| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373 |
- import os
- import sys
- import time
- import ldap
- import logging
- import pytest
- from lib389 import DirSrv, Entry, tools
- from lib389.tools import DirSrvTools
- from lib389._constants import *
- from lib389.properties import *
- log = logging.getLogger(__name__)
- installation_prefix = None
- OC_NAME = 'OCticket47653'
- MUST = "(postalAddress $ postalCode)"
- MAY = "(member $ street)"
- OTHER_NAME = 'other_entry'
- MAX_OTHERS = 10
- BIND_NAME = 'bind_entry'
- BIND_DN = 'cn=%s, %s' % (BIND_NAME, SUFFIX)
- BIND_PW = 'password'
- ENTRY_NAME = 'test_entry'
- ENTRY_DN = 'cn=%s, %s' % (ENTRY_NAME, SUFFIX)
- ENTRY_OC = "top person %s" % OC_NAME
- def _oc_definition(oid_ext, name, must=None, may=None):
- oid = "1.2.3.4.5.6.7.8.9.10.%d" % oid_ext
- desc = 'To test ticket 47490'
- sup = 'person'
- if not must:
- must = MUST
- if not may:
- may = MAY
- new_oc = "( %s NAME '%s' DESC '%s' SUP %s AUXILIARY MUST %s MAY %s )" % (oid, name, desc, sup, must, may)
- return new_oc
- class TopologyStandalone(object):
- def __init__(self, standalone):
- standalone.open()
- self.standalone = standalone
- @pytest.fixture(scope="module")
- def topology(request):
- global installation_prefix
- if installation_prefix:
- args_instance[SER_DEPLOYED_DIR] = installation_prefix
- standalone = DirSrv(verbose=False)
- # Args for the standalone instance
- args_instance[SER_HOST] = HOST_STANDALONE
- args_instance[SER_PORT] = PORT_STANDALONE
- args_instance[SER_SERVERID_PROP] = SERVERID_STANDALONE
- args_standalone = args_instance.copy()
- standalone.allocate(args_standalone)
- # Get the status of the instance and restart it if it exists
- instance_standalone = standalone.exists()
- # Remove the instance
- if instance_standalone:
- standalone.delete()
- # Create the instance
- standalone.create()
- # Used to retrieve configuration information (dbdir, confdir...)
- standalone.open()
- # clear the tmp directory
- standalone.clearTmpDir(__file__)
- # Here we have standalone instance up and running
- return TopologyStandalone(standalone)
- def test_ticket47653_init(topology):
- """
- It adds
- - Objectclass with MAY 'member'
- - an entry ('bind_entry') with which we bind to test the 'SELFDN' operation
- It deletes the anonymous aci
- """
- topology.standalone.log.info("Add %s that allows 'member' attribute" % OC_NAME)
- new_oc = _oc_definition(2, OC_NAME, must=MUST, may=MAY)
- topology.standalone.schema.add_schema('objectClasses', new_oc)
- # entry used to bind with
- topology.standalone.log.info("Add %s" % BIND_DN)
- topology.standalone.add_s(Entry((BIND_DN, {
- 'objectclass': "top person".split(),
- 'sn': BIND_NAME,
- 'cn': BIND_NAME,
- 'userpassword': BIND_PW})))
- # enable acl error logging
- mod = [(ldap.MOD_REPLACE, 'nsslapd-errorlog-level', '128')]
- topology.standalone.modify_s(DN_CONFIG, mod)
- # get read of anonymous ACI for use 'read-search' aci in SEARCH test
- ACI_ANONYMOUS = "(targetattr!=\"userPassword\")(version 3.0; acl \"Enable anonymous access\"; allow (read, search, compare) userdn=\"ldap:///anyone\";)"
- mod = [(ldap.MOD_DELETE, 'aci', ACI_ANONYMOUS)]
- topology.standalone.modify_s(SUFFIX, mod)
- # add dummy entries
- for cpt in range(MAX_OTHERS):
- name = "%s%d" % (OTHER_NAME, cpt)
- topology.standalone.add_s(Entry(("cn=%s,%s" % (name, SUFFIX), {
- 'objectclass': "top person".split(),
- 'sn': name,
- 'cn': name})))
- def test_ticket47653_add(topology):
- '''
- It checks that, bound as bind_entry,
- - we can not ADD an entry without the proper SELFDN aci.
