| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347 |
- import os
- import sys
- import time
- import ldap
- import ldap.sasl
- import logging
- import socket
- import pytest
- from lib389 import DirSrv, Entry, tools, tasks
- from lib389.tools import DirSrvTools
- from lib389._constants import *
- from lib389.properties import *
- from lib389.tasks import *
- from constants import *
- log = logging.getLogger(__name__)
- installation_prefix = None
- BRANCH = 'ou=people,' + DEFAULT_SUFFIX
- USER_DN = 'uid=user1,%s' % (BRANCH)
- BRANCH_CONTAINER = 'cn=nsPwPolicyContainer,ou=people,dc=example,dc=com'
- BRANCH_COS_DEF = 'cn=nsPwPolicy_CoS,ou=people,dc=example,dc=com'
- BRANCH_PWP = 'cn=cn\\3DnsPwPolicyEntry\\2Cou\\3DPeople\\2Cdc\\3Dexample\\2Cdc\\3Dcom,' + \
- 'cn=nsPwPolicyContainer,ou=People,dc=example,dc=com'
- BRANCH_COS_TMPL = 'cn=cn\\3DnsPwTemplateEntry\\2Cou\\3DPeople\\2Cdc\\3Dexample\\2Cdc\\3Dcom,' + \
- 'cn=nsPwPolicyContainer,ou=People,dc=example,dc=com'
- SECOND_SUFFIX = 'o=netscaperoot'
- BE_NAME = 'netscaperoot'
- class TopologyStandalone(object):
- def __init__(self, standalone):
- standalone.open()
- self.standalone = standalone
- @pytest.fixture(scope="module")
- def topology(request):
- '''
- This fixture is used to standalone topology for the 'module'.
- At the beginning, It may exists a standalone instance.
- It may also exists a backup for the standalone instance.
- Principle:
- If standalone instance exists:
- restart it
- If backup of standalone exists:
- create/rebind to standalone
- restore standalone instance from backup
- else:
- Cleanup everything
- remove instance
- remove backup
- Create instance
- Create backup
- '''
- global installation_prefix
- if installation_prefix:
- args_instance[SER_DEPLOYED_DIR] = installation_prefix
- standalone = DirSrv(verbose=False)
- # Args for the standalone instance
- args_instance[SER_HOST] = HOST_STANDALONE
- args_instance[SER_PORT] = PORT_STANDALONE
- args_instance[SER_SERVERID_PROP] = SERVERID_STANDALONE
- args_standalone = args_instance.copy()
- standalone.allocate(args_standalone)
- # Get the status of the backups
- backup_standalone = standalone.checkBackupFS()
- # Get the status of the instance and restart it if it exists
- instance_standalone = standalone.exists()
- if instance_standalone:
- # assuming the instance is already stopped, just wait 5 sec max
- standalone.stop(timeout=5)
- standalone.start(timeout=10)
- if backup_standalone:
- # The backup exist, assuming it is correct
- # we just re-init the instance with it
- if not instance_standalone:
- standalone.create()
- # Used to retrieve configuration information (dbdir, confdir...)
- standalone.open()
- # restore standalone instance from backup
- standalone.stop(timeout=10)
- standalone.restoreFS(backup_standalone)
- standalone.start(timeout=10)
- else:
- # We should be here only in two conditions
- # - This is the first time a test involve standalone instance
- # - Something weird happened (instance/backup destroyed)
- # so we discard everything and recreate all
- # Remove the backup. So even if we have a specific backup file
- # (e.g backup_standalone) we clear backup that an instance may have created
- if backup_standalone:
- standalone.clearBackupFS()
- # Remove the instance
- if instance_standalone:
- standalone.delete()
- # Create the instance
- standalone.create()
- # Used to retrieve configuration information (dbdir, confdir...)
