ticket47653MMR_test.py 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335
  1. # --- BEGIN COPYRIGHT BLOCK ---
  2. # Copyright (C) 2016 Red Hat, Inc.
  3. # All rights reserved.
  4. #
  5. # License: GPL (version 3 or any later version).
  6. # See LICENSE for details.
  7. # --- END COPYRIGHT BLOCK ---
  8. #
  9. '''
  10. Created on Nov 7, 2013
  11. @author: tbordaz
  12. '''
  13. import logging
  14. import time
  15. import ldap
  16. import pytest
  17. from lib389 import Entry
  18. from lib389._constants import *
  19. from lib389.topologies import topology_m2
  20. logging.getLogger(__name__).setLevel(logging.DEBUG)
  21. log = logging.getLogger(__name__)
  22. TEST_REPL_DN = "cn=test_repl, %s" % SUFFIX
  23. OC_NAME = 'OCticket47653'
  24. MUST = "(postalAddress $ postalCode)"
  25. MAY = "(member $ street)"
  26. OTHER_NAME = 'other_entry'
  27. MAX_OTHERS = 10
  28. BIND_NAME = 'bind_entry'
  29. BIND_DN = 'cn=%s, %s' % (BIND_NAME, SUFFIX)
  30. BIND_PW = 'password'
  31. ENTRY_NAME = 'test_entry'
  32. ENTRY_DN = 'cn=%s, %s' % (ENTRY_NAME, SUFFIX)
  33. ENTRY_OC = "top person %s" % OC_NAME
  34. def _oc_definition(oid_ext, name, must=None, may=None):
  35. oid = "1.2.3.4.5.6.7.8.9.10.%d" % oid_ext
  36. desc = 'To test ticket 47490'
  37. sup = 'person'
  38. if not must:
  39. must = MUST
  40. if not may:
  41. may = MAY
  42. new_oc = "( %s NAME '%s' DESC '%s' SUP %s AUXILIARY MUST %s MAY %s )" % (oid, name, desc, sup, must, may)
  43. return new_oc
  44. def test_ticket47653_init(topology_m2):
  45. """
  46. It adds
  47. - Objectclass with MAY 'member'
  48. - an entry ('bind_entry') with which we bind to test the 'SELFDN' operation
  49. It deletes the anonymous aci
  50. """
  51. topology_m2.ms["master1"].log.info("Add %s that allows 'member' attribute" % OC_NAME)
  52. new_oc = _oc_definition(2, OC_NAME, must=MUST, may=MAY)
  53. topology_m2.ms["master1"].schema.add_schema('objectClasses', new_oc)
  54. # entry used to bind with
  55. topology_m2.ms["master1"].log.info("Add %s" % BIND_DN)
  56. topology_m2.ms["master1"].add_s(Entry((BIND_DN, {
  57. 'objectclass': "top person".split(),
  58. 'sn': BIND_NAME,
  59. 'cn': BIND_NAME,
  60. 'userpassword': BIND_PW})))
  61. # enable acl error logging
  62. mod = [(ldap.MOD_REPLACE, 'nsslapd-errorlog-level', str(128 + 8192))] # ACL + REPL
  63. topology_m2.ms["master1"].modify_s(DN_CONFIG, mod)
  64. topology_m2.ms["master2"].modify_s(DN_CONFIG, mod)
  65. # remove all aci's and start with a clean slate
  66. mod = [(ldap.MOD_DELETE, 'aci', None)]
  67. topology_m2.ms["master1"].modify_s(SUFFIX, mod)
  68. topology_m2.ms["master2"].modify_s(SUFFIX, mod)
  69. # add dummy entries
  70. for cpt in range(MAX_OTHERS):
  71. name = "%s%d" % (OTHER_NAME, cpt)
  72. topology_m2.ms["master1"].add_s(Entry(("cn=%s,%s" % (name, SUFFIX), {
  73. 'objectclass': "top person".split(),
  74. 'sn': name,
  75. 'cn': name})))
  76. def test_ticket47653_add(topology_m2):
  77. '''
  78. This test ADD an entry on MASTER1 where 47653 is fixed. Then it checks that entry is replicated
  79. on MASTER2 (even if on MASTER2 47653 is NOT fixed). Then update on MASTER2 and check the update on MASTER1
  80. It checks that, bound as bind_entry,
  81. - we can not ADD an entry without the proper SELFDN aci.
