| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432 |
- import os
- import sys
- import time
- import ldap
- import logging
- import socket
- import time
- import logging
- import pytest
- from lib389 import DirSrv, Entry, tools
- from lib389.tools import DirSrvTools
- from lib389._constants import *
- from lib389.properties import *
- from constants import *
- log = logging.getLogger(__name__)
- installation_prefix = None
- OC_NAME = 'OCticket47653'
- MUST = "(postalAddress $ postalCode)"
- MAY = "(member $ street)"
- OTHER_NAME = 'other_entry'
- MAX_OTHERS = 10
- BIND_NAME = 'bind_entry'
- BIND_DN = 'cn=%s, %s' % (BIND_NAME, SUFFIX)
- BIND_PW = 'password'
- ENTRY_NAME = 'test_entry'
- ENTRY_DN = 'cn=%s, %s' % (ENTRY_NAME, SUFFIX)
- ENTRY_OC = "top person %s" % OC_NAME
-
- def _oc_definition(oid_ext, name, must=None, may=None):
- oid = "1.2.3.4.5.6.7.8.9.10.%d" % oid_ext
- desc = 'To test ticket 47490'
- sup = 'person'
- if not must:
- must = MUST
- if not may:
- may = MAY
-
- new_oc = "( %s NAME '%s' DESC '%s' SUP %s AUXILIARY MUST %s MAY %s )" % (oid, name, desc, sup, must, may)
- return new_oc
- class TopologyStandalone(object):
- def __init__(self, standalone):
- standalone.open()
- self.standalone = standalone
- @pytest.fixture(scope="module")
- def topology(request):
- '''
- This fixture is used to standalone topology for the 'module'.
- At the beginning, It may exists a standalone instance.
- It may also exists a backup for the standalone instance.
-
- Principle:
- If standalone instance exists:
- restart it
- If backup of standalone exists:
- create/rebind to standalone
- restore standalone instance from backup
- else:
- Cleanup everything
- remove instance
- remove backup
- Create instance
- Create backup
- '''
- global installation_prefix
- if installation_prefix:
- args_instance[SER_DEPLOYED_DIR] = installation_prefix
-
- standalone = DirSrv(verbose=False)
-
- # Args for the standalone instance
- args_instance[SER_HOST] = HOST_STANDALONE
- args_instance[SER_PORT] = PORT_STANDALONE
- args_instance[SER_SERVERID_PROP] = SERVERID_STANDALONE
- args_standalone = args_instance.copy()
- standalone.allocate(args_standalone)
-
- # Get the status of the backups
- backup_standalone = standalone.checkBackupFS()
-
- # Get the status of the instance and restart it if it exists
- instance_standalone = standalone.exists()
- if instance_standalone:
- # assuming the instance is already stopped, just wait 5 sec max
- standalone.stop(timeout=5)
- standalone.start(timeout=10)
-
- if backup_standalone:
- # The backup exist, assuming it is correct
- # we just re-init the instance with it
- if not instance_standalone:
- standalone.create()
- # Used to retrieve configuration information (dbdir, confdir...)
- standalone.open()
-
- # restore standalone instance from backup
- standalone.stop(timeout=10)
- standalone.restoreFS(backup_standalone)
- standalone.start(timeout=10)
-
- else:
- # We should be here only in two conditions
- # - This is the first time a test involve standalone instance
- # - Something weird happened (instance/backup destroyed)
- # so we discard everything and recreate all
-
- # Remove the backup. So even if we have a specific backup file
- # (e.g backup_standalone) we clear backup that an instance may have created
- if backup_standalone:
- standalone.clearBackupFS()
-
- # Remove the instance
- if instance_standalone:
- standalone.delete()
-
- # Create the instance
- standalone.create()
-
- # Used to retrieve configuration information (dbdir, confdir...)