- standalone.open()
- # Time to create the backups
- standalone.stop(timeout=10)
- standalone.backupfile = standalone.backupFS()
- standalone.start(timeout=10)
- # clear the tmp directory
- standalone.clearTmpDir(__file__)
- #
- # Here we have standalone instance up and running
- # Either coming from a backup recovery
- # or from a fresh (re)init
- # Time to return the topology
- return TopologyStandalone(standalone)
- def addSubtreePwPolicy(inst):
- #
- # Add subtree policy to the people branch
- #
- try:
- inst.add_s(Entry((BRANCH_CONTAINER, {
- 'objectclass': 'top nsContainer'.split(),
- 'cn': 'nsPwPolicyContainer'
- })))
- except ldap.LDAPError, e:
- log.error('Failed to add subtree container for ou=people: error ' + e.message['desc'])
- assert False
- # Add the password policy subentry
- try:
- inst.add_s(Entry((BRANCH_PWP, {
- 'objectclass': 'top ldapsubentry passwordpolicy'.split(),
- 'cn': 'cn=nsPwPolicyEntry,ou=people,dc=example,dc=com',
- 'passwordMustChange': 'off',
- 'passwordExp': 'off',
- 'passwordHistory': 'off',
- 'passwordMinAge': '0',
- 'passwordChange': 'off',
- 'passwordStorageScheme': 'ssha'
- })))
- except ldap.LDAPError, e:
- log.error('Failed to add passwordpolicy: error ' + e.message['desc'])
- assert False
- # Add the COS template
- try:
- inst.add_s(Entry((BRANCH_COS_TMPL, {
- 'objectclass': 'top ldapsubentry costemplate extensibleObject'.split(),
- 'cn': 'cn=nsPwPolicyEntry,ou=people,dc=example,dc=com',
- 'cosPriority': '1',
- 'cn': 'cn=nsPwTemplateEntry,ou=people,dc=example,dc=com',
- 'pwdpolicysubentry': BRANCH_PWP
- })))
- except ldap.LDAPError, e:
- log.error('Failed to add COS template: error ' + e.message['desc'])
- assert False
- # Add the COS definition
- try:
- inst.add_s(Entry((BRANCH_COS_DEF, {
- 'objectclass': 'top ldapsubentry cosSuperDefinition cosPointerDefinition'.split(),
- 'cn': 'cn=nsPwPolicyEntry,ou=people,dc=example,dc=com',
- 'costemplatedn': BRANCH_COS_TMPL,
- 'cosAttribute': 'pwdpolicysubentry default operational-default'
- })))
- except ldap.LDAPError, e:
- log.error('Failed to add COS def: error ' + e.message['desc'])
- assert False
- time.sleep(0.5)
- def delSubtreePwPolicy(inst):
- try:
- inst.delete_s(BRANCH_COS_DEF)
- except ldap.LDAPError, e:
- log.error('Failed to delete COS def: error ' + e.message['desc'])
- assert False
- try:
- inst.delete_s(BRANCH_COS_TMPL)
- except ldap.LDAPError, e:
- log.error('Failed to delete COS template: error ' + e.message['desc'])
- assert False
- try:
- inst.delete_s(BRANCH_PWP)
- except ldap.LDAPError, e:
- log.error('Failed to delete COS password policy: error ' + e.message['desc'])
- assert False
- try:
- inst.delete_s(BRANCH_CONTAINER)
- except ldap.LDAPError, e:
- log.error('Failed to delete COS container: error ' + e.message['desc'])
- assert False
- time.sleep(0.5)
- def test_ticket47981(topology):
- """
- If there are multiple suffixes, and the last suffix checked does not contain any COS entries,
- while other suffixes do, then the vattr cache is not invalidated as it should be. Then any
- cached entries will still contain the old COS attributes/values.
