ticket47653MMR_test.py 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552
  1. '''
  2. Created on Nov 7, 2013
  3. @author: tbordaz
  4. '''
  5. import os
  6. import sys
  7. import time
  8. import ldap
  9. import logging
  10. import socket
  11. import time
  12. import logging
  13. import pytest
  14. import re
  15. from lib389 import DirSrv, Entry, tools
  16. from lib389.tools import DirSrvTools
  17. from lib389._constants import *
  18. from lib389.properties import *
  19. from constants import *
  20. from lib389._constants import *
  21. logging.getLogger(__name__).setLevel(logging.DEBUG)
  22. log = logging.getLogger(__name__)
  23. #
  24. # important part. We can deploy Master1 and Master2 on different versions
  25. #
  26. installation1_prefix = None
  27. installation2_prefix = None
  28. TEST_REPL_DN = "cn=test_repl, %s" % SUFFIX
  29. OC_NAME = 'OCticket47653'
  30. MUST = "(postalAddress $ postalCode)"
  31. MAY = "(member $ street)"
  32. OTHER_NAME = 'other_entry'
  33. MAX_OTHERS = 10
  34. BIND_NAME = 'bind_entry'
  35. BIND_DN = 'cn=%s, %s' % (BIND_NAME, SUFFIX)
  36. BIND_PW = 'password'
  37. ENTRY_NAME = 'test_entry'
  38. ENTRY_DN = 'cn=%s, %s' % (ENTRY_NAME, SUFFIX)
  39. ENTRY_OC = "top person %s" % OC_NAME
  40. def _oc_definition(oid_ext, name, must=None, may=None):
  41. oid = "1.2.3.4.5.6.7.8.9.10.%d" % oid_ext
  42. desc = 'To test ticket 47490'
  43. sup = 'person'
  44. if not must:
  45. must = MUST
  46. if not may:
  47. may = MAY
  48. new_oc = "( %s NAME '%s' DESC '%s' SUP %s AUXILIARY MUST %s MAY %s )" % (oid, name, desc, sup, must, may)
  49. return new_oc
  50. class TopologyMaster1Master2(object):
  51. def __init__(self, master1, master2):
  52. master1.open()
  53. self.master1 = master1
  54. master2.open()
  55. self.master2 = master2
  56. @pytest.fixture(scope="module")
  57. def topology(request):
  58. '''
  59. This fixture is used to create a replicated topology for the 'module'.
  60. The replicated topology is MASTER1 <-> Master2.
  61. At the beginning, It may exists a master2 instance and/or a master2 instance.
  62. It may also exists a backup for the master1 and/or the master2.
  63. Principle:
  64. If master1 instance exists:
  65. restart it
  66. If master2 instance exists:
  67. restart it
  68. If backup of master1 AND backup of master2 exists:
  69. create or rebind to master1
  70. create or rebind to master2
  71. restore master1 from backup
  72. restore master2 from backup
  73. else:
  74. Cleanup everything
  75. remove instances
  76. remove backups
  77. Create instances
  78. Initialize replication
  79. Create backups
  80. '''
  81. global installation1_prefix
  82. global installation2_prefix
  83. # allocate master1 on a given deployement
  84. master1 = DirSrv(verbose=False)
  85. if installation1_prefix:
  86. args_instance[SER_DEPLOYED_DIR] = installation1_prefix
  87. # Args for the master1 instance
  88. args_instance[SER_HOST] = HOST_MASTER_1
  89. args_instance[SER_PORT] = PORT_MASTER_1
  90. args_instance[SER_SERVERID_PROP] = SERVERID_MASTER_1
  91. args_master = args_instance.copy()
  92. master1.allocate(args_master)
  93. # allocate master1 on a given deployement
  94. master2 = DirSrv(verbose=False)
  95. if installation2_prefix:
  96. args_instance[SER_DEPLOYED_DIR] = installation2_prefix
  97. # Args for the consumer instance
  98. args_instance[SER_HOST] = HOST_MASTER_2
  99. args_instance[SER_PORT] = PORT_MASTER_2
  100. args_instance[SER_SERVERID_PROP] = SERVERID_MASTER_2
  101. args_master = args_instance.copy()
  102. master2.allocate(args_master)
  103. # Get the status of the backups
  104. backup_master1 = master1.checkBackupFS()
  105. backup_master2 = master2.checkBackupFS()
  106. # Get the status of the instance and restart it if it exists
  107. instance_master1 = master1.exists()
  108. if instance_master1:
  109. master1.stop(timeout=10)
  110. master1.start(timeout=10)
  111. instance_master2 = master2.exists()
  112. if instance_master2:
  113. master2.stop(timeout=10)
  114. master2.start(timeout=10)
  115. if backup_master1 and backup_master2:
  116. # The backups exist, assuming they are correct
  117. # we just re-init the instances with them
  118. if not instance_master1:
  119. master1.create()
  120. # Used to retrieve configuration information (dbdir, confdir...)
