mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-25 08:21:05 -06:00
ba213aa448
This testcase checks that when trust isn't setup between IPA server and Windows AD, IPADomainCheck displays key value as domain-check and result is SUCCESS Reviewed-By: Rob Crittenden <rcritten@redhat.com>
679 lines
23 KiB
Python
679 lines
23 KiB
Python
# Copyright (C) 2020 FreeIPA Contributors see COPYING for license
|
|
#
|
|
|
|
"""
|
|
Tests to verify that the ipa-healthcheck scenarios
|
|
"""
|
|
|
|
from __future__ import absolute_import
|
|
|
|
import json
|
|
import re
|
|
|
|
import pytest
|
|
|
|
from ipalib import api
|
|
from ipapython.ipaldap import realm_to_serverid
|
|
from ipatests.pytest_ipa.integration import tasks
|
|
from ipatests.test_integration.base import IntegrationTest
|
|
|
|
HEALTHCHECK_LOG = "/var/log/ipa/healthcheck/healthcheck.log"
|
|
HEALTHCHECK_SYSTEMD_FILE = (
|
|
"/etc/systemd/system/multi-user.target.wants/ipa-healthcheck.timer"
|
|
)
|
|
HEALTHCHECK_LOG_ROTATE_CONF = "/etc/logrotate.d/ipahealthcheck"
|
|
HEALTHCHECK_LOG_DIR = "/var/log/ipa/healthcheck"
|
|
HEALTHCHECK_OUTPUT_FILE = "/tmp/output.json"
|
|
HEALTHCHECK_PKG = ["*ipa-healthcheck"]
|
|
TOMCAT_CFG = "/var/lib/pki/pki-tomcat/conf/ca/CS.cfg"
|
|
|
|
|
|
sources = [
|
|
"ipahealthcheck.dogtag.ca",
|
|
"ipahealthcheck.ds.replication",
|
|
"ipahealthcheck.dogtag.ca",
|
|
"ipahealthcheck.ipa.certs",
|
|
"ipahealthcheck.ipa.dna",
|
|
"ipahealthcheck.ipa.idns",
|
|
"ipahealthcheck.ipa.files",
|
|
"ipahealthcheck.ipa.host",
|
|
"ipahealthcheck.ipa.roles",
|
|
"ipahealthcheck.ipa.topology",
|
|
"ipahealthcheck.ipa.trust",
|
|
"ipahealthcheck.meta.services",
|
|
]
|
|
|
|
ipa_cert_checks = [
|
|
"IPACertmongerExpirationCheck",
|
|
"IPACertfileExpirationCheck",
|
|
"IPACertTracking",
|
|
"IPACertNSSTrust",
|
|
"IPANSSChainValidation",
|
|
"IPAOpenSSLChainValidation",
|
|
"IPARAAgent",
|
|
"IPACertRevocation",
|
|
"IPACertmongerCA",
|
|
"IPACAChainExpirationCheck",
|
|
]
|
|
|
|
ipatrust_checks = [
|
|
"IPATrustAgentCheck",
|
|
"IPATrustDomainsCheck",
|
|
"IPADomainCheck",
|
|
"IPATrustCatalogCheck",
|
|
"IPAsidgenpluginCheck",
|
|
"IPATrustAgentMemberCheck",
|
|
"IPATrustControllerPrincipalCheck",
|
|
"IPATrustControllerServiceCheck",
|
|
"IPATrustControllerConfCheck",
|
|
"IPATrustControllerGroupSIDCheck",
|
|
"IPATrustPackageCheck",
|
|
]
|
|
|
|
metaservices_checks = [
|
|
"certmonger",
|
|
"dirsrv",
|
|
"gssproxy",
|
|
"httpd",
|
|
"ipa_custodia",
|
|
"ipa_dnskeysyncd",
|
|
"ipa_otpd",
|
|
"kadmin",
|
|
"krb5kdc",
|
|
"named",
|
|
"pki_tomcatd",
|
|
"sssd",
|
|
]
|
|
|
|
ipafiles_checks = ["IPAFileNSSDBCheck", "IPAFileCheck", "TomcatFileCheck"]
