浏览代码

Ticket 47714 - CI test: add test case for ticket 47713

Description: [RFE] Update lastLoginTime also in Account Policy
plugin if account lockout is based on passwordExpirationTime.

Test Description:
1) Check this change has no inpact to the existing functionality.
1-1. Set account policy config without the new attr alwaysRecordLoginAttr
1-2. Bind as a test user
1-3. Bind as the test user again and check the lastLoginTime is updated
1-4. Waint longer than the accountInactivityLimit time and bind as the
     test user, which should fail with CONSTANT_VIOLATION.
2) Verify a new config attr alwaysRecordLoginAttr
2-1. Set account policy config with the new attr alwaysRecordLoginAttr:
     lastLoginTime
     Note: bogus attr is set to stateattrname.
     altstateattrname type value is used for checking whether the account
     is idle or not.
2-2. Bind as a test user
2-3. Bind as the test user again and check the alwaysRecordLoginAttr:
     lastLoginTime is updated

https://fedorahosted.org/389/ticket/47714

Reviewded by [email protected] (Thanks, Mark!!)
Noriko Hosoi 11 年之前
父节点
当前提交
39b6a18b4c
共有 1 个文件被更改,包括 327 次插入0 次删除
  1. 327 0
      dirsrvtests/tickets/ticket47714_test.py