  82. - with the proper ACI we can not ADD with 'member' attribute
  83. - with the proper ACI and 'member' it succeeds to ADD
  84. '''
  85. topology_m2.ms["master1"].log.info("\n\n######################### ADD ######################\n")
  86. # bind as bind_entry
  87. topology_m2.ms["master1"].log.info("Bind as %s" % BIND_DN)
  88. topology_m2.ms["master1"].simple_bind_s(BIND_DN, BIND_PW)
  89. # Prepare the entry with multivalued members
  90. entry_with_members = Entry(ENTRY_DN)
  91. entry_with_members.setValues('objectclass', 'top', 'person', 'OCticket47653')
  92. entry_with_members.setValues('sn', ENTRY_NAME)
  93. entry_with_members.setValues('cn', ENTRY_NAME)
  94. entry_with_members.setValues('postalAddress', 'here')
  95. entry_with_members.setValues('postalCode', '1234')
  96. members = []
  97. for cpt in range(MAX_OTHERS):
  98. name = "%s%d" % (OTHER_NAME, cpt)
  99. members.append("cn=%s,%s" % (name, SUFFIX))
  100. members.append(BIND_DN)
  101. entry_with_members.setValues('member', members)
  102. # Prepare the entry with only one member value
  103. entry_with_member = Entry(ENTRY_DN)
  104. entry_with_member.setValues('objectclass', 'top', 'person', 'OCticket47653')
  105. entry_with_member.setValues('sn', ENTRY_NAME)
  106. entry_with_member.setValues('cn', ENTRY_NAME)
  107. entry_with_member.setValues('postalAddress', 'here')
  108. entry_with_member.setValues('postalCode', '1234')
  109. member = []
  110. member.append(BIND_DN)
  111. entry_with_member.setValues('member', member)
  112. # entry to add WITH member being BIND_DN but WITHOUT the ACI -> ldap.INSUFFICIENT_ACCESS
  113. try:
  114. topology_m2.ms["master1"].log.info("Try to add Add %s (aci is missing): %r" % (ENTRY_DN, entry_with_member))
  115. topology_m2.ms["master1"].add_s(entry_with_member)
  116. except Exception as e:
  117. topology_m2.ms["master1"].log.info("Exception (expected): %s" % type(e).__name__)
  118. assert isinstance(e, ldap.INSUFFICIENT_ACCESS)
  119. # Ok Now add the proper ACI
  120. topology_m2.ms["master1"].log.info("Bind as %s and add the ADD SELFDN aci" % DN_DM)
  121. topology_m2.ms["master1"].simple_bind_s(DN_DM, PASSWORD)
  122. ACI_TARGET = "(target = \"ldap:///cn=*,%s\")" % SUFFIX
  123. ACI_TARGETFILTER = "(targetfilter =\"(objectClass=%s)\")" % OC_NAME
  124. ACI_ALLOW = "(version 3.0; acl \"SelfDN add\"; allow (add)"
  125. ACI_SUBJECT = " userattr = \"member#selfDN\";)"
  126. ACI_BODY = ACI_TARGET + ACI_TARGETFILTER + ACI_ALLOW + ACI_SUBJECT
  127. mod = [(ldap.MOD_ADD, 'aci', ACI_BODY)]
  128. topology_m2.ms["master1"].modify_s(SUFFIX, mod)
  129. time.sleep(1)
  130. # bind as bind_entry
  131. topology_m2.ms["master1"].log.info("Bind as %s" % BIND_DN)
  132. topology_m2.ms["master1"].simple_bind_s(BIND_DN, BIND_PW)
  133. # entry to add WITHOUT member and WITH the ACI -> ldap.INSUFFICIENT_ACCESS
  134. try:
  135. topology_m2.ms["master1"].log.info("Try to add Add %s (member is missing)" % ENTRY_DN)
  136. topology_m2.ms["master1"].add_s(Entry((ENTRY_DN, {
  137. 'objectclass': ENTRY_OC.split(),
  138. 'sn': ENTRY_NAME,
  139. 'cn': ENTRY_NAME,
  140. 'postalAddress': 'here',
  141. 'postalCode': '1234'})))
  142. except Exception as e:
  143. topology_m2.ms["master1"].log.info("Exception (expected): %s" % type(e).__name__)
  144. assert isinstance(e, ldap.INSUFFICIENT_ACCESS)
  145. # entry to add WITH memberS and WITH the ACI -> ldap.INSUFFICIENT_ACCESS