- - with the proper ACI we can not ADD with 'member' attribute
- - with the proper ACI and 'member' it succeeds to ADD
- '''
- topology.standalone.log.info("\n\n######################### ADD ######################\n")
- # bind as bind_entry
- topology.standalone.log.info("Bind as %s" % BIND_DN)
- topology.standalone.simple_bind_s(BIND_DN, BIND_PW)
- # Prepare the entry with multivalued members
- entry_with_members = Entry(ENTRY_DN)
- entry_with_members.setValues('objectclass', 'top', 'person', 'OCticket47653')
- entry_with_members.setValues('sn', ENTRY_NAME)
- entry_with_members.setValues('cn', ENTRY_NAME)
- entry_with_members.setValues('postalAddress', 'here')
- entry_with_members.setValues('postalCode', '1234')
- members = []
- for cpt in range(MAX_OTHERS):
- name = "%s%d" % (OTHER_NAME, cpt)
- members.append("cn=%s,%s" % (name, SUFFIX))
- members.append(BIND_DN)
- entry_with_members.setValues('member', members)
- # Prepare the entry with one member
- entry_with_member = Entry(ENTRY_DN)
- entry_with_member.setValues('objectclass', 'top', 'person', 'OCticket47653')
- entry_with_member.setValues('sn', ENTRY_NAME)
- entry_with_member.setValues('cn', ENTRY_NAME)
- entry_with_member.setValues('postalAddress', 'here')
- entry_with_member.setValues('postalCode', '1234')
- member = []
- member.append(BIND_DN)
- entry_with_member.setValues('member', member)
- # entry to add WITH member being BIND_DN but WITHOUT the ACI -> ldap.INSUFFICIENT_ACCESS
- try:
- topology.standalone.log.info("Try to add Add %s (aci is missing): %r" % (ENTRY_DN, entry_with_member))
- topology.standalone.add_s(entry_with_member)
- except Exception as e:
- topology.standalone.log.info("Exception (expected): %s" % type(e).__name__)
- assert isinstance(e, ldap.INSUFFICIENT_ACCESS)
- # Ok Now add the proper ACI
- topology.standalone.log.info("Bind as %s and add the ADD SELFDN aci" % DN_DM)
- topology.standalone.simple_bind_s(DN_DM, PASSWORD)
- ACI_TARGET = "(target = \"ldap:///cn=*,%s\")" % SUFFIX
- ACI_TARGETFILTER = "(targetfilter =\"(objectClass=%s)\")" % OC_NAME
- ACI_ALLOW = "(version 3.0; acl \"SelfDN add\"; allow (add)"
- ACI_SUBJECT = " userattr = \"member#selfDN\";)"
- ACI_BODY = ACI_TARGET + ACI_TARGETFILTER + ACI_ALLOW + ACI_SUBJECT
- mod = [(ldap.MOD_ADD, 'aci', ACI_BODY)]
- topology.standalone.modify_s(SUFFIX, mod)
- # bind as bind_entry
- topology.standalone.log.info("Bind as %s" % BIND_DN)
- topology.standalone.simple_bind_s(BIND_DN, BIND_PW)
- # entry to add WITHOUT member and WITH the ACI -> ldap.INSUFFICIENT_ACCESS
- try:
- topology.standalone.log.info("Try to add Add %s (member is missing)" % ENTRY_DN)
- topology.standalone.add_s(Entry((ENTRY_DN, {
- 'objectclass': ENTRY_OC.split(),
- 'sn': ENTRY_NAME,
- 'cn': ENTRY_NAME,
- 'postalAddress': 'here',
- 'postalCode': '1234'})))
- except Exception as e:
- topology.standalone.log.info("Exception (expected): %s" % type(e).__name__)
- assert isinstance(e, ldap.INSUFFICIENT_ACCESS)
- # entry to add WITH memberS and WITH the ACI -> ldap.INSUFFICIENT_ACCESS
- # member should contain only one value
- try:
- topology.standalone.log.info("Try to add Add %s (with several member values)" % ENTRY_DN)
- topology.standalone.add_s(entry_with_members)
- except Exception as e:
- topology.standalone.log.info("Exception (expected): %s" % type(e).__name__)
- assert isinstance(e, ldap.INSUFFICIENT_ACCESS)
- topology.standalone.log.info("Try to add Add %s should be successful" % ENTRY_DN)
- topology.standalone.add_s(entry_with_member)
- def test_ticket47653_search(topology):
- '''
- It checks that, bound as bind_entry,
- - we can not search an entry without the proper SELFDN aci.
