mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-23 15:40:01 -06:00
b326b4afae
The tests must be updated to not expect the deprecation warning messages for the 'idnssoaserial' parameter. Those should (successfully) fail when 'dnszone_add' and 'dnszone_mod' commands are executed with the SOA serial parameter provided. Also, due to this SOA serial deprecation, an expected-to-fail test should be defined when a DNS zone is added (dnszone_add) and the SOA serial is passed as a parameter. Fixes: https://pagure.io/freeipa/issue/9249 Signed-off-by: Carla Martinez <carlmart@redhat.com> Reviewed-By: Florence Blanc-Renaud <flo@redhat.com> Reviewed-By: Rob Crittenden <rcritten@redhat.com> Reviewed-By: Rafael Guterres Jeffman <rjeffman@redhat.com>
202 lines
7.5 KiB
Python
202 lines
7.5 KiB
Python
# Authors:
|
|
# Ana Krivokapic <akrivoka@redhat.com>
|
|
#
|
|
# Copyright (C) 2013 Red Hat
|
|
# see file 'COPYING' for use and warranty information
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
"""
|
|
Test integration of DNS and realmdomains.
|
|
1. dnszone_{add,del} should create/delete appropriate entry in realmdomains.
|
|
2. realmdomains_mod should add a _kerberos TXT record in the DNS zone.
|
|
"""
|
|
|
|
import six
|
|
|
|
from ipalib import api, errors
|
|
from ipalib.util import normalize_zone
|
|
from ipapython.dn import DN
|
|
from ipapython.dnsutil import DNSName
|
|
from ipatests.test_xmlrpc import objectclasses
|
|
from ipatests.test_xmlrpc.xmlrpc_test import Declarative, fuzzy_digits
|
|
import pytest
|
|
|
|
if six.PY3:
|
|
unicode = str
|
|
|
|
|
|
cn = u'Realm Domains'
|
|
dn = DN(('cn', cn), ('cn', 'ipa'), ('cn', 'etc'), api.env.basedn)
|
|
our_domain = api.env.domain
|
|
dnszone_1 = u'dnszone.test'
|
|
dnszone_1_absolute = u'%s.' % dnszone_1
|
|
dnszone_1_dn = DN(('idnsname', dnszone_1_absolute), api.env.container_dns,
|
|
api.env.basedn)
|
|
idnssoamname = u'ns1.%s.' % dnszone_1
|
|
idnssoarname = u'root.%s.' % dnszone_1
|
|
dnszone_2 = u'dnszone2.test'
|
|
dnszone_2_absolute = "%s." % dnszone_2
|
|
dnszone_2_dn = DN(('idnsname', dnszone_2_absolute), api.env.container_dns,
|
|
api.env.basedn)
|
|
|
|
self_server_ns = normalize_zone(api.env.host)
|
|
self_server_ns_dnsname = DNSName(self_server_ns)
|
|
|
|
def assert_realmdomain_and_txt_record_present(response):
|
|
zone = response['value']
|
|
if isinstance(zone, (tuple, list)):
|
|
zone = zone[0]
|
|
zone = unicode(zone)
|
|
if zone.endswith(u'.'):
|
|
#realmdomains are without end dot
|
|
zone = zone[:-1]
|
|
|
|
r = api.Command['realmdomains_show']()
|
|
assert zone in r['result']['associateddomain']
|
|
|
|
r = api.Command['dnsrecord_show'](zone, u'_kerberos')
|
|
assert api.env.realm in r['result']['txtrecord']
|
|
|
|
return True
|
|
|
|
|
|
def assert_realmdomain_and_txt_record_not_present(response):
|
|
zone = response['value']
|
|
if isinstance(zone, (tuple, list)):
|
|
zone = zone[0]
|
|
zone = unicode(zone)
|
|
if zone.endswith(u'.'):
|
|
#realmdomains are without end dot
|
|
zone = zone[:-1]
|
|
|
|
r = api.Command['realmdomains_show']()
|
|
assert zone not in r['result']['associateddomain']
|
|
|
|
try:
|
|
api.Command['dnsrecord_show'](zone, u'_kerberos')
|
|
except errors.NotFound:
|
|
return True
|
|
else:
|
|
return False
|
|
|
|
|
|
@pytest.mark.tier1
|
|