- standalone.open()
-
- # Time to create the backups
- standalone.stop(timeout=10)
- standalone.backupfile = standalone.backupFS()
- standalone.start(timeout=10)
-
- #
- # Here we have standalone instance up and running
- # Either coming from a backup recovery
- # or from a fresh (re)init
- # Time to return the topology
- return TopologyStandalone(standalone)
- def test_ticket47653_init(topology):
- """
- It adds
- - Objectclass with MAY 'member'
- - an entry ('bind_entry') with which we bind to test the 'SELFDN' operation
- It deletes the anonymous aci
-
- """
-
-
- topology.standalone.log.info("Add %s that allows 'member' attribute" % OC_NAME)
- new_oc = _oc_definition(2, OC_NAME, must = MUST, may = MAY)
- topology.standalone.schema.add_schema('objectClasses', new_oc)
-
-
- # entry used to bind with
- topology.standalone.log.info("Add %s" % BIND_DN)
- topology.standalone.add_s(Entry((BIND_DN, {
- 'objectclass': "top person".split(),
- 'sn': BIND_NAME,
- 'cn': BIND_NAME,
- 'userpassword': BIND_PW})))
-
- # enable acl error logging
- mod = [(ldap.MOD_REPLACE, 'nsslapd-errorlog-level', '128')]
- topology.standalone.modify_s(DN_CONFIG, mod)
-
- # get read of anonymous ACI for use 'read-search' aci in SEARCH test
- ACI_ANONYMOUS = "(targetattr!=\"userPassword\")(version 3.0; acl \"Enable anonymous access\"; allow (read, search, compare) userdn=\"ldap:///anyone\";)"
- mod = [(ldap.MOD_DELETE, 'aci', ACI_ANONYMOUS)]
- topology.standalone.modify_s(SUFFIX, mod)
-
- # add dummy entries
- for cpt in range(MAX_OTHERS):
- name = "%s%d" % (OTHER_NAME, cpt)
- topology.standalone.add_s(Entry(("cn=%s,%s" % (name, SUFFIX), {
- 'objectclass': "top person".split(),
- 'sn': name,
- 'cn': name})))
-
-
- def test_ticket47653_add(topology):
- '''
- It checks that, bound as bind_entry,
- - we can not ADD an entry without the proper SELFDN aci.
- - with the proper ACI we can not ADD with 'member' attribute
- - with the proper ACI and 'member' it succeeds to ADD
- '''
- topology.standalone.log.info("\n\n######################### ADD ######################\n")
-
- # bind as bind_entry
- topology.standalone.log.info("Bind as %s" % BIND_DN)
- topology.standalone.simple_bind_s(BIND_DN, BIND_PW)
-
- # Prepare the entry with multivalued members
- entry_with_members = Entry(ENTRY_DN)
- entry_with_members.setValues('objectclass', 'top', 'person', 'OCticket47653')
- entry_with_members.setValues('sn', ENTRY_NAME)
- entry_with_members.setValues('cn', ENTRY_NAME)
- entry_with_members.setValues('postalAddress', 'here')
- entry_with_members.setValues('postalCode', '1234')
- members = []
- for cpt in range(MAX_OTHERS):
- name = "%s%d" % (OTHER_NAME, cpt)
- members.append("cn=%s,%s" % (name, SUFFIX))
- members.append(BIND_DN)
- entry_with_members.setValues('member', members)
-
- # Prepare the entry with one member
- entry_with_member = Entry(ENTRY_DN)
- entry_with_member.setValues('objectclass', 'top', 'person', 'OCticket47653')
- entry_with_member.setValues('sn', ENTRY_NAME)
- entry_with_member.setValues('cn', ENTRY_NAME)
- entry_with_member.setValues('postalAddress', 'here')
- entry_with_member.setValues('postalCode', '1234')
- member = []
- member.append(BIND_DN)
- entry_with_member.setValues('member', member)
-
- # entry to add WITH member being BIND_DN but WITHOUT the ACI -> ldap.INSUFFICIENT_ACCESS
- try:
- topology.standalone.log.info("Try to add Add %s (aci is missing): %r" % (ENTRY_DN, entry_with_member))
-
- topology.standalone.add_s(entry_with_member)
- except Exception as e:
- topology.standalone.log.info("Exception (expected): %s" % type(e).__name__)
- assert isinstance(e, ldap.INSUFFICIENT_ACCESS)