|
|
dogtag_checks = ["DogtagCertsConfigCheck", "DogtagCertsConnectivityCheck"]
|
|
iparoles_checks = ["IPACRLManagerCheck", "IPARenewalMasterCheck"]
|
|
replication_checks = ["ReplicationConflictCheck"]
|
|
ruv_checks = ["RUVCheck"]
|
|
dna_checks = ["IPADNARangeCheck"]
|
|
idns_checks = ["IPADNSSystemRecordsCheck"]
|
|
ipahost_checks = ["IPAHostKeytab"]
|
|
ipatopology_checks = ["IPATopologyDomainCheck"]
|
|
filesystem_checks = ["FileSystemSpaceCheck"]
|
|
metacore_checks = ["MetaCheck"]
|
|
|
|
DEFAULT_PKI_CA_CERTS = [
|
|
"caSigningCert cert-pki-ca",
|
|
"ocspSigningCert cert-pki-ca",
|
|
"subsystemCert cert-pki-ca",
|
|
"auditSigningCert cert-pki-ca",
|
|
"Server-Cert cert-pki-ca",
|
|
]
|
|
|
|
DEFAULT_PKI_KRA_CERTS = [
|
|
"transportCert cert-pki-kra",
|
|
"storageCert cert-pki-kra",
|
|
"auditSigningCert cert-pki-kra",
|
|
]
|
|
|
|
|
|
def run_healthcheck(host, source=None, check=None, output_type="json",
|
|
failures_only=False):
|
|
"""
|
|
Run ipa-healthcheck on the remote host and return the result
|
|
|
|
Returns: the tuple returncode, output
|
|
|
|
output is:
|
|
json data if output_type == "json"
|
|
stdout if output_type == "human"
|
|
"""
|
|
data = None
|
|
cmd = ["ipa-healthcheck"]
|
|
if source:
|
|
cmd.append("--source")
|
|
cmd.append(source)
|
|
|
|
if check:
|
|
cmd.append("--check")
|
|
cmd.append(check)
|
|
|
|
cmd.append("--output-type")
|
|
cmd.append(output_type)
|
|
|
|
if failures_only:
|
|
cmd.append("--failures-only")
|
|
|
|
result = host.run_command(cmd, raiseonerr=False)
|
|
|
|
if result.stdout_text:
|
|
if output_type == "json":
|
|
data = json.loads(result.stdout_text)
|
|
else:
|
|
data = result.stdout_text.strip()
|
|
|
|
return result.returncode, data
|
|
|
|
|
|
class TestIpaHealthCheck(IntegrationTest):
|
|
"""
|
|
Tier-1 test for ipa-healthcheck tool with IPA Master setup with
|
|
dns and IPA Replica with dns enabled
|
|
"""
|
|
|
|
num_replicas = 1
|
|
|
|
@classmethod
|
|
def install(cls, mh):
|
|
tasks.install_master(cls.master, setup_dns=True)
|
|
tasks.install_replica(cls.master, cls.replicas[0], setup_dns=True)
|
|
|
|
def test_ipa_healthcheck_install_on_master(self):
|
|
"""
|
|
Testcase to check healthcheck package is installed
|
|
succesfully on IPA master.
|
|
"""
|
|
tasks.install_packages(self.master, HEALTHCHECK_PKG)
|
|
|
|
def test_ipa_healthcheck_install_on_replica(self):
|
|
"""
|
|
Testcase to check healthcheck package is installed
|
|
succesfully on IPA replica.
|
|
"""
|
|
tasks.install_packages(self.replicas[0], HEALTHCHECK_PKG)
|
|
|
|
def test_run_ipahealthcheck_list_source(self):
|
|
"""
|
|
Testcase to verify sources available in healthcheck tool.