- """
- log.info('Testing Ticket 47981 - Test that COS def changes are correctly reflected in affected users')
- #
- # Create a second backend that does not have any COS entries
- #
- log.info('Adding second suffix that will not contain any COS entries...\n')
- topology.standalone.backend.create(SECOND_SUFFIX, {BACKEND_NAME: BE_NAME})
- topology.standalone.mappingtree.create(SECOND_SUFFIX, bename=BE_NAME)
- try:
- topology.standalone.add_s(Entry((SECOND_SUFFIX, {
- 'objectclass': 'top organization'.split(),
- 'o': BE_NAME})))
- except ldap.ALREADY_EXISTS:
- pass
- except ldap.LDAPError, e:
- log.error('Failed to create suffix entry: error ' + e.message['desc'])
- assert False
- #
- # Add People branch, it might already exist
- #
- log.info('Add our test entries to the default suffix, and proceed with the test...')
- try:
- topology.standalone.add_s(Entry((BRANCH, {
- 'objectclass': 'top extensibleObject'.split(),
- 'ou': 'level4'
- })))
- except ldap.ALREADY_EXISTS:
- pass
- except ldap.LDAPError, e:
- log.error('Failed to add ou=people: error ' + e.message['desc'])
- assert False
- #
- # Add a user to the branch
- #
- try:
- topology.standalone.add_s(Entry((USER_DN, {
- 'objectclass': 'top extensibleObject'.split(),
- 'uid': 'user1'
- })))
- except ldap.LDAPError, e:
- log.error('Failed to add user1: error ' + e.message['desc'])
- assert False
- #
- # Enable password policy and add the subtree policy
- #
- try:
- topology.standalone.modify_s(DN_CONFIG, [(ldap.MOD_REPLACE, 'nsslapd-pwpolicy-local', 'on')])
- except ldap.LDAPError, e:
- log.error('Failed to set pwpolicy-local: error ' + e.message['desc'])
- assert False
- addSubtreePwPolicy(topology.standalone)
- #
- # Now check the user has its expected passwordPolicy subentry
- #
- try:
- entries = topology.standalone.search_s(USER_DN,
- ldap.SCOPE_BASE,
- '(objectclass=top)',
- ['pwdpolicysubentry', 'dn'])
- if not entries[0].hasAttr('pwdpolicysubentry'):
- log.fatal('User does not have expected pwdpolicysubentry!')
- assert False
- except ldap.LDAPError, e:
- log.fatal('Unable to search for entry %s: error %s' % (USER_DN, e.message['desc']))
- assert False
- #
- # Delete the password policy and make sure it is removed from the same user
- #
- delSubtreePwPolicy(topology.standalone)
- try:
- entries = topology.standalone.search_s(USER_DN, ldap.SCOPE_BASE, '(objectclass=top)', ['pwdpolicysubentry'])
- if entries[0].hasAttr('pwdpolicysubentry'):
- log.fatal('User unexpectedly does have the pwdpolicysubentry!')
- assert False
- except ldap.LDAPError, e:
- log.fatal('Unable to search for entry %s: error %s' % (USER_DN, e.message['desc']))
- assert False
- #
- # Add the subtree policvy back and see if the user now has it
- #
- addSubtreePwPolicy(topology.standalone)
- try:
- entries = topology.standalone.search_s(USER_DN, ldap.SCOPE_BASE, '(objectclass=top)', ['pwdpolicysubentry'])
- if not entries[0].hasAttr('pwdpolicysubentry'):
- log.fatal('User does not have expected pwdpolicysubentry!')
- assert False
- except ldap.LDAPError, e:
- log.fatal('Unable to search for entry %s: error %s' % (USER_DN, e.message['desc']))
- assert False
- # If we got here the test passed
- log.info('Test PASSED')
- def test_ticket47981_final(topology):
- topology.standalone.delete()
- def run_isolated():
- '''
- run_isolated is used to run these test cases independently of a test scheduler (xunit, py.test..)
- To run isolated without py.test, you need to
- - edit this file and comment '@pytest.fixture' line before 'topology' function.
- - set the installation prefix
- - run this program
- '''
- global installation_prefix
- installation_prefix = None
- topo = topology(True)
- test_ticket47981(topo)
- test_ticket47981_final(topo)
- if __name__ == '__main__':
- run_isolated()
|