mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-26 17:01:14 -06:00
fec66942d4
Even though Pytest supports xunit style setups, unittest and nose tests, this support is limited and may be dropped in the future releases. Worst of all is that the mixing of various test frameworks results in weird conflicts and of course, is not widely tested. This is a part of work to remove the mixing of test idioms in the IPA's test suite: 1) replace unittest.TestCase subclasses 2) replace unittest test controls (SkipTest, fail, etc.) 3) replace unittest assertions Related: https://pagure.io/freeipa/issue/7989 Signed-off-by: Stanislav Levin <slev@altlinux.org> Reviewed-By: Christian Heimes <cheimes@redhat.com>
111 lines
4.0 KiB
Python
111 lines
4.0 KiB
Python
# Authors:
|
|
# Martin Kosek <mkosek@redhat.com>
|
|
#
|
|
# Copyright (C) 2012 Red Hat
|
|
# see file 'COPYING' for use and warranty information
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
import pytest
|
|
|
|
from ipatests.test_ipaserver.httptest import Unauthorized_HTTP_test
|
|
from ipatests.test_xmlrpc.xmlrpc_test import XMLRPC_test
|
|
from ipatests.util import assert_equal
|
|
from ipalib import api, errors
|
|
from ipapython.dn import DN
|
|
from ipapython.ipaldap import ldap_initialize
|
|
|
|
testuser = u'tuser'
|
|
old_password = u'old_password'
|
|
new_password = u'new_password'
|
|
|
|
|
|
@pytest.mark.tier1
|
|
class test_changepw(XMLRPC_test, Unauthorized_HTTP_test):
|
|
app_uri = '/ipa/session/change_password'
|
|
|
|
@pytest.fixture(autouse=True)
|
|
def changepw_setup(self, request):
|
|
try:
|
|
api.Command['user_add'](uid=testuser, givenname=u'Test', sn=u'User')
|
|
api.Command['passwd'](testuser, password=u'old_password')
|
|
except errors.ExecutionError as e:
|
|
pytest.skip(
|
|
'Cannot set up test user: %s' % e
|
|
)
|
|
|
|
def fin():
|
|
try:
|
|
api.Command['user_del']([testuser])
|
|
except errors.NotFound:
|
|
pass
|
|
|
|
request.addfinalizer(fin)
|
|
|
|
def _changepw(self, user, old_password, new_password):
|
|
return self.send_request(params={'user': str(user),
|
|
'old_password' : str(old_password),
|
|
'new_password' : str(new_password)},
|
|
)
|
|
|
|
def _checkpw(self, user, password):
|
|
dn = str(DN(('uid', user), api.env.container_user, api.env.basedn))
|
|
conn = ldap_initialize(api.env.ldap_uri)
|
|
try:
|
|
conn.simple_bind_s(dn, password)
|
|
finally:
|
|
conn.unbind_s()
|
|
|
|
def test_bad_options(self):
|
|
for params in (None, # no params
|
|
{'user': 'foo'}, # missing options
|
|
{'user': 'foo',
|
|
'old_password' : 'old'}, # missing option
|
|
{'user': 'foo',
|
|
'old_password' : 'old',
|
|
'new_password' : ''}, # empty option
|
|
):
|
|
response = self.send_request(params=params)
|
|
assert_equal(response.status, 400)
|
|
assert_equal(response.reason, 'Bad Request')
|
|
|
|
def test_invalid_auth(self):
|
|
response = self._changepw(testuser, 'wrongpassword', 'new_password')
|
|
|
|
assert_equal(response.status, 200)
|
|
assert_equal(response.getheader('X-IPA-Pwchange-Result'), 'invalid-password')
|
|
|
|
# make sure that password is NOT changed
|
|
self._checkpw(testuser, old_password)
|
|
|
|
def test_pwpolicy_error(self):
|
|
response = self._changepw(testuser, old_password, '1')
|
|
|
|
assert_equal(response.status, 200)
|
|
assert_equal(response.getheader('X-IPA-Pwchange-Result'), 'policy-error')
|
|
assert_equal(response.getheader('X-IPA-Pwchange-Policy-Error'),
|
|
'Constraint violation: Password is too short')
|
|
|
|
# make sure that password is NOT changed
|
|
self._checkpw(testuser, old_password)
|
|
|
|
def test_pwpolicy_success(self):
|
|
response = self._changepw(testuser, old_password, new_password)
|
|
|
|
assert_equal(response.status, 200)
|
|
assert_equal(response.getheader('X-IPA-Pwchange-Result'), 'ok')
|
|
|
|
# make sure that password IS changed
|
|
self._checkpw(testuser, new_password)
|