mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-28 01:41:14 -06:00
0a64e9bd70
Web UI tests were marked as tier1 tests. The tier system is intended to be used together with CI system to make sure the more complicated tests are being run only when all of the basic functionality is working. The system is using pytest's marker system. E.g. an invocation of all tier1 tests with listing will look like: $ py.test -v -m tier1 ipatests or in case of out of tree tests: $ ipa-run-tests -m tier1 Reviewed-By: Ales 'alich' Marecek <amarecek@redhat.com>
199 lines
7.4 KiB
Python
199 lines
7.4 KiB
Python
# Authors:
|
|
# Ana Krivokapic <akrivoka@redhat.com>
|
|
#
|
|
# Copyright (C) 2013 Red Hat
|
|
# see file 'COPYING' for use and warranty information
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
"""
|
|
Test integration of DNS and realmdomains.
|
|
1. dnszone_{add,del} should create/delete appropriate entry in realmdomains.
|
|
2. realmdomains_mod should add a _kerberos TXT record in the DNS zone.
|
|
"""
|
|
|
|
import six
|
|
|
|
from ipalib import api, errors
|
|
from ipalib.util import normalize_zone
|
|
from ipapython.dn import DN
|
|
from ipapython.dnsutil import DNSName
|
|
from ipatests.test_xmlrpc import objectclasses
|
|
from ipatests.test_xmlrpc.xmlrpc_test import Declarative, fuzzy_digits
|
|
import pytest
|
|
|
|
if six.PY3:
|
|
unicode = str
|
|
|
|
|
|
cn = u'Realm Domains'
|
|
dn = DN(('cn', cn), ('cn', 'ipa'), ('cn', 'etc'), api.env.basedn)
|
|
our_domain = api.env.domain
|
|
dnszone_1 = u'dnszone.test'
|
|
dnszone_1_absolute = u'%s.' % dnszone_1
|
|
dnszone_1_dn = DN(('idnsname', dnszone_1_absolute), api.env.container_dns,
|
|
api.env.basedn)
|
|
idnssoamname = u'ns1.%s.' % dnszone_1
|
|
idnssoarname = u'root.%s.' % dnszone_1
|
|
dnszone_2 = u'dnszone2.test'
|
|
dnszone_2_absolute = "%s." % dnszone_2
|
|
dnszone_2_dn = DN(('idnsname', dnszone_2_absolute), api.env.container_dns,
|
|
api.env.basedn)
|
|
|
|
self_server_ns = normalize_zone(api.env.host)
|
|
self_server_ns_dnsname = DNSName(self_server_ns)
|
|
|
|
def assert_realmdomain_and_txt_record_present(response):
|
|
zone = response['value']
|
|
if isinstance(zone, (tuple, list)):
|
|
zone = zone[0]
|
|
zone = unicode(zone)
|
|
if zone.endswith(u'.'):
|
|
#realmdomains are without end dot
|
|
zone = zone[:-1]
|
|
|
|
r = api.Command['realmdomains_show']()
|
|
assert zone in r['result']['associateddomain']
|
|
|
|
r = api.Command['dnsrecord_show'](zone, u'_kerberos')
|
|
assert api.env.realm in r['result']['txtrecord']
|
|
|
|
return True
|
|
|
|
|
|
def assert_realmdomain_and_txt_record_not_present(response):
|
|
zone = response['value']
|
|
if isinstance(zone, (tuple, list)):
|
|
zone = zone[0]
|
|
zone = unicode(zone)
|
|
if zone.endswith(u'.'):
|
|
#realmdomains are without end dot
|
|
zone = zone[:-1]
|
|
|
|
r = api.Command['realmdomains_show']()
|
|
assert zone not in r['result']['associateddomain']
|
|
|
|
try:
|
|
api.Command['dnsrecord_show'](zone, u'_kerberos')
|
|
except errors.NotFound:
|
|
return True
|
|
|
|
|
|
@pytest.mark.tier1
|
|
class test_dns_realmdomains_integration(Declarative):
|
|
cleanup_commands = [
|
|