  121. master1.open()
  122. if not instance_master2:
  123. master2.create()
  124. # Used to retrieve configuration information (dbdir, confdir...)
  125. master2.open()
  126. # restore master1 from backup
  127. master1.stop(timeout=10)
  128. master1.restoreFS(backup_master1)
  129. master1.start(timeout=10)
  130. # restore master2 from backup
  131. master2.stop(timeout=10)
  132. master2.restoreFS(backup_master2)
  133. master2.start(timeout=10)
  134. else:
  135. # We should be here only in two conditions
  136. # - This is the first time a test involve master-consumer
  137. # so we need to create everything
  138. # - Something weird happened (instance/backup destroyed)
  139. # so we discard everything and recreate all
  140. # Remove all the backups. So even if we have a specific backup file
  141. # (e.g backup_master) we clear all backups that an instance my have created
  142. if backup_master1:
  143. master1.clearBackupFS()
  144. if backup_master2:
  145. master2.clearBackupFS()
  146. # Remove all the instances
  147. if instance_master1:
  148. master1.delete()
  149. if instance_master2:
  150. master2.delete()
  151. # Create the instances
  152. master1.create()
  153. master1.open()
  154. master2.create()
  155. master2.open()
  156. #
  157. # Now prepare the Master-Consumer topology
  158. #
  159. # First Enable replication
  160. master1.replica.enableReplication(suffix=SUFFIX, role=REPLICAROLE_MASTER, replicaId=REPLICAID_MASTER_1)
  161. master2.replica.enableReplication(suffix=SUFFIX, role=REPLICAROLE_MASTER, replicaId=REPLICAID_MASTER_2)
  162. # Initialize the supplier->consumer
  163. properties = {RA_NAME: r'meTo_$host:$port',
  164. RA_BINDDN: defaultProperties[REPLICATION_BIND_DN],
  165. RA_BINDPW: defaultProperties[REPLICATION_BIND_PW],
  166. RA_METHOD: defaultProperties[REPLICATION_BIND_METHOD],
  167. RA_TRANSPORT_PROT: defaultProperties[REPLICATION_TRANSPORT]}
  168. repl_agreement = master1.agreement.create(suffix=SUFFIX, host=master2.host, port=master2.port, properties=properties)
  169. if not repl_agreement:
  170. log.fatal("Fail to create a replica agreement")
  171. sys.exit(1)
  172. log.debug("%s created" % repl_agreement)
  173. properties = {RA_NAME: r'meTo_$host:$port',
  174. RA_BINDDN: defaultProperties[REPLICATION_BIND_DN],
  175. RA_BINDPW: defaultProperties[REPLICATION_BIND_PW],
  176. RA_METHOD: defaultProperties[REPLICATION_BIND_METHOD],
  177. RA_TRANSPORT_PROT: defaultProperties[REPLICATION_TRANSPORT]}
  178. master2.agreement.create(suffix=SUFFIX, host=master1.host, port=master1.port, properties=properties)
  179. master1.agreement.init(SUFFIX, HOST_MASTER_2, PORT_MASTER_2)
  180. master1.waitForReplInit(repl_agreement)
  181. # Check replication is working fine
  182. master1.add_s(Entry((TEST_REPL_DN, {
