
summary=u'Added user "%s"' % user1,
|
|
result=get_user_result(user1, u'Test', u'User1', 'add'),
|
|
),
|
|
),
|
|
|
|
|
|
dict(
|
|
desc='Set radiusconfiglink of %r' % user1,
|
|
command=('user_mod', [user1],
|
|
dict(ipatokenradiusconfiglink=radius1,)),
|
|
expected=dict(
|
|
result=get_user_result(user1, u'Test', u'User1', 'mod',
|
|
ipatokenradiusconfiglink=[radius1]),
|
|
value=user1,
|
|
summary='Modified user "%s"' % user1,
|
|
),
|
|
),
|
|
|
|
dict(
|
|
desc='Retrieve %r to verify %s is output' % (radius1, user1),
|
|
command=('radiusproxy_show', [radius1], {}),
|
|
expected=dict(
|
|
value=radius1,
|
|
summary=None,
|
|
result=dict(
|
|
cn=[radius1],
|
|
dn=radius1_dn,
|
|
ipatokenradiusserver=[radius1_fqdn],
|
|
),
|
|
),
|
|
),
|
|
|
|
dict(
|
|
desc='Retrieve %r to verify %s is output' % (user1, radius1),
|
|
command=('user_show', [user1], {}),
|
|
expected=dict(
|
|
value=user1,
|
|
summary=None,
|
|
result=get_user_result(user1, u'Test', u'User1', 'show',
|
|
ipatokenradiusconfiglink=[radius1]),
|
|
),
|
|
),
|
|
|
|
dict(
|
|
desc='Delete %r' % radius1,
|
|
command=('radiusproxy_del', [radius1], {}),
|
|
expected=dict(
|
|
value=[radius1],
|
|
summary=u'Deleted RADIUS proxy server "%s"' % radius1,
|
|
result=dict(failed=[]),
|
|
),
|
|
),
|
|
|
|
dict(
|
|
desc='Retrieve %s to verify link is deleted' % user1,
|
|
command=('user_show', [user1], {}),
|
|
expected=dict(
|
|
value=user1,
|
|
summary=None,
|
|
result=get_user_result(user1, u'Test', u'User1', 'show'),
|
|
),
|
|
),
|
|
|
|
]
|