('realmdomains_mod', [], {'associateddomain': [our_domain]}),
|
|
('dnszone_del', [dnszone_1, dnszone_2], {'continue': True}),
|
|
]
|
|
|
|
tests = [
|
|
dict(
|
|
desc='Check realmdomain and TXT record get created '
|
|
'during dnszone_add',
|
|
command=(
|
|
'dnszone_add', [dnszone_1], {
|
|
'idnssoarname': idnssoarname,
|
|
}
|
|
),
|
|
expected={
|
|
'value':DNSName(dnszone_1_absolute),
|
|
'summary': None,
|
|
'result': {
|
|
'dn': dnszone_1_dn,
|
|
'idnsname': [DNSName(dnszone_1_absolute)],
|
|
'idnszoneactive': [u'TRUE'],
|
|
'idnssoamname': [self_server_ns_dnsname],
|
|
'nsrecord': lambda x: True,
|
|
'idnssoarname': [DNSName(idnssoarname)],
|
|
'idnssoaserial': [fuzzy_digits],
|
|
'idnssoarefresh': [fuzzy_digits],
|
|
'idnssoaretry': [fuzzy_digits],
|
|
'idnssoaexpire': [fuzzy_digits],
|
|
'idnssoaminimum': [fuzzy_digits],
|
|
'idnsallowdynupdate': [u'FALSE'],
|
|
'idnsupdatepolicy': [u'grant %(realm)s krb5-self * A; '
|
|
u'grant %(realm)s krb5-self * AAAA; '
|
|
u'grant %(realm)s krb5-self * SSHFP;'
|
|
% dict(realm=api.env.realm)],
|
|
'idnsallowtransfer': [u'none;'],
|
|
'idnsallowquery': [u'any;'],
|
|
'objectclass': objectclasses.dnszone,
|
|
|
|
},
|
|
},
|
|
extra_check=assert_realmdomain_and_txt_record_present,
|
|
),
|
|
|
|
dict(
|
|
desc='Check realmdomain and TXT record do not get created '
|
|
'during dnszone_add for forwarded zone',
|
|
command=(
|
|
'dnszone_add', [dnszone_2], {
|
|
'idnssoarname': idnssoarname,
|
|
'idnsforwarders': u'1.2.3.4',
|
|
'idnsforwardpolicy': u'only',
|
|
}
|
|
),
|
|
expected={
|
|
'value': DNSName(dnszone_2_absolute),
|
|
'summary': None,
|
|
'messages': ({
|
|
u'message': u'DNS forwarder semantics changed since '
|
|
u'IPA 4.0.\nYou may want to use forward zones '
|
|
u'(dnsforwardzone-*) instead.\nFor more details read '
|
|
u'the docs.',
|
|
u'code': 13002,
|
|
u'type': u'warning',
|
|
u'name': u'ForwardersWarning'
|
|
},),
|
|
'result': {
|
|
'dn': dnszone_2_dn,
|
|
'idnsname': [DNSName(dnszone_2_absolute)],
|
|
'idnszoneactive': [u'TRUE'],
|
|
'idnssoamname': [self_server_ns_dnsname],
|
|
'idnsforwarders': [u'1.2.3.4'],
|
|
'idnsforwardpolicy': [u'only'],
|
|
'nsrecord': lambda x: True,
|
|
'idnssoarname': [DNSName(idnssoarname)],
|
|
'idnssoaserial': [fuzzy_digits],
|
|
'idnssoarefresh': [fuzzy_digits],
|
|
'idnssoaretry': [fuzzy_digits],
|
|
'idnssoaexpire': [fuzzy_digits],
|
|
'idnssoaminimum': [fuzzy_digits],
|
|
'idnsallowdynupdate': [u'FALSE'],
|
|
'idnsupdatepolicy': [u'grant %(realm)s krb5-self * A; '
|
|
u'grant %(realm)s krb5-self * AAAA; '
|
|
u'grant %(realm)s krb5-self * SSHFP;'
|
|
% dict(realm=api.env.realm)],
|
|
'idnsallowtransfer': [u'none;'],
|
|
'idnsallowquery': [u'any;'],
|
|
'objectclass': objectclasses.dnszone,
|
|
|
|
},
|
|
},
|
|
extra_check=assert_realmdomain_and_txt_record_not_present,
|
|
),
|
|
|
|
dict(
|
|
desc='Check realmdomain and TXT record get deleted '
|
|
'during dnszone_del',
|
|
command=('dnszone_del', [dnszone_1], {}),
|
|
expected={
|
|
'value': [DNSName(dnszone_1_absolute)],
|
|
'summary': u'Deleted DNS zone "%s"' % dnszone_1_absolute,
|
|
'result': {'failed': []},
|
|
},
|
|
extra_check=assert_realmdomain_and_txt_record_not_present,
|
|
),
|
|
]
|