+ 327 - 0
dirsrvtests/tickets/ticket47714_test.py

@@ -0,0 +1,327 @@
+import os
+import sys
+import time
+import ldap
+import logging
+import socket
+import pytest
+import shutil
+from lib389 import DirSrv, Entry, tools
+from lib389.tools import DirSrvTools
+from lib389._constants import *
+from lib389.properties import *
+from constants import *
+
+log = logging.getLogger(__name__)
+
+installation_prefix = None
+
+ACCT_POLICY_CONFIG_DN = 'cn=config,cn=%s,cn=plugins,cn=config' % PLUGIN_ACCT_POLICY 
+ACCT_POLICY_DN = 'cn=Account Inactivation Pplicy,%s' % SUFFIX
+INACTIVITY_LIMIT = '9'
+SEARCHFILTER = '(objectclass=*)'
+
+TEST_USER = 'ticket47714user'
+TEST_USER_DN = 'uid=%s,%s' % (TEST_USER, SUFFIX)
+TEST_USER_PW = '%s' % TEST_USER
+
+class TopologyStandalone(object):
+    def __init__(self, standalone):
+        standalone.open()
+        self.standalone = standalone
+
+
[email protected](scope="module")
+def topology(request):
+    '''
+        This fixture is used to standalone topology for the 'module'.
+        At the beginning, It may exists a standalone instance.
+        It may also exists a backup for the standalone instance.
+
+        Principle:
+            If standalone instance exists:
+                restart it
+            If backup of standalone exists:
+                create/rebind to standalone
+
+                restore standalone instance from backup
+            else:
+                Cleanup everything
+                    remove instance
+                    remove backup
+                Create instance
+                Create backup
+    '''
+    global installation_prefix
+
+    if installation_prefix:
+        args_instance[SER_DEPLOYED_DIR] = installation_prefix
+
+    standalone = DirSrv(verbose=False)
+
+    # Args for the standalone instance
+    args_instance[SER_HOST] = HOST_STANDALONE
+    args_instance[SER_PORT] = PORT_STANDALONE
+    args_instance[SER_SERVERID_PROP] = SERVERID_STANDALONE
+    args_standalone = args_instance.copy()
+    standalone.allocate(args_standalone)
+
+    # Get the status of the backups
+    backup_standalone = standalone.checkBackupFS()
+
+    # Get the status of the instance and restart it if it exists
+    instance_standalone = standalone.exists()
+    if instance_standalone:
+        # assuming the instance is already stopped, just wait 5 sec max
+        standalone.stop(timeout=5)
+        try:
+            standalone.start(timeout=10)
+        except ldap.SERVER_DOWN:
+            pass
+
+    if backup_standalone:
+        # The backup exist, assuming it is correct
+        # we just re-init the instance with it
+        if not instance_standalone:
+            standalone.create()
+            # Used to retrieve configuration information (dbdir, confdir...)
+            standalone.open()
+
+        # restore standalone instance from backup
+        standalone.stop(timeout=10)
+        standalone.restoreFS(backup_standalone)
+        standalone.start(timeout=10)
+
+    else:
+        # We should be here only in two conditions
+        #      - This is the first time a test involve standalone instance
+        #      - Something weird happened (instance/backup destroyed)
+        #        so we discard everything and recreate all
+
+        # Remove the backup. So even if we have a specific backup file
+        # (e.g backup_standalone) we clear backup that an instance may have created
+        if backup_standalone:
+            standalone.clearBackupFS()
+
+        # Remove the instance
+        if instance_standalone:
+            standalone.delete()
+
+        # Create the instance
+        standalone.create()
+
+        # Used to retrieve configuration information (dbdir, confdir...)
+        standalone.open()
+
+        # Time to create the backups
+        standalone.stop(timeout=10)
+        standalone.backupfile = standalone.backupFS()
+        standalone.start(timeout=10)
+
+    # clear the tmp directory
+    standalone.clearTmpDir(__file__)
+
+    #
+    # Here we have standalone instance up and running
+    # Either coming from a backup recovery
+    # or from a fresh (re)init
+    # Time to return the topology
+    return TopologyStandalone(standalone)
+
+def _header(topology, label):
+    topology.standalone.log.info("\n\n###############################################")
+    topology.standalone.log.info("#######")
+    topology.standalone.log.info("####### %s" % label)
+    topology.standalone.log.info("#######")
+    topology.standalone.log.info("###############################################")
+
+def _uniqueness_config_entry(topology, name=None):
+    if not name:
+        return None