-
-
- # Ok Now add the proper ACI
- topology.standalone.log.info("Bind as %s and add the ADD SELFDN aci" % DN_DM)
- topology.standalone.simple_bind_s(DN_DM, PASSWORD)
-
- ACI_TARGET = "(target = \"ldap:///cn=*,%s\")" % SUFFIX
- ACI_TARGETFILTER = "(targetfilter =\"(objectClass=%s)\")" % OC_NAME
- ACI_ALLOW = "(version 3.0; acl \"SelfDN add\"; allow (add)"
- ACI_SUBJECT = " userattr = \"member#selfDN\";)"
- ACI_BODY = ACI_TARGET + ACI_TARGETFILTER + ACI_ALLOW + ACI_SUBJECT
- mod = [(ldap.MOD_ADD, 'aci', ACI_BODY)]
- topology.standalone.modify_s(SUFFIX, mod)
-
- # bind as bind_entry
- topology.standalone.log.info("Bind as %s" % BIND_DN)
- topology.standalone.simple_bind_s(BIND_DN, BIND_PW)
-
- # entry to add WITHOUT member and WITH the ACI -> ldap.INSUFFICIENT_ACCESS
- try:
- topology.standalone.log.info("Try to add Add %s (member is missing)" % ENTRY_DN)
- topology.standalone.add_s(Entry((ENTRY_DN, {
- 'objectclass': ENTRY_OC.split(),
- 'sn': ENTRY_NAME,
- 'cn': ENTRY_NAME,
- 'postalAddress': 'here',
- 'postalCode': '1234'})))
- except Exception as e:
- topology.standalone.log.info("Exception (expected): %s" % type(e).__name__)
- assert isinstance(e, ldap.INSUFFICIENT_ACCESS)
-
- # entry to add WITH memberS and WITH the ACI -> ldap.INSUFFICIENT_ACCESS
- # member should contain only one value
- try:
- topology.standalone.log.info("Try to add Add %s (with several member values)" % ENTRY_DN)
- topology.standalone.add_s(entry_with_members)
- except Exception as e:
- topology.standalone.log.info("Exception (expected): %s" % type(e).__name__)
- assert isinstance(e, ldap.INSUFFICIENT_ACCESS)
-
- topology.standalone.log.info("Try to add Add %s should be successful" % ENTRY_DN)
- topology.standalone.add_s(entry_with_member)
-
- def test_ticket47653_search(topology):
- '''
- It checks that, bound as bind_entry,
- - we can not search an entry without the proper SELFDN aci.
- - adding the ACI, we can search the entry
- '''
- topology.standalone.log.info("\n\n######################### SEARCH ######################\n")
- # bind as bind_entry
- topology.standalone.log.info("Bind as %s" % BIND_DN)
- topology.standalone.simple_bind_s(BIND_DN, BIND_PW)
-
- # entry to search WITH member being BIND_DN but WITHOUT the ACI -> no entry returned
- topology.standalone.log.info("Try to search %s (aci is missing)" % ENTRY_DN)
- ents = topology.standalone.search_s(ENTRY_DN, ldap.SCOPE_BASE, 'objectclass=*')
- assert len(ents) == 0
-
-
- # Ok Now add the proper ACI
- topology.standalone.log.info("Bind as %s and add the READ/SEARCH SELFDN aci" % DN_DM)
- topology.standalone.simple_bind_s(DN_DM, PASSWORD)
-
- ACI_TARGET = "(target = \"ldap:///cn=*,%s\")" % SUFFIX
- ACI_TARGETATTR = "(targetattr = *)"
- ACI_TARGETFILTER = "(targetfilter =\"(objectClass=%s)\")" % OC_NAME
- ACI_ALLOW = "(version 3.0; acl \"SelfDN search-read\"; allow (read, search, compare)"
- ACI_SUBJECT = " userattr = \"member#selfDN\";)"
- ACI_BODY = ACI_TARGET + ACI_TARGETATTR + ACI_TARGETFILTER + ACI_ALLOW + ACI_SUBJECT
- mod = [(ldap.MOD_ADD, 'aci', ACI_BODY)]
- topology.standalone.modify_s(SUFFIX, mod)
-
- # bind as bind_entry
- topology.standalone.log.info("Bind as %s" % BIND_DN)
- topology.standalone.simple_bind_s(BIND_DN, BIND_PW)
-
- # entry to search with the proper aci
- topology.standalone.log.info("Try to search %s should be successful" % ENTRY_DN)
- ents = topology.standalone.search_s(ENTRY_DN, ldap.SCOPE_BASE, 'objectclass=*')
- assert len(ents) == 1
-
- def test_ticket47653_modify(topology):
- '''
- It checks that, bound as bind_entry,
- - we can not modify an entry without the proper SELFDN aci.