|
|
"""
|
|
result = self.master.run_command(["ipa-healthcheck", "--list-sources"])
|
|
for source in sources:
|
|
assert source in result.stdout_text
|
|
|
|
def test_human_output(self):
|
|
"""
|
|
Test that in human output the severity value is correct
|
|
|
|
Only the SUCCESS (0) value was being translated, otherwise
|
|
the numeric value was being shown (BZ 1752849)
|
|
"""
|
|
self.master.run_command(["systemctl", "stop", "sssd"])
|
|
try:
|
|
returncode, output = run_healthcheck(
|
|
self.master,
|
|
"ipahealthcheck.meta.services",
|
|
"sssd",
|
|
"human",
|
|
)
|
|
finally:
|
|
self.master.run_command(["systemctl", "start", "sssd"])
|
|
|
|
assert returncode == 1
|
|
assert output == \
|
|
"ERROR: ipahealthcheck.meta.services.sssd: sssd: not running"
|
|
|
|
def test_dogtag_ca_check_exists(self):
|
|
"""
|
|
Testcase to verify checks available in
|
|
ipahealthcheck.dogtag.ca source
|
|
"""
|
|
result = self.master.run_command(
|
|
["ipa-healthcheck", "--source", "ipahealthcheck.dogtag.ca"]
|
|
)
|
|
for check in dogtag_checks:
|
|
assert check in result.stdout_text
|
|
|
|
def test_replication_check_exists(self):
|
|
"""
|
|
Testcase to verify checks available in
|
|
ipahealthcheck.ds.replication source
|
|
"""
|
|
result = self.master.run_command(
|
|
["ipa-healthcheck", "--source", "ipahealthcheck.ds.replication"]
|
|
)
|
|
for check in replication_checks:
|
|
assert check in result.stdout_text
|
|
|
|
def test_ipa_cert_check_exists(self):
|
|
"""
|
|
Testcase to verify checks available in
|
|
ipahealthcheck.ipa.certs source
|
|
"""
|
|
result = self.master.run_command(
|
|
["ipa-healthcheck", "--source", "ipahealthcheck.ipa.certs"]
|
|
)
|
|
for check in ipa_cert_checks:
|
|
assert check in result.stdout_text
|
|
|
|
def test_ipa_trust_check_exists(self):
|
|
"""
|
|
Testcase to verify checks available in
|
|
ipahealthcheck.ipa.trust source
|
|
"""
|
|
result = self.master.run_command(
|
|
["ipa-healthcheck", "--source", "ipahealthcheck.ipa.trust"]
|
|
)
|
|
for check in ipatrust_checks:
|
|
assert check in result.stdout_text
|
|
|
|
def test_source_ipahealthcheck_meta_services_check_sssd(self):
|
|
"""
|
|
Testcase checks behaviour of check sssd in
|
|
ipahealthcheck.meta.services when service is stopped and started
|
|
respectively
|
|
"""
|
|
self.master.run_command(["systemctl", "stop", "sssd"])
|
|
returncode, data = run_healthcheck(
|
|
self.master,
|
|
"ipahealthcheck.meta.services",
|
|
"sssd",
|
|
)
|
|
assert returncode == 1
|
|
for check in data:
|
|
assert check["result"] == "ERROR"
|
|
assert check["kw"]["msg"] == "sssd: not running"
|
|
assert check["kw"]["status"] is False
|
|
self.master.run_command(["systemctl", "start", "sssd"])
|
|
returncode, data = run_healthcheck(
|
|
self.master,
|
|
"ipahealthcheck.meta.services",
|
|
"sssd",
|
|
)
|
|
assert returncode == 0
|
|
assert data[0]["check"] == "sssd"
|
|
assert data[0]["result"] == "SUCCESS"
|
|
assert data[0]["kw"]["status"] is True
|
|
|
|
def test_source_ipahealthcheck_dogtag_ca_dogtagcertsconfigcheck(self):
|
|
"""
|
|
Testcase checks behaviour of check DogtagCertsConfigCheck in
|
|
ipahealthcheck.dogtag.ca when tomcat config file is removed
|
|
"""
|
|
returncode, data = run_healthcheck(
|
|
self.master,
|
|
"ipahealthcheck.dogtag.ca",
|
|
"DogtagCertsConfigCheck",
|
|
)
|
|
assert returncode == 0
|
|
for check in data:
|
|
assert check["result"] == "SUCCESS"
|
|
assert check["kw"]["configfile"] == TOMCAT_CFG
|
|
assert check["kw"]["key"] in DEFAULT_PKI_CA_CERTS
|
|
self.master.run_command(["mv", TOMCAT_CFG, TOMCAT_CFG + ".old"])
|
|
returncode, data = run_healthcheck(
|
|