class test_dns_realmdomains_integration(Declarative):
|
|
cleanup_commands = [
|
|
('realmdomains_mod', [], {'associateddomain': [our_domain]}),
|
|
('dnszone_del', [dnszone_1, dnszone_2], {'continue': True}),
|
|
]
|
|
|
|
tests = [
|
|
dict(
|
|
desc='Check realmdomain and TXT record get created '
|
|
'during dnszone_add',
|
|
command=(
|
|
'dnszone_add', [dnszone_1], {
|
|
'idnssoarname': idnssoarname,
|
|
}
|
|
),
|
|
expected={
|
|
'value':DNSName(dnszone_1_absolute),
|
|
'summary': None,
|
|
'result': {
|
|
'dn': dnszone_1_dn,
|
|
'idnsname': [DNSName(dnszone_1_absolute)],
|
|
'idnszoneactive': [True],
|
|
'idnssoamname': [self_server_ns_dnsname],
|
|
'nsrecord': lambda x: True,
|
|
'idnssoarname': [DNSName(idnssoarname)],
|
|
'idnssoaserial': [fuzzy_digits],
|
|
'idnssoarefresh': [fuzzy_digits],
|
|
'idnssoaretry': [fuzzy_digits],
|
|
'idnssoaexpire': [fuzzy_digits],
|
|
'idnssoaminimum': [fuzzy_digits],
|
|
'idnsallowdynupdate': [False],
|
|
'idnsupdatepolicy': [u'grant %(realm)s krb5-self * A; '
|
|
u'grant %(realm)s krb5-self * AAAA; '
|
|
u'grant %(realm)s krb5-self * SSHFP;'
|
|
% dict(realm=api.env.realm)],
|
|
'idnsallowtransfer': [u'none;'],
|
|
'idnsallowquery': [u'any;'],
|
|
'objectclass': objectclasses.dnszone,
|
|
},
|
|
},
|
|
extra_check=assert_realmdomain_and_txt_record_present,
|
|
),
|
|
|
|
dict(
|
|
desc='Check realmdomain and TXT record gets created '
|
|
'during dnszone_add for master zone with a forwarder',
|
|
command=(
|
|
'dnszone_add', [dnszone_2], {
|
|
'idnssoarname': idnssoarname,
|
|
'idnsforwarders': u'198.18.19.20',
|
|
'idnsforwardpolicy': u'only',
|
|
}
|
|
),
|
|
expected={
|
|
'value': DNSName(dnszone_2_absolute),
|
|
'summary': None,
|
|
'messages': (
|
|
{
|
|
u'message': u'DNS forwarder semantics changed since '
|
|
u'IPA 4.0.\nYou may want to use forward zones '
|
|
u'(dnsforwardzone-*) instead.\nFor more details read '
|
|
u'the docs.',
|
|
u'code': 13002,
|
|
u'type': u'warning',
|
|
u'name': u'ForwardersWarning',
|
|
u'data': {}
|
|
},),
|
|
'result': {
|
|
'dn': dnszone_2_dn,
|
|
'idnsname': [DNSName(dnszone_2_absolute)],
|
|
'idnszoneactive': [True],
|
|
'idnssoamname': [self_server_ns_dnsname],
|
|
'idnsforwarders': [u'198.18.19.20'],
|
|
'idnsforwardpolicy': [u'only'],
|
|
'nsrecord': lambda x: True,
|
|
'idnssoarname': [DNSName(idnssoarname)],
|
|
'idnssoaserial': [fuzzy_digits],
|
|
'idnssoarefresh': [fuzzy_digits],
|
|
'idnssoaretry': [fuzzy_digits],
|
|
'idnssoaexpire': [fuzzy_digits],
|
|
'idnssoaminimum': [fuzzy_digits],
|
|
'idnsallowdynupdate': [False],
|
|
'idnsupdatepolicy': [u'grant %(realm)s krb5-self * A; '
|
|
u'grant %(realm)s krb5-self * AAAA; '
|
|
u'grant %(realm)s krb5-self * SSHFP;'
|
|
% dict(realm=api.env.realm)],
|
|
'idnsallowtransfer': [u'none;'],
|
|
'idnsallowquery': [u'any;'],
|
|
'objectclass': objectclasses.dnszone,
|
|
|
|
},
|
|
},
|
|
extra_check=assert_realmdomain_and_txt_record_present,
|
|
),
|
|
|
|
dict(
|
|
desc='Check realmdomain and TXT record get deleted '
|
|
'during dnszone_del',
|
|
command=('dnszone_del', [dnszone_1], {}),
|
|
expected={
|
|
'value': [DNSName(dnszone_1_absolute)],
|
|
'summary': u'Deleted DNS zone "%s"' % dnszone_1_absolute,
|
|
'result': {'failed': []},
|
|
},
|
|
extra_check=assert_realmdomain_and_txt_record_not_present,
|
|
),
|
|
]
|