- - adding the ACI, we can search the entry
- '''
- topology.standalone.log.info("\n\n######################### SEARCH ######################\n")
- # bind as bind_entry
- topology.standalone.log.info("Bind as %s" % BIND_DN)
- topology.standalone.simple_bind_s(BIND_DN, BIND_PW)
- # entry to search WITH member being BIND_DN but WITHOUT the ACI -> no entry returned
- topology.standalone.log.info("Try to search %s (aci is missing)" % ENTRY_DN)
- ents = topology.standalone.search_s(ENTRY_DN, ldap.SCOPE_BASE, 'objectclass=*')
- assert len(ents) == 0
- # Ok Now add the proper ACI
- topology.standalone.log.info("Bind as %s and add the READ/SEARCH SELFDN aci" % DN_DM)
- topology.standalone.simple_bind_s(DN_DM, PASSWORD)
- ACI_TARGET = "(target = \"ldap:///cn=*,%s\")" % SUFFIX
- ACI_TARGETATTR = "(targetattr = *)"
- ACI_TARGETFILTER = "(targetfilter =\"(objectClass=%s)\")" % OC_NAME
- ACI_ALLOW = "(version 3.0; acl \"SelfDN search-read\"; allow (read, search, compare)"
- ACI_SUBJECT = " userattr = \"member#selfDN\";)"
- ACI_BODY = ACI_TARGET + ACI_TARGETATTR + ACI_TARGETFILTER + ACI_ALLOW + ACI_SUBJECT
- mod = [(ldap.MOD_ADD, 'aci', ACI_BODY)]
- topology.standalone.modify_s(SUFFIX, mod)
- # bind as bind_entry
- topology.standalone.log.info("Bind as %s" % BIND_DN)
- topology.standalone.simple_bind_s(BIND_DN, BIND_PW)
- # entry to search with the proper aci
- topology.standalone.log.info("Try to search %s should be successful" % ENTRY_DN)
- ents = topology.standalone.search_s(ENTRY_DN, ldap.SCOPE_BASE, 'objectclass=*')
- assert len(ents) == 1
- def test_ticket47653_modify(topology):
- '''
- It checks that, bound as bind_entry,
- - we can not modify an entry without the proper SELFDN aci.
- - adding the ACI, we can modify the entry
- '''
- # bind as bind_entry
- topology.standalone.log.info("Bind as %s" % BIND_DN)
- topology.standalone.simple_bind_s(BIND_DN, BIND_PW)
- topology.standalone.log.info("\n\n######################### MODIFY ######################\n")
- # entry to modify WITH member being BIND_DN but WITHOUT the ACI -> ldap.INSUFFICIENT_ACCESS
- try:
- topology.standalone.log.info("Try to modify %s (aci is missing)" % ENTRY_DN)
- mod = [(ldap.MOD_REPLACE, 'postalCode', '9876')]
- topology.standalone.modify_s(ENTRY_DN, mod)
- except Exception as e:
- topology.standalone.log.info("Exception (expected): %s" % type(e).__name__)
- assert isinstance(e, ldap.INSUFFICIENT_ACCESS)
- # Ok Now add the proper ACI
- topology.standalone.log.info("Bind as %s and add the WRITE SELFDN aci" % DN_DM)
- topology.standalone.simple_bind_s(DN_DM, PASSWORD)
- ACI_TARGET = "(target = \"ldap:///cn=*,%s\")" % SUFFIX
- ACI_TARGETATTR = "(targetattr = *)"
- ACI_TARGETFILTER = "(targetfilter =\"(objectClass=%s)\")" % OC_NAME
- ACI_