| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657 |
- import pytest
- from lib389.utils import *
- from lib389.topologies import topology_st
- logging.getLogger(__name__).setLevel(logging.DEBUG)
- log = logging.getLogger(__name__)
- def test_ticket48233(topology_st):
- """Test that ACI's that use IP restrictions do not crash the server at
- shutdown
- """
- # Add aci to restrict access my ip
- aci_text = ('(targetattr != "userPassword")(version 3.0;acl ' +
- '"Enable anonymous access - IP"; allow (read,compare,search)' +
- '(userdn = "ldap:///anyone") and (ip="127.0.0.1");)')
- try:
- topology_st.standalone.modify_s(DEFAULT_SUFFIX, [(ldap.MOD_ADD, 'aci', aci_text)])
- except ldap.LDAPError as e:
- log.error('Failed to add aci: (%s) error %s' % (aci_text, e.message['desc']))
- assert False
- time.sleep(1)
- # Anonymous search to engage the aci
- try:
- topology_st.standalone.simple_bind_s("", "")
- except ldap.LDAPError as e:
- log.error('Failed to anonymously bind -error %s' % (e.message['desc']))
- assert False
- try:
- entries = topology_st.standalone.search_s(DEFAULT_SUFFIX, ldap.SCOPE_SUBTREE, 'objectclass=*')
- if not entries:
- log.fatal('Failed return an entries from search')
- assert False
- except ldap.LDAPError as e:
- log.fatal('Search failed: ' + e.message['desc'])
- assert False
- # Restart the server
- topology_st.standalone.restart(timeout=10)
- # Check for crash
- if topology_st.standalone.detectDisorderlyShutdown():
- log.fatal('Server crashed!')
- assert False
- log.info('Test complete')
- if __name__ == '__main__':
- # Run isolated
- # -s for DEBUG mode
- CURRENT_FILE = os.path.realpath(__file__)
- pytest.main("-s %s" % CURRENT_FILE)
|