+    
+    ent = topology.standalone.getEntry("cn=%s,%s" % (PLUGIN_ATTR_UNIQUENESS, DN_PLUGIN), ldap.SCOPE_BASE, 
+                                    "(objectclass=nsSlapdPlugin)",
+                                    ['objectClass', 'cn', 'nsslapd-pluginPath', 'nsslapd-pluginInitfunc',
+                                     'nsslapd-pluginType', 'nsslapd-pluginEnabled', 'nsslapd-plugin-depends-on-type',
+                                     'nsslapd-pluginId', 'nsslapd-pluginVersion', 'nsslapd-pluginVendor',
+                                     'nsslapd-pluginDescription'])
+    ent.dn = "cn=%s uniqueness,%s" % (name, DN_PLUGIN)
+    return ent
+
+def test_ticket47714_init(topology):
+    """
+    1. Add account policy entry to the DB    
+    2. Add a test user to the DB
+    """
+    _header(topology, 'Testing Ticket 47714 - [RFE] Update lastLoginTime also in Account Policy plugin if account lockout is based on passwordExpirationTime.')
+
+    topology.standalone.simple_bind_s(DN_DM, PASSWORD)
+
+    log.info("\n######################### Adding Account Policy entry: %s ######################\n" % ACCT_POLICY_DN)
+    topology.standalone.add_s(Entry((ACCT_POLICY_DN, {'objectclass': "top ldapsubentry extensibleObject accountpolicy".split(),
+                                                      'accountInactivityLimit': INACTIVITY_LIMIT})))
+
+    log.info("\n######################### Adding Test User entry: %s ######################\n" % TEST_USER_DN)
+    topology.standalone.add_s(Entry((TEST_USER_DN, {'objectclass': "top person organizationalPerson inetOrgPerson".split(),
+                                                    'cn': TEST_USER,
+                                                    'sn': TEST_USER,
+                                                    'givenname': TEST_USER,
+                                                    'userPassword': TEST_USER_PW,
+                                                    'acctPolicySubentry': ACCT_POLICY_DN})))
+
+    log.info("\n######################### Adding cos entry ######################\n")
+
+def test_ticket47714_run_0(topology):
+    """
+    Check this change has no inpact to the existing functionality.
+    1. Set account policy config without the new attr alwaysRecordLoginAttr
+    2. Bind as a test user
+    3. Bind as the test user again and check the lastLoginTime is updated
+    4. Waint longer than the accountInactivityLimit time and bind as the test user,
+       which should fail with CONSTANT_VIOLATION.
+    """
+    _header(topology, 'Account Policy - No new attr alwaysRecordLoginAttr in config')
+
+    topology.standalone.simple_bind_s(DN_DM, PASSWORD)
+
+    # Modify Account Policy config entry
+    topology.standalone.modify_s(ACCT_POLICY_CONFIG_DN, [(ldap.MOD_REPLACE, 'alwaysrecordlogin', 'yes'),
+                                                         (ldap.MOD_REPLACE, 'stateattrname', 'lastLoginTime'),
+                                                         (ldap.MOD_REPLACE, 'altstateattrname', 'createTimestamp'),
+                                                         (ldap.MOD_REPLACE, 'specattrname', 'acctPolicySubentry'),
+                                                         (ldap.MOD_REPLACE, 'limitattrname', 'accountInactivityLimit')])
+
+    # Enable the plugins
+    topology.standalone.plugins.enable(name=PLUGIN_ACCT_POLICY)
+
+    topology.standalone.restart(timeout=120)
+
+    log.info("\n######################### Bind as %s ######################\n" % TEST_USER_DN)
+    try:
+        topology.standalone.simple_bind_s(TEST_USER_DN, TEST_USER_PW)
+    except ldap.CONSTRAINT_VIOLATION, e:
+        log.error('CONSTRAINT VIOLATION ' + e.message['desc'])
+
+    topology.standalone.simple_bind_s(DN_DM, PASSWORD)
+    entry = topology.standalone.search_s(TEST_USER_DN, ldap.SCOPE_BASE, SEARCHFILTER, ['lastLoginTime'])
+
+    lastLoginTime0 = entry[0].lastLoginTime
+
+    time.sleep(2)
+
+    log.info("\n######################### Bind as %s again ######################\n" % TEST_USER_DN)
+    try:
+        topology.standalone.simple_bind_s(TEST_USER_DN, TEST_USER_PW)
+    except ldap.CONSTRAINT_VIOLATION, e:
+        log.error('CONSTRAINT VIOLATION ' + e.message['desc'])
+
+    topology.standalone.simple_bind_s(DN_DM, PASSWORD)
+    entry = topology.standalone.search_s(TEST_USER_DN, ldap.SCOPE_BASE, SEARCHFILTER, ['lastLoginTime'])
+
+    lastLoginTime1 = entry[0].lastLoginTime
+
+    log.info("First lastLoginTime: %s, Second lastLoginTime: %s" % (lastLoginTime0, lastLoginTime1))
+    assert lastLoginTime0 < lastLoginTime1
+
+    topology.standalone.simple_bind_s(DN_DM, PASSWORD)
