Browse Source

Ticket #47553 - Automated the verification procedure

Description: Test case checks, that MODRDN operation is allowed,
             if user has ACI right '(all)' under superior entries,
             but doesn't have '(modrdn)'.

https://fedorahosted.org/389/ticket/47553

Reviewed by: [email protected] (Thanks!)

Signed-off-by: Mark Reynolds <[email protected]>
Simon Pichugin 10 years ago
parent
commit
81dcdd91c7
1 changed files with 166 additions and 0 deletions
  1. 166 0
      dirsrvtests/tickets/ticket47553_test.py

+ 166 - 0
dirsrvtests/tickets/ticket47553_test.py

@@ -0,0 +1,166 @@
+# --- BEGIN COPYRIGHT BLOCK ---
+# Copyright (C) 2015 Red Hat, Inc.
+# All rights reserved.
+#
+# License: GPL (version 3 or any later version).
+# See LICENSE for details.
+# --- END COPYRIGHT BLOCK ---
+#
+import os
+import sys
+import time
+import ldap
+import logging
+import pytest
+from lib389 import DirSrv, Entry, tools, tasks
+from lib389.tools import DirSrvTools
+from lib389._constants import *
+from lib389.properties import *
+from lib389.tasks import *
+from lib389.utils import *
+
+logging.getLogger(__name__).setLevel(logging.DEBUG)
+log = logging.getLogger(__name__)
+
+installation1_prefix = None
+
+CONTAINER_1_OU = 'test_ou_1'
+CONTAINER_2_OU = 'test_ou_2'
+CONTAINER_1 = 'ou=%s,dc=example,dc=com' % CONTAINER_1_OU
+CONTAINER_2 = 'ou=%s,dc=example,dc=com' % CONTAINER_2_OU
+USER_CN = 'test_user'
+USER_PWD = 'Secret123'
+USER = 'cn=%s,%s' % (USER_CN, CONTAINER_1)
+
+
+class TopologyStandalone(object):
+    def __init__(self, standalone):
+        standalone.open()
+        self.standalone = standalone
+
+
[email protected](scope="module")
+def topology(request):
+    global installation1_prefix
+    if installation1_prefix:
+        args_instance[SER_DEPLOYED_DIR] = installation1_prefix
+
+    # Creating standalone instance ...
+    standalone = DirSrv(verbose=False)
+    args_instance[SER_HOST] = HOST_STANDALONE
+    args_instance[SER_PORT] = PORT_STANDALONE
+    args_instance[SER_SERVERID_PROP] = SERVERID_STANDALONE
+    args_instance[SER_CREATION_SUFFIX] = DEFAULT_SUFFIX
+    args_standalone = args_instance.copy()
+    standalone.allocate(args_standalone)
+    instance_standalone = standalone.exists()
+    if instance_standalone:
+        standalone.delete()
+    standalone.create()
+    standalone.open()
+
+    # Delete each instance in the end
+    def fin():
+        standalone.delete()
+    request.addfinalizer(fin)
+
+    # Clear out the tmp dir
+    standalone.clearTmpDir(__file__)
+
+    return TopologyStandalone(standalone)
+
+
[email protected](scope="module")
+def env_setup(topology):
+    """Adds two containers, one user and two ACI rules"""
+
+    try:
+        log.info("Add a container: %s" % CONTAINER_1)
+        topology.standalone.add_s(Entry((CONTAINER_1,
+                                         {'objectclass': 'top',
+                                          'objectclass': 'organizationalunit',
+                                          'ou': CONTAINER_1_OU,
+                                          })))
+
+        log.info("Add a container: %s" % CONTAINER_2)
+        topology.standalone.add_s(Entry((CONTAINER_2,
+                                         {'objectclass': 'top',
+                                          'objectclass': 'organizationalunit',
+                                          'ou': CONTAINER_2_OU,
+                                          })))
+
+        log.info("Add a user: %s" % USER)
+        topology.standalone.add_s(Entry((USER,
+                                         {'objectclass': 'top person'.split(),
+                                          'cn': USER_CN,
+                                          'sn': USER_CN,
+                                          'userpassword': USER_PWD
+                                          })))
+    except ldap.LDAPError as e:
+        log.error('Failed to add object to database: %s' % e.message['desc'])
+        assert False
+
+    ACI_TARGET = '(targetattr="*")'
+    ACI_ALLOW = '(version 3.0; acl "All rights for %s"; allow (all) ' % USER
+    ACI_SUBJECT = 'userdn="ldap:///%s";)' % USER
+    ACI_BODY = ACI_TARGET + ACI_ALLOW + ACI_SUBJECT
+    mod = [(ldap.MOD_ADD, 'aci', ACI_BODY)]
+
+    try:
+        log.info("Add an ACI 'allow (all)' by %s to the %s" % (USER,
+                                                               CONTAINER_1))
+        topology.standalone.modify_s(CONTAINER_1, mod)
+
+        log.info("Add an ACI 'allow (all)' by %s to the %s" % (USER,
+                                                               CONTAINER_2))
+        topology.standalone.modify_s(CONTAINER_2, mod)
+    except ldap.LDAPError as e:
+        log.fatal('Failed to add ACI: error (%s)' % (e.message['desc']))
+        assert False
+
+
+def test_ticket47553(topology, env_setup):
+    """Tests, that MODRDN operation is allowed,
+    if user has ACI right '(all)' under superior entries,
+    but doesn't have '(modrdn)'
+    """
+
+    log.info("Bind as %s" % USER)
+    try:
+        topology.standalone.simple_bind_s(USER, USER_PWD)
+    except ldap.LDAPError as e:
+        log.error('Bind failed for %s, error %s' % (USER, e.message['desc']))
+        assert False
+
+    log.info("User MODRDN operation from %s to %s" % (CONTAINER_1,
+                                                      CONTAINER_2))
+    try:
+        topology.standalone.rename_s(USER, "cn=%s" % USER_CN,
+                                     newsuperior=CONTAINER_2, delold=1)
+    except ldap.LDAPError as e:
+        log.error('MODRDN failed for %s, error %s' % (USER, e.message['desc']))
+        assert False
+
+    try:
+        log.info("Check there is no user in %s" % CONTAINER_1)
+        entries = topology.standalone.search_s(CONTAINER_1,
+                                               ldap.SCOPE_ONELEVEL,
+                                               'cn=%s' % USER_CN)
+        assert not entries
+
+        log.info("Check there is our user in %s" % CONTAINER_2)
+        entries = topology.standalone.search_s(CONTAINER_2,
+                                               ldap.SCOPE_ONELEVEL,
+                                               'cn=%s' % USER_CN)
+        assert entries
+    except ldap.LDAPError as e:
+        log.fatal('Search failed, error: ' + e.message['desc'])
+        assert False
+
+
+if __name__ == '__main__':
+    # Run isolated
+    # -s for DEBUG mode
+    # -v for additional verbose
+    CURRENT_FILE = os.path.realpath(__file__)
+    pytest.main("-s -v %s" % CURRENT_FILE)