  146. # member should contain only one value
  147. try:
  148. topology_m2.ms["master1"].log.info("Try to add Add %s (with several member values)" % ENTRY_DN)
  149. topology_m2.ms["master1"].add_s(entry_with_members)
  150. except Exception as e:
  151. topology_m2.ms["master1"].log.info("Exception (expected): %s" % type(e).__name__)
  152. assert isinstance(e, ldap.INSUFFICIENT_ACCESS)
  153. topology_m2.ms["master1"].log.info("Try to add Add %s should be successful" % ENTRY_DN)
  154. try:
  155. topology_m2.ms["master1"].add_s(entry_with_member)
  156. except ldap.LDAPError as e:
  157. topology_m2.ms["master1"].log.info("Failed to add entry, error: " + e.message['desc'])
  158. assert False
  159. #
  160. # Now check the entry as been replicated
  161. #
  162. topology_m2.ms["master2"].simple_bind_s(DN_DM, PASSWORD)
  163. topology_m2.ms["master1"].log.info("Try to retrieve %s from Master2" % ENTRY_DN)
  164. loop = 0
  165. while loop <= 10:
  166. try:
  167. ent = topology_m2.ms["master2"].getEntry(ENTRY_DN, ldap.SCOPE_BASE, "(objectclass=*)")
  168. break
  169. except ldap.NO_SUCH_OBJECT:
  170. time.sleep(1)
  171. loop += 1
  172. assert loop <= 10
  173. # Now update the entry on Master2 (as DM because 47653 is possibly not fixed on M2)
  174. topology_m2.ms["master1"].log.info("Update %s on M2" % ENTRY_DN)
  175. mod = [(ldap.MOD_REPLACE, 'description', 'test_add')]
  176. topology_m2.ms["master2"].modify_s(ENTRY_DN, mod)
  177. topology_m2.ms["master1"].simple_bind_s(DN_DM, PASSWORD)
  178. loop = 0
  179. while loop <= 10:
  180. try:
  181. ent = topology_m2.ms["master1"].getEntry(ENTRY_DN, ldap.SCOPE_BASE, "(objectclass=*)")
  182. if ent.hasAttr('description') and (ent.getValue('description') == 'test_add'):
  183. break
  184. except ldap.NO_SUCH_OBJECT:
  185. time.sleep(1)
  186. loop += 1
  187. assert ent.getValue('description') == 'test_add'
  188. def test_ticket47653_modify(topology_m2):
  189. '''
  190. This test MOD an entry on MASTER1 where 47653 is fixed. Then it checks that update is replicated
  191. on MASTER2 (even if on MASTER2 47653 is NOT fixed). Then update on MASTER2 (bound as BIND_DN).
  192. This update may fail whether or not 47653 is fixed on MASTER2
  193. It checks that, bound as bind_entry,
  194. - we can not modify an entry without the proper SELFDN aci.
  195. - adding the ACI, we can modify the entry
  196. '''
  197. # bind as bind_entry
  198. topology_m2.ms["master1"].log.info("Bind as %s" % BIND_DN)
  199. topology_m2.ms["master1"].simple_bind_s(BIND_DN, BIND_PW)
  200. topology_m2.ms["master1"].log.info("\n\n######################### MODIFY ######################\n")
  201. # entry to modify WITH member being BIND_DN but WITHOUT the ACI -> ldap.INSUFFICIENT_ACCESS
  202. try:
  203. topology_m2.ms["master1"].log.info("Try to modify %s (aci is missing)" % ENTRY_DN)
  204. mod = [(ldap.MOD_REPLACE, 'postalCode', '9876')]
  205. topology_m2.ms["master1"].modify_s(ENTRY_DN, mod)
  206. except Exception as e:
  207. topology_m2.ms["master1"].log.info("Exception (expected): %s" % type(e).__name__)
  208. assert isinstance(e, ldap.INSUFFICIENT_ACCESS)
  209. # Ok Now add the proper ACI
  210. topology_m2.ms["master1"].log.info("Bind as %s and add the WRITE SELFDN aci" % DN_DM)
  211. topology_m2.ms["master1"].simple_bind_s(DN_DM, PASSWORD)
  212. ACI_TARGET = "(target = \"ldap:///cn=*,%s\")" % SUFFIX
  213. ACI_TARGETATTR = "(targetattr = *)"