  183. 'objectclass': "top person".split(),
  184. 'sn': 'test_repl',
  185. 'cn': 'test_repl'})))
  186. loop = 0
  187. while loop <= 10:
  188. try:
  189. ent = master2.getEntry(TEST_REPL_DN, ldap.SCOPE_BASE, "(objectclass=*)")
  190. break
  191. except ldap.NO_SUCH_OBJECT:
  192. time.sleep(1)
  193. loop += 1
  194. # Time to create the backups
  195. master1.stop(timeout=10)
  196. master1.backupfile = master1.backupFS()
  197. master1.start(timeout=10)
  198. master2.stop(timeout=10)
  199. master2.backupfile = master2.backupFS()
  200. master2.start(timeout=10)
  201. #
  202. # Here we have two instances master and consumer
  203. # with replication working. Either coming from a backup recovery
  204. # or from a fresh (re)init
  205. # Time to return the topology
  206. return TopologyMaster1Master2(master1, master2)
  207. def test_ticket47653_init(topology):
  208. """
  209. It adds
  210. - Objectclass with MAY 'member'
  211. - an entry ('bind_entry') with which we bind to test the 'SELFDN' operation
  212. It deletes the anonymous aci
  213. """
  214. topology.master1.log.info("Add %s that allows 'member' attribute" % OC_NAME)
  215. new_oc = _oc_definition(2, OC_NAME, must = MUST, may = MAY)
  216. topology.master1.schema.add_schema('objectClasses', new_oc)
  217. # entry used to bind with
  218. topology.master1.log.info("Add %s" % BIND_DN)
  219. topology.master1.add_s(Entry((BIND_DN, {
  220. 'objectclass': "top person".split(),
  221. 'sn': BIND_NAME,
  222. 'cn': BIND_NAME,
  223. 'userpassword': BIND_PW})))
  224. # enable acl error logging
  225. mod = [(ldap.MOD_REPLACE, 'nsslapd-errorlog-level', str(128+8192))] # ACL + REPL
  226. topology.master1.modify_s(DN_CONFIG, mod)
  227. topology.master2.modify_s(DN_CONFIG, mod)
  228. # get read of anonymous ACI for use 'read-search' aci in SEARCH test
  229. ACI_ANONYMOUS = "(targetattr!=\"userPassword\")(version 3.0; acl \"Enable anonymous access\"; allow (read, search, compare) userdn=\"ldap:///anyone\";)"
  230. mod = [(ldap.MOD_DELETE, 'aci', ACI_ANONYMOUS)]
  231. topology.master1.modify_s(SUFFIX, mod)
  232. topology.master2.modify_s(SUFFIX, mod)
  233. # add dummy entries
  234. for cpt in range(MAX_OTHERS):
  235. name = "%s%d" % (OTHER_NAME, cpt)
  236. topology.master1.add_s(Entry(("cn=%s,%s" % (name, SUFFIX), {
  237. 'objectclass': "top person".split(),
  238. 'sn': name,
  239. 'cn': name})))
  240. def test_ticket47653_add(topology):
  241. '''
  242. This test ADD an entry on MASTER1 where 47653 is fixed. Then it checks that entry is replicated
  243. on MASTER2 (even if on MASTER2 47653 is NOT fixed). Then update on MASTER2 and check the update on MASTER1
  244. It checks that, bound as bind_entry,
  245. - we can not ADD an entry without the proper SELFDN aci.