+    entry = topology.standalone.search_s(ACCT_POLICY_DN, ldap.SCOPE_BASE, SEARCHFILTER)
+    log.info("\n######################### %s ######################\n" % ACCT_POLICY_CONFIG_DN)
+    log.info("accountInactivityLimit: %s" % entry[0].accountInactivityLimit)
+    log.info("\n######################### %s DONE ######################\n" % ACCT_POLICY_CONFIG_DN)
+
+    time.sleep(10)
+
+    log.info("\n######################### Bind as %s again to fail ######################\n" % TEST_USER_DN)
+    try:
+        topology.standalone.simple_bind_s(TEST_USER_DN, TEST_USER_PW)
+    except ldap.CONSTRAINT_VIOLATION, e:
+        log.info('CONSTRAINT VIOLATION ' + e.message['desc'])
+        log.info("%s was successfully inactivated." % TEST_USER_DN)
+        pass
+
+def test_ticket47714_run_1(topology):
+    """
+    Verify a new config attr alwaysRecordLoginAttr
+    1. Set account policy config with the new attr alwaysRecordLoginAttr: lastLoginTime
+       Note: bogus attr is set to stateattrname.
+             altstateattrname type value is used for checking whether the account is idle or not.
+    2. Bind as a test user
+    3. Bind as the test user again and check the alwaysRecordLoginAttr: lastLoginTime is updated
+    """
+    _header(topology, 'Account Policy - With new attr alwaysRecordLoginAttr in config')
+
+    topology.standalone.simple_bind_s(DN_DM, PASSWORD)
+    topology.standalone.modify_s(TEST_USER_DN, [(ldap.MOD_DELETE, 'lastLoginTime', None)])
+
+    # Modify Account Policy config entry
+    topology.standalone.modify_s(ACCT_POLICY_CONFIG_DN, [(ldap.MOD_REPLACE, 'alwaysrecordlogin', 'yes'),
+                                                         (ldap.MOD_REPLACE, 'stateattrname', 'bogus'),
+                                                         (ldap.MOD_REPLACE, 'altstateattrname', 'modifyTimestamp'),
+                                                         (ldap.MOD_REPLACE, 'alwaysRecordLoginAttr', 'lastLoginTime'),
+                                                         (ldap.MOD_REPLACE, 'specattrname', 'acctPolicySubentry'),
+                                                         (ldap.MOD_REPLACE, 'limitattrname', 'accountInactivityLimit')])
+
+    # Enable the plugins
+    topology.standalone.plugins.enable(name=PLUGIN_ACCT_POLICY)
+
+    topology.standalone.restart(timeout=120)
+
+    log.info("\n######################### Bind as %s ######################\n" % TEST_USER_DN)
+    try:
+        topology.standalone.simple_bind_s(TEST_USER_DN, TEST_USER_PW)
+    except ldap.CONSTRAINT_VIOLATION, e:
+        log.error('CONSTRAINT VIOLATION ' + e.message['desc'])
+
+    topology.standalone.simple_bind_s(DN_DM, PASSWORD)
+    entry = topology.standalone.search_s(TEST_USER_DN, ldap.SCOPE_BASE, SEARCHFILTER, ['lastLoginTime'])
+
+    lastLoginTime0 = entry[0].lastLoginTime
+
+    time.sleep(2)
+
+    log.info("\n######################### Bind as %s again ######################\n" % TEST_USER_DN)
+    try:
+        topology.standalone.simple_bind_s(TEST_USER_DN, TEST_USER_PW)
+    except ldap.CONSTRAINT_VIOLATION, e:
+        log.error('CONSTRAINT VIOLATION ' + e.message['desc'])
+
+    topology.standalone.simple_bind_s(DN_DM, PASSWORD)
+    entry = topology.standalone.search_s(TEST_USER_DN, ldap.SCOPE_BASE, SEARCHFILTER, ['lastLoginTime'])
+
+    lastLoginTime1 = entry[0].lastLoginTime
+
+    log.info("First lastLoginTime: %s, Second lastLoginTime: %s" % (lastLoginTime0, lastLoginTime1))
+    assert lastLoginTime0 < lastLoginTime1
+
+    topology.standalone.log.info("ticket47714 was successfully verified.");
+
+def test_ticket47714_final(topology):
+    log.info("\n######################### Adding Account Policy entry: %s ######################\n" % ACCT_POLICY_DN)
+    # Enabled the plugins
+    topology.standalone.simple_bind_s(DN_DM, PASSWORD)
+    topology.standalone.plugins.disable(name=PLUGIN_ACCT_POLICY)
+    topology.standalone.stop(timeout=10)
+
+def run_isolated():
+    '''
+        run_isolated is used to run these test cases independently of a test scheduler (xunit, py.test..)
+        To run isolated without py.test, you need to
+            - edit this file and comment '@pytest.fixture' line before 'topology' function.
+            - set the installation prefix
+            - run this program
+    '''
+    global installation_prefix
+    installation_prefix = None
+
+    topo = topology(True)
+    test_ticket47714_init(topo)
+    
+    test_ticket47714_run_0(topo)
+
+    test_ticket47714_run_1(topo)
+    
+    test_ticket47714_final(topo)
+    
+
+if __name__ == '__main__':
+    run_isolated()