self.master,
|
|
"ipahealthcheck.dogtag.ca",
|
|
"DogtagCertsConfigCheck",
|
|
)
|
|
assert returncode == 1
|
|
assert data[0]["result"] == "CRITICAL"
|
|
self.master.run_command(["mv", TOMCAT_CFG + ".old", TOMCAT_CFG])
|
|
self.master.run_command(["ipactl", "restart"])
|
|
|
|
def test_source_ipahealthcheck_meta_core_metacheck(self):
|
|
"""
|
|
Testcase checks behaviour of check MetaCheck in source
|
|
ipahealthcheck.meta.core when run on IPA master
|
|
"""
|
|
returncode, data = run_healthcheck(
|
|
self.master,
|
|
"ipahealthcheck.meta.core",
|
|
"MetaCheck",
|
|
)
|
|
assert returncode == 0
|
|
assert data[0]["result"] == "SUCCESS"
|
|
result = self.master.run_command(
|
|
[
|
|
"python3",
|
|
"-c",
|
|
'from ipapython import version; '
|
|
'print("%s\t%s" % (version.VERSION, version.API_VERSION))',
|
|
]
|
|
)
|
|
assert data[0]["kw"]["ipa_version"] in result.stdout_text
|
|
assert data[0]["kw"]["ipa_api_version"] in result.stdout_text
|
|
|
|
def test_source_ipahealthcheck_ipa_host_check_ipahostkeytab(self):
|
|
"""
|
|
Testcase checks behaviour of check IPAHostKeytab in source
|
|
ipahealthcheck.ipa.host when dirsrv service is stopped and
|
|
running on IPA master
|
|
"""
|
|
msg = (
|
|
"Failed to obtain host TGT: Major (851968): "
|
|
"Unspecified GSS failure. "
|
|
"Minor code may provide more information, "
|
|
"Minor (2529638972): Generic error (see e-text)"
|
|
)
|
|
dirsrv_ipactl_status = 'Directory Service: STOPPED'
|
|
api.env.realm = self.master.domain.name
|
|
serverid = (realm_to_serverid(api.env.realm)).upper()
|
|
dirsrv_service = "dirsrv@%s.service" % serverid
|
|
self.master.run_command(["systemctl", "stop", dirsrv_service])
|
|
result = self.master.run_command(
|
|
["ipactl", "status"])
|
|
returncode, data = run_healthcheck(
|
|
self.master,
|
|
"ipahealthcheck.ipa.host",
|
|
"IPAHostKeytab",
|
|
)
|
|
assert returncode == 1
|
|
if dirsrv_ipactl_status in result.stdout_text:
|
|
assert data[0]["result"] == "ERROR"
|
|
assert data[0]["kw"]["msg"] == msg
|
|
else:
|
|
assert data[0]["result"] == "SUCCESS"
|
|
self.master.run_command(["systemctl", "start", dirsrv_service])
|
|
|
|
def test_source_ipahealthcheck_topology_IPATopologyDomainCheck(self):
|
|
"""
|
|
Testcase checks default behaviour of check IPATopologyDomainCheck in
|
|
source ipahealthcheck.ipa.topology on IPA Master
|
|
"""
|
|
returncode, data = run_healthcheck(
|
|
self.master,
|
|
"ipahealthcheck.ipa.topology",
|
|
"IPATopologyDomainCheck",
|
|
)
|
|
assert returncode == 0
|
|
for check in data:
|
|
assert check["result"] == "SUCCESS"
|
|
assert (
|
|
check["kw"]["suffix"] == "domain" or
|
|
check["kw"]["suffix"] == "ca"
|
|
)
|
|
|
|
@pytest.fixture
|
|
def disable_crlgen(self):
|
|
"""Fixture to disable crlgen then enable it once test is done"""
|
|
self.master.run_command(["ipa-crlgen-manage", "disable"])
|
|
yield
|
|
self.master.run_command(["ipa-crlgen-manage", "enable"])
|
|
|
|
def test_source_ipa_roles_check_crlmanager(self, disable_crlgen):
|
|
"""
|
|
This testcase checks the status of healthcheck tool
|
|
reflects correct information when crlgen is disabled
|
|
using ipa-crl-manage disable
|
|
"""
|
|
returncode, data = run_healthcheck(
|
|
self.master,
|
|
"ipahealthcheck.ipa.roles",
|
|
"IPACRLManagerCheck",
|
|
)
|
|
assert returncode == 0
|
|
for check in data:
|
|
assert check["result"] == "SUCCESS"
|
|
assert check["kw"]["key"] == "crl_manager"
|
|
assert check["kw"]["crlgen_enabled"] is False
|
|
|
|
def test_ipa_healthcheck_no_errors(self):
|
|
"""
|
|
Ensure that on a default installation with KRA and DNS
|
|
installed ipa-healthcheck runs with no errors.