  246. - with the proper ACI we can not ADD with 'member' attribute
  247. - with the proper ACI and 'member' it succeeds to ADD
  248. '''
  249. topology.master1.log.info("\n\n######################### ADD ######################\n")
  250. # bind as bind_entry
  251. topology.master1.log.info("Bind as %s" % BIND_DN)
  252. topology.master1.simple_bind_s(BIND_DN, BIND_PW)
  253. # Prepare the entry with multivalued members
  254. entry_with_members = Entry(ENTRY_DN)
  255. entry_with_members.setValues('objectclass', 'top', 'person', 'OCticket47653')
  256. entry_with_members.setValues('sn', ENTRY_NAME)
  257. entry_with_members.setValues('cn', ENTRY_NAME)
  258. entry_with_members.setValues('postalAddress', 'here')
  259. entry_with_members.setValues('postalCode', '1234')
  260. members = []
  261. for cpt in range(MAX_OTHERS):
  262. name = "%s%d" % (OTHER_NAME, cpt)
  263. members.append("cn=%s,%s" % (name, SUFFIX))
  264. members.append(BIND_DN)
  265. entry_with_members.setValues('member', members)
  266. # Prepare the entry with only one member value
  267. entry_with_member = Entry(ENTRY_DN)
  268. entry_with_member.setValues('objectclass', 'top', 'person', 'OCticket47653')
  269. entry_with_member.setValues('sn', ENTRY_NAME)
  270. entry_with_member.setValues('cn', ENTRY_NAME)
  271. entry_with_member.setValues('postalAddress', 'here')
  272. entry_with_member.setValues('postalCode', '1234')
  273. member = []
  274. member.append(BIND_DN)
  275. entry_with_member.setValues('member', member)
  276. # entry to add WITH member being BIND_DN but WITHOUT the ACI -> ldap.INSUFFICIENT_ACCESS
  277. try:
  278. topology.master1.log.info("Try to add Add %s (aci is missing): %r" % (ENTRY_DN, entry_with_member))
  279. topology.master1.add_s(entry_with_member)
  280. except Exception as e:
  281. topology.master1.log.info("Exception (expected): %s" % type(e).__name__)
  282. assert isinstance(e, ldap.INSUFFICIENT_ACCESS)
  283. # Ok Now add the proper ACI
  284. topology.master1.log.info("Bind as %s and add the ADD SELFDN aci" % DN_DM)
  285. topology.master1.simple_bind_s(DN_DM, PASSWORD)
  286. ACI_TARGET = "(target = \"ldap:///cn=*,%s\")" % SUFFIX
  287. ACI_TARGETFILTER = "(targetfilter =\"(objectClass=%s)\")" % OC_NAME
  288. ACI_ALLOW = "(version 3.0; acl \"SelfDN add\"; allow (add)"
  289. ACI_SUBJECT = " userattr = \"member#selfDN\";)"
  290. ACI_BODY = ACI_TARGET + ACI_TARGETFILTER + ACI_ALLOW + ACI_SUBJECT
  291. mod = [(ldap.MOD_ADD, 'aci', ACI_BODY)]
  292. topology.master1.modify_s(SUFFIX, mod)
  293. # bind as bind_entry
  294. topology.master1.log.info("Bind as %s" % BIND_DN)
  295. topology.master1.simple_bind_s(BIND_DN, BIND_PW)
  296. # entry to add WITHOUT member and WITH the ACI -> ldap.INSUFFICIENT_ACCESS
  297. try:
  298. topology.master1.log.info("Try to add Add %s (member is missing)" % ENTRY_DN)
  299. topology.master1.add_s(Entry((ENTRY_DN, {
  300. 'objectclass': ENTRY_OC.split(),
  301. 'sn': ENTRY_NAME,
  302. 'cn': ENTRY_NAME,
  303. 'postalAddress': 'here',
  304. 'postalCode': '1234'})))
  305. except Exception as e:
  306. topology.master1.log.info("Exception (expected): %s" % type(e).__name__)
  307. assert isinstance(e, ldap.INSUFFICIENT_ACCESS)
  308. # entry to add WITH memberS and WITH the ACI -> ldap.INSUFFICIENT_ACCESS
  309. # member should contain only one value
  310. try:
  311. topology.master1.log.info("Try to add Add %s (with several member values)" % ENTRY_DN)