- - adding the ACI, we can modify the entry
- '''
- # bind as bind_entry
- topology.standalone.log.info("Bind as %s" % BIND_DN)
- topology.standalone.simple_bind_s(BIND_DN, BIND_PW)
-
- topology.standalone.log.info("\n\n######################### MODIFY ######################\n")
-
- # entry to modify WITH member being BIND_DN but WITHOUT the ACI -> ldap.INSUFFICIENT_ACCESS
- try:
- topology.standalone.log.info("Try to modify %s (aci is missing)" % ENTRY_DN)
- mod = [(ldap.MOD_REPLACE, 'postalCode', '9876')]
- topology.standalone.modify_s(ENTRY_DN, mod)
- except Exception as e:
- topology.standalone.log.info("Exception (expected): %s" % type(e).__name__)
- assert isinstance(e, ldap.INSUFFICIENT_ACCESS)
-
-
- # Ok Now add the proper ACI
- topology.standalone.log.info("Bind as %s and add the WRITE SELFDN aci" % DN_DM)
- topology.standalone.simple_bind_s(DN_DM, PASSWORD)
-
- ACI_TARGET = "(target = \"ldap:///cn=*,%s\")" % SUFFIX
- ACI_TARGETATTR = "(targetattr = *)"
- ACI_TARGETFILTER = "(targetfilter =\"(objectClass=%s)\")" % OC_NAME
- ACI_ALLOW = "(version 3.0; acl \"SelfDN write\"; allow (write)"
- ACI_SUBJECT = " userattr = \"member#selfDN\";)"
- ACI_BODY = ACI_TARGET + ACI_TARGETATTR + ACI_TARGETFILTER + ACI_ALLOW + ACI_SUBJECT
- mod = [(ldap.MOD_ADD, 'aci', ACI_BODY)]
- topology.standalone.modify_s(SUFFIX, mod)
-
- # bind as bind_entry
- topology.standalone.log.info("Bind as %s" % BIND_DN)
- topology.standalone.simple_bind_s(BIND_DN, BIND_PW)
-
- # modify the entry and checks the value
- topology.standalone.log.info("Try to modify %s. It should succeeds" % ENTRY_DN)
- mod = [(ldap.MOD_REPLACE, 'postalCode', '1928')]
- topology.standalone.modify_s(ENTRY_DN, mod)
-
- ents = topology.standalone.search_s(ENTRY_DN, ldap.SCOPE_BASE, 'objectclass=*')
- assert len(ents) == 1
- assert ents[0].postalCode == '1928'
-
- def test_ticket47653_delete(topology):
- '''
- It checks that, bound as bind_entry,
- - we can not delete an entry without the proper SELFDN aci.
- - adding the ACI, we can delete the entry
- '''
- topology.standalone.log.info("\n\n######################### DELETE ######################\n")
-
- # bind as bind_entry
- topology.standalone.log.info("Bind as %s" % BIND_DN)
- topology.standalone.simple_bind_s(BIND_DN, BIND_PW)
-
- # entry to delete WITH member being BIND_DN but WITHOUT the ACI -> ldap.INSUFFICIENT_ACCESS
- try:
- topology.standalone.log.info("Try to delete %s (aci is missing)" % ENTRY_DN)
- topology.standalone.delete_s(ENTRY_DN)
- except Exception as e:
- topology.standalone.log.info("Exception (expected): %s" % type(e).__name__)
- assert isinstance(e, ldap.INSUFFICIENT_ACCESS)
-
- # Ok Now add the proper ACI
- topology.standalone.log.info("Bind as %s and add the READ/SEARCH SELFDN aci" % DN_DM)
- topology.standalone.simple_bind_s(DN_DM, PASSWORD)
-
- ACI_TARGET = "(target = \"ldap:///cn=*,%s\")" % SUFFIX
- ACI_TARGETFILTER = "(targetfilter =\"(objectClass=%s)\")" % OC_NAME
- ACI_ALLOW = "(version 3.0; acl \"SelfDN delete\"; allow (delete)"
- ACI_SUBJECT = " userattr = \"member#selfDN\";)"
- ACI_BODY = ACI_TARGET + ACI_TARGETFILTER + ACI_ALLOW + ACI_SUBJECT
- mod = [(ldap.MOD_ADD, 'aci', ACI_BODY)]
- topology.standalone.modify_s(SUFFIX, mod)
-
- # bind as bind_entry
- topology.standalone.log.info("Bind as %s" % BIND_DN)
- topology.standalone.simple_bind_s(BIND_DN, BIND_PW)
-
- # entry to search with the proper aci
- topology.standalone.log.info("Try to delete %s should be successful" % ENTRY_DN)
- topology.standalone.delete_s(ENTRY_DN)
- def test_ticket47653_final(topology):
- topology.standalone.stop(timeout=10)
-
- def run_isolated():
- '''
- run_isolated is used to run these test cases independently of a test scheduler (xunit, py.test..)
- To run isolated without py.test, you need to
- - edit this file and comment '@pytest.fixture' line before 'topology' function.
- - set the installation prefix
- - run this program
- '''
- global installation_prefix
- installation_prefix = None
-
- topo = topology(True)
- test_ticket47653_init(topo)
-
- test_ticket47653_add(topo)
- test_ticket47653_search(topo)
- test_ticket47653_modify(topo)
- test_ticket47653_delete(topo)
-
- test_ticket47653_final(topo)
- if __name__ == '__main__':
- run_isolated()
|