|
|
"""
|
|
cmd = tasks.install_kra(self.master)
|
|
assert cmd.returncode == 0
|
|
returncode, _unused = run_healthcheck(
|
|
self.master,
|
|
failures_only=True
|
|
)
|
|
assert returncode == 0
|
|
|
|
def test_ipa_healthcheck_dna_plugin_returns_warning_pagure_issue_60(self):
|
|
"""
|
|
This testcase checks that the status for IPADNARangeCheck on replica
|
|
changes from WARNING to SUCCESS when user is added on the replica
|
|
as the DNA range is set.
|
|
Issue: freeipa/freeipa-healthcheck#60
|
|
"""
|
|
returncode, data = run_healthcheck(
|
|
self.master,
|
|
"ipahealthcheck.ipa.dna",
|
|
"IPADNARangeCheck",
|
|
)
|
|
assert returncode == 0
|
|
for check in data:
|
|
assert check["result"] == "SUCCESS"
|
|
# Install ipa-healthcheck rpm on replica
|
|
tasks.install_packages(self.replicas[0], HEALTHCHECK_PKG)
|
|
returncode, data = run_healthcheck(
|
|
self.replicas[0],
|
|
"ipahealthcheck.ipa.dna",
|
|
"IPADNARangeCheck",
|
|
)
|
|
assert returncode == 1
|
|
for check in data:
|
|
assert check["result"] == "WARNING"
|
|
assert (
|
|
check["kw"]["msg"] == "No DNA range defined. If no masters "
|
|
"define a range then users and groups cannot be created."
|
|
)
|
|
|
|
# Now kinit as admin and add a user on replica which will create a
|
|
# DNA configuration.
|
|
tasks.kinit_admin(self.replicas[0])
|
|
tasks.user_add(
|
|
self.replicas[0], 'ipauser1', first='Test', last='User',
|
|
)
|
|
# Now run the ipa-healthcheck command again
|
|
returncode, data = run_healthcheck(
|
|
self.replicas[0],
|
|
"ipahealthcheck.ipa.dna",
|
|
"IPADNARangeCheck",
|
|
)
|
|
assert returncode == 0
|
|
for check in data:
|
|
assert check["result"] == "SUCCESS"
|
|
|
|
def test_ipa_healthcheck_log_rotate_file_exist_issue35(self):
|
|
"""
|
|
This test checks if log rotation has been added
|
|
for ipa-healthcheck tool so that logs are rotated
|
|
in /var/log/ipa/healthcheck folder.
|
|
The test also checks that the logrotate configuration
|
|
file is syntactically correct by calling logrotate --debug
|
|
This is a testcase for below pagure issue
|
|
https://github.com/freeipa/freeipa-healthcheck/issues/35
|
|
"""
|
|
msg = "error: {}:".format(HEALTHCHECK_LOG_ROTATE_CONF)
|
|
tasks.uninstall_packages(self.master, HEALTHCHECK_PKG)
|
|
assert not self.master.transport.file_exists(
|
|
HEALTHCHECK_LOG_ROTATE_CONF
|
|
)
|
|
tasks.install_packages(self.master, HEALTHCHECK_PKG)
|
|
assert self.master.transport.file_exists(HEALTHCHECK_LOG_ROTATE_CONF)
|
|
cmd = self.master.run_command(
|
|
['logrotate', '--debug', HEALTHCHECK_LOG_ROTATE_CONF]
|
|
)
|
|
assert msg not in cmd.stdout_text
|
|
|
|
def test_ipa_dns_systemrecords_check(self):
|
|
"""
|
|
This test ensures that the ipahealthcheck.ipa.idns check
|
|
displays the correct result when master and replica is setup
|
|
with integrated DNS.