  312. topology.master1.add_s(entry_with_members)
  313. except Exception as e:
  314. topology.master1.log.info("Exception (expected): %s" % type(e).__name__)
  315. assert isinstance(e, ldap.INSUFFICIENT_ACCESS)
  316. topology.master1.log.info("Try to add Add %s should be successful" % ENTRY_DN)
  317. topology.master1.add_s(entry_with_member)
  318. #
  319. # Now check the entry as been replicated
  320. #
  321. topology.master2.simple_bind_s(DN_DM, PASSWORD)
  322. topology.master1.log.info("Try to retrieve %s from Master2" % ENTRY_DN)
  323. loop = 0
  324. while loop <= 10:
  325. try:
  326. ent = topology.master2.getEntry(ENTRY_DN, ldap.SCOPE_BASE, "(objectclass=*)")
  327. break
  328. except ldap.NO_SUCH_OBJECT:
  329. time.sleep(1)
  330. loop += 1
  331. assert loop <= 10
  332. # Now update the entry on Master2 (as DM because 47653 is possibly not fixed on M2)
  333. topology.master1.log.info("Update %s on M2" % ENTRY_DN)
  334. mod = [(ldap.MOD_REPLACE, 'description', 'test_add')]
  335. topology.master2.modify_s(ENTRY_DN, mod)
  336. topology.master1.simple_bind_s(DN_DM, PASSWORD)
  337. loop = 0
  338. while loop <= 10:
  339. try:
  340. ent = topology.master1.getEntry(ENTRY_DN, ldap.SCOPE_BASE, "(objectclass=*)")
  341. if ent.hasAttr('description') and (ent.getValue('description') == 'test_add'):
  342. break
  343. except ldap.NO_SUCH_OBJECT:
  344. time.sleep(1)
  345. loop += 1
  346. assert ent.getValue('description') == 'test_add'
  347. def test_ticket47653_modify(topology):
  348. '''
  349. This test MOD an entry on MASTER1 where 47653 is fixed. Then it checks that update is replicated
  350. on MASTER2 (even if on MASTER2 47653 is NOT fixed). Then update on MASTER2 (bound as BIND_DN).
  351. This update may fail whether or not 47653 is fixed on MASTER2
  352. It checks that, bound as bind_entry,
  353. - we can not modify an entry without the proper SELFDN aci.
  354. - adding the ACI, we can modify the entry
  355. '''
  356. # bind as bind_entry
  357. topology.master1.log.info("Bind as %s" % BIND_DN)
  358. topology.master1.simple_bind_s(BIND_DN, BIND_PW)
  359. topology.master1.log.info("\n\n######################### MODIFY ######################\n")
  360. # entry to modify WITH member being BIND_DN but WITHOUT the ACI -> ldap.INSUFFICIENT_ACCESS
  361. try:
  362. topology.master1.log.info("Try to modify %s (aci is missing)" % ENTRY_DN)
  363. mod = [(ldap.MOD_REPLACE, 'postalCode', '9876')]
  364. topology.master1.modify_s(ENTRY_DN, mod)
  365. except Exception as e:
  366. topology.master1.log.info("Exception (expected): %s" % type(e).__name__)
  367. assert isinstance(e, ldap.INSUFFICIENT_ACCESS)
  368. # Ok Now add the proper ACI
  369. topology.master1.log.info("Bind as %s and add the WRITE SELFDN aci" % DN_DM)
  370. topology.master1.simple_bind_s(DN_DM, PASSWORD)
  371. ACI_TARGET = "(target = \"ldap:///cn=*,%s\")" % SUFFIX
  372. ACI_TARGETATTR = "(targetattr = *)"
  373. ACI_TARGETFILTER = "(targetfilter =\"(objectClass=%s)\")" % OC_NAME
  374. ACI_ALLOW = "(version 3.0; acl \"SelfDN write\"; allow (write)"
  375. ACI_SUBJECT = " userattr = \"member#selfDN\";)"
  376. ACI_BODY = ACI_TARGET + ACI_TARGETATTR + ACI_TARGETFILTER + ACI_ALLOW + ACI_SUBJECT
  377. mod = [(ldap.MOD_ADD, 'aci', ACI_BODY)]
  378. topology.master1.modify_s(SUFFIX, mod)
  379. # bind as bind_entry
  380. topology.master1.log.info("M1: Bind as %s" % BIND_DN)