  214. ACI_TARGETFILTER = "(targetfilter =\"(objectClass=%s)\")" % OC_NAME
  215. ACI_ALLOW = "(version 3.0; acl \"SelfDN write\"; allow (write)"
  216. ACI_SUBJECT = " userattr = \"member#selfDN\";)"
  217. ACI_BODY = ACI_TARGET + ACI_TARGETATTR + ACI_TARGETFILTER + ACI_ALLOW + ACI_SUBJECT
  218. mod = [(ldap.MOD_ADD, 'aci', ACI_BODY)]
  219. topology_m2.ms["master1"].modify_s(SUFFIX, mod)
  220. time.sleep(1)
  221. # bind as bind_entry
  222. topology_m2.ms["master1"].log.info("M1: Bind as %s" % BIND_DN)
  223. topology_m2.ms["master1"].simple_bind_s(BIND_DN, BIND_PW)
  224. # modify the entry and checks the value
  225. topology_m2.ms["master1"].log.info("M1: Try to modify %s. It should succeeds" % ENTRY_DN)
  226. mod = [(ldap.MOD_REPLACE, 'postalCode', '1928')]
  227. topology_m2.ms["master1"].modify_s(ENTRY_DN, mod)
  228. topology_m2.ms["master1"].log.info("M1: Bind as %s" % DN_DM)
  229. topology_m2.ms["master1"].simple_bind_s(DN_DM, PASSWORD)
  230. topology_m2.ms["master1"].log.info("M1: Check the update of %s" % ENTRY_DN)
  231. ents = topology_m2.ms["master1"].search_s(ENTRY_DN, ldap.SCOPE_BASE, 'objectclass=*')
  232. assert len(ents) == 1
  233. assert ents[0].postalCode == '1928'
  234. # Now check the update has been replicated on M2
  235. topology_m2.ms["master1"].log.info("M2: Bind as %s" % DN_DM)
  236. topology_m2.ms["master2"].simple_bind_s(DN_DM, PASSWORD)
  237. topology_m2.ms["master1"].log.info("M2: Try to retrieve %s" % ENTRY_DN)
  238. loop = 0
  239. while loop <= 10:
  240. try:
  241. ent = topology_m2.ms["master2"].getEntry(ENTRY_DN, ldap.SCOPE_BASE, "(objectclass=*)")
  242. if ent.hasAttr('postalCode') and (ent.getValue('postalCode') == '1928'):
  243. break
  244. except ldap.NO_SUCH_OBJECT:
  245. time.sleep(1)
  246. loop += 1
  247. assert loop <= 10
  248. assert ent.getValue('postalCode') == '1928'
  249. # Now update the entry on Master2 bound as BIND_DN (update may fail if 47653 is not fixed on M2)
  250. topology_m2.ms["master1"].log.info("M2: Update %s (bound as %s)" % (ENTRY_DN, BIND_DN))
  251. topology_m2.ms["master2"].simple_bind_s(BIND_DN, PASSWORD)
  252. fail = False
  253. try:
  254. mod = [(ldap.MOD_REPLACE, 'postalCode', '1929')]
  255. topology_m2.ms["master2"].modify_s(ENTRY_DN, mod)
  256. fail = False
  257. except ldap.INSUFFICIENT_ACCESS:
  258. topology_m2.ms["master1"].log.info(
  259. "M2: Exception (INSUFFICIENT_ACCESS): that is fine the bug is possibly not fixed on M2")
  260. fail = True
  261. except Exception as e:
  262. topology_m2.ms["master1"].log.info("M2: Exception (not expected): %s" % type(e).__name__)
  263. assert 0
  264. if not fail:
  265. # Check the update has been replicaed on M1
  266. topology_m2.ms["master1"].log.info("M1: Bind as %s" % DN_DM)
  267. topology_m2.ms["master1"].simple_bind_s(DN_DM, PASSWORD)
  268. topology_m2.ms["master1"].log.info("M1: Check %s.postalCode=1929)" % (ENTRY_DN))
  269. loop = 0
  270. while loop <= 10:
  271. try:
  272. ent = topology_m2.ms["master1"].getEntry(ENTRY_DN, ldap.SCOPE_BASE, "(objectclass=*)")
  273. if ent.hasAttr('postalCode') and (ent.getValue('postalCode') == '1929'):
  274. break
  275. except ldap.NO_SUCH_OBJECT:
  276. time.sleep(1)
  277. loop += 1
  278. assert ent.getValue('postalCode') == '1929'
  279. if __name__ == '__main__':
  280. # Run isolated
  281. # -s for DEBUG mode
  282. CURRENT_FILE = os.path.realpath(__file__)
  283. pytest.main("-s %s" % CURRENT_FILE)