|
|
"""
|
|
SRV_RECORDS = [
|
|
"_ldap._tcp." + self.replicas[0].domain.name + ".:" +
|
|
self.replicas[0].hostname + ".",
|
|
"_ldap._tcp." + self.master.domain.name + ".:" +
|
|
self.master.hostname + ".",
|
|
"_kerberos._tcp." + self.replicas[0].domain.name + ".:" +
|
|
self.replicas[0].hostname + ".",
|
|
"_kerberos._tcp." + self.master.domain.name + ".:" +
|
|
self.master.hostname + ".",
|
|
"_kerberos._udp." + self.replicas[0].domain.name + ".:" +
|
|
self.replicas[0].hostname + ".",
|
|
"_kerberos._udp." + self.master.domain.name + ".:" +
|
|
self.master.hostname + ".",
|
|
"_kerberos-master._tcp." + self.replicas[0].domain.name +
|
|
".:" + self.replicas[0].hostname + ".",
|
|
"_kerberos-master._tcp." + self.master.domain.name + ".:" +
|
|
self.master.hostname + ".",
|
|
"_kerberos-master._udp." + self.replicas[0].domain.name +
|
|
".:" + self.replicas[0].hostname + ".",
|
|
"_kerberos-master._udp." + self.master.domain.name + ".:" +
|
|
self.master.hostname + ".",
|
|
"_kpasswd._tcp." + self.replicas[0].domain.name + ".:" +
|
|
self.replicas[0].hostname + ".",
|
|
"_kpasswd._tcp." + self.master.domain.name + ".:" +
|
|
self.master.hostname + ".",
|
|
"_kpasswd._udp." + self.replicas[0].domain.name + ".:" +
|
|
self.replicas[0].hostname + ".",
|
|
"_kpasswd._udp." + self.master.domain.name + ".:" +
|
|
self.master.hostname + ".",
|
|
"\"" + self.master.domain.realm.upper() + "\"",
|
|
self.master.ip,
|
|
self.replicas[0].ip
|
|
]
|
|
returncode, data = run_healthcheck(
|
|
self.master,
|
|
"ipahealthcheck.ipa.idns",
|
|
"IPADNSSystemRecordsCheck"
|
|
)
|
|
assert returncode == 0
|
|
for check in data:
|
|
assert check["result"] == "SUCCESS"
|
|
assert check["kw"]["key"] in SRV_RECORDS
|
|
|
|
def test_ipa_healthcheck_ds_ruv_check(self):
|
|
"""
|
|
This testcase checks that ipa-healthcheck tool with RUVCheck
|
|
discovers the same RUV entries as the ipa-replica-manage list-ruv
|
|
command
|
|
"""
|
|
result = self.master.run_command(
|
|
[
|
|
"ipa-replica-manage",
|
|
"list-ruv",
|
|
"-p",
|
|
self.master.config.dirman_password,
|
|
]
|
|
)
|
|
output = re.findall(
|
|
r"\w+.+.\w+.\w:\d+", result.stdout_text.replace("389: ", "")
|
|
)
|
|
ruvs = []
|
|
for r in output:
|
|
(host, r) = r.split(":")
|
|
if host == self.master.hostname:
|
|
ruvs.append(r)
|
|
returncode, data = run_healthcheck(
|
|
self.master, "ipahealthcheck.ds.ruv", "RUVCheck"
|
|
)
|
|
assert returncode == 0
|
|
for check in data:
|
|
assert check["result"] == "SUCCESS"
|
|
assert check["kw"]["key"] in (self.master.domain.basedn, "o=ipaca")
|
|
assert check["kw"]["ruv"] in ruvs
|
|
ruvs.remove(check["kw"]["ruv"])
|
|
assert not ruvs
|
|
|
|
def test_ipa_healthcheck_without_trust_setup(self):
|
|
"""
|
|
This testcase checks that when trust isn't setup between IPA
|
|
server and Windows AD, IPADomainCheck displays key value as
|
|
domain-check and result is SUCCESS
|
|
"""
|
|
returncode, data = run_healthcheck(
|
|
self.master,
|
|
"ipahealthcheck.ipa.trust",
|
|
"IPADomainCheck"
|
|
)
|
|
assert returncode == 0
|
|
for check in data:
|
|
assert check["result"] == "SUCCESS"
|
|
assert check["kw"]["key"] == "domain-check"
|
|
|
|
def test_ipa_healthcheck_output_indent(self):
|
|
"""
|
|
This test case checks whether default (2) indentation is applied
|
|
to output without it being implicitly stated
|
|
"""
|
|
cmd = self.master.run_command(["ipa-healthcheck",
|
|
"--source",
|
|
"ipahealthcheck.meta.services"],
|
|
raiseonerr=False)
|
|
output_str = cmd.stdout_text
|
|
output_json = json.loads(output_str)
|
|
assert output_str == "{}\n".format(json.dumps(output_json, indent=2))
|
|
|
|
@pytest.fixture
|
|
def ipactl(self):
|
|
"""Stop and start IPA during test"""
|
|
self.master.run_command(["ipactl", "stop"])
|
|
yield
|
|
self.master.run_command(["ipactl", "start"])
|
|
|
|
def test_run_with_stopped_master(self, ipactl):
|
|
"""
|
|
Test output of healthcheck where master IPA services are stopped
|
|
contains only errors regarding master being stopped and no other false
|
|
positives.