  381. topology.master1.simple_bind_s(BIND_DN, BIND_PW)
  382. # modify the entry and checks the value
  383. topology.master1.log.info("M1: Try to modify %s. It should succeeds" % ENTRY_DN)
  384. mod = [(ldap.MOD_REPLACE, 'postalCode', '1928')]
  385. topology.master1.modify_s(ENTRY_DN, mod)
  386. topology.master1.log.info("M1: Bind as %s" % DN_DM)
  387. topology.master1.simple_bind_s(DN_DM, PASSWORD)
  388. topology.master1.log.info("M1: Check the update of %s" % ENTRY_DN)
  389. ents = topology.master1.search_s(ENTRY_DN, ldap.SCOPE_BASE, 'objectclass=*')
  390. assert len(ents) == 1
  391. assert ents[0].postalCode == '1928'
  392. #
  393. # Now check the update has been replicated on M2
  394. topology.master1.log.info("M2: Bind as %s" % DN_DM)
  395. topology.master2.simple_bind_s(DN_DM, PASSWORD)
  396. topology.master1.log.info("M2: Try to retrieve %s" % ENTRY_DN)
  397. loop = 0
  398. while loop <= 10:
  399. try:
  400. ent = topology.master2.getEntry(ENTRY_DN, ldap.SCOPE_BASE, "(objectclass=*)")
  401. if ent.hasAttr('postalCode') and (ent.getValue('postalCode') == '1928'):
  402. break
  403. except ldap.NO_SUCH_OBJECT:
  404. time.sleep(1)
  405. loop += 1
  406. assert loop <= 10
  407. assert ent.getValue('postalCode') == '1928'
  408. # Now update the entry on Master2 bound as BIND_DN (update may fail if 47653 is not fixed on M2)
  409. topology.master1.log.info("M2: Update %s (bound as %s)" % (ENTRY_DN, BIND_DN))
  410. topology.master2.simple_bind_s(BIND_DN, PASSWORD)
  411. fail = False
  412. try:
  413. mod = [(ldap.MOD_REPLACE, 'postalCode', '1929')]
  414. topology.master2.modify_s(ENTRY_DN, mod)
  415. fail = False
  416. except ldap.INSUFFICIENT_ACCESS:
  417. topology.master1.log.info("M2: Exception (INSUFFICIENT_ACCESS): that is fine the bug is possibly not fixed on M2")
  418. fail = True
  419. except Exception as e:
  420. topology.master1.log.info("M2: Exception (not expected): %s" % type(e).__name__)
  421. assert 0
  422. if not fail:
  423. # Check the update has been replicaed on M1
  424. topology.master1.log.info("M1: Bind as %s" % DN_DM)
  425. topology.master1.simple_bind_s(DN_DM, PASSWORD)
  426. topology.master1.log.info("M1: Check %s.postalCode=1929)" % (ENTRY_DN))
  427. loop = 0
  428. while loop <= 10:
  429. try:
  430. ent = topology.master1.getEntry(ENTRY_DN, ldap.SCOPE_BASE, "(objectclass=*)")
  431. if ent.hasAttr('postalCode') and (ent.getValue('postalCode') == '1929'):
  432. break
  433. except ldap.NO_SUCH_OBJECT:
  434. time.sleep(1)
  435. loop += 1
  436. assert ent.getValue('postalCode') == '1929'
  437. def test_ticket47653_final(topology):
  438. topology.master1.stop(timeout=10)
  439. topology.master2.stop(timeout=10)
  440. def run_isolated():
  441. '''
  442. run_isolated is used to run these test cases independently of a test scheduler (xunit, py.test..)
  443. To run isolated without py.test, you need to
  444. - edit this file and comment '@pytest.fixture' line before 'topology' function.
  445. - set the installation prefix
  446. - run this program
  447. '''
  448. global installation1_prefix
  449. global installation2_prefix
  450. installation1_prefix = None
  451. installation2_prefix = None
  452. topo = topology(True)
  453. test_ticket47653_init(topo)
  454. test_ticket47653_add(topo)
  455. test_ticket47653_modify(topo)
  456. test_ticket47653_final(topo)
  457. if __name__ == '__main__':
  458. run_isolated()