|
|
"""
|
|
returncode, output = run_healthcheck(
|
|
self.master,
|
|
output_type="human",
|
|
failures_only=True)
|
|
assert returncode == 1
|
|
errors = re.findall("ERROR: .*: not running", output)
|
|
assert len(errors) == len(output.split('\n'))
|
|
|
|
def test_ipa_healthcheck_remove(self):
|
|
"""
|
|
This testcase checks the removal of of healthcheck tool
|
|
on replica and master
|
|
"""
|
|
tasks.uninstall_packages(self.master, HEALTHCHECK_PKG)
|
|
tasks.uninstall_packages(self.replicas[0], HEALTHCHECK_PKG)
|
|
|
|
|
|
class TestIpaHealthCheckWithoutDNS(IntegrationTest):
|
|
"""
|
|
Test for ipa-healthcheck tool with IPA Master without DNS installed
|
|
"""
|
|
|
|
num_replicas = 1
|
|
|
|
@classmethod
|
|
def install(cls, mh):
|
|
tasks.uninstall_replica(cls.master, cls.replicas[0])
|
|
tasks.uninstall_master(cls.master)
|
|
tasks.install_master(cls.master, setup_dns=False)
|
|
|
|
def test_ipa_dns_systemrecords_check(self):
|
|
"""
|
|
Test checks the result of IPADNSSystemRecordsCheck
|
|
when ipa-server is configured without DNS.
|
|
"""
|
|
msg1 = "Expected SRV record missing"
|
|
msg2 = "Got {count} ipa-ca A records, expected {expected}"
|
|
tasks.install_packages(self.master, HEALTHCHECK_PKG)
|
|
returncode, data = run_healthcheck(
|
|
self.master,
|
|
"ipahealthcheck.ipa.idns",
|
|
"IPADNSSystemRecordsCheck",
|
|
)
|
|
assert returncode == 1
|
|
for check in data:
|
|
assert check["result"] == "WARNING"
|
|
assert check["kw"]["msg"] == msg1 or check["kw"]["msg"] == msg2
|
|
|
|
def test_ipa_certs_check_ipacertnsstrust(self):
|
|
"""
|
|
Test checks the output for IPACertNSSTrust when kra is installed
|
|
on the IPA system using ipa-kra-install
|
|
"""
|
|
cmd = tasks.install_kra(self.master)
|
|
assert cmd.returncode == 0
|
|
tasks.install_packages(self.master, HEALTHCHECK_PKG)
|
|
returncode, data = run_healthcheck(
|
|
self.master,
|
|
"ipahealthcheck.ipa.certs",
|
|
"IPACertNSSTrust",
|
|
)
|
|
assert returncode == 0
|
|
for check in data:
|
|
assert check["result"] == "SUCCESS"
|
|
assert (
|
|
check["kw"]["key"] in DEFAULT_PKI_CA_CERTS or
|
|
check["kw"]["key"] in DEFAULT_PKI_KRA_CERTS
|
|
)
|
|
tasks.uninstall_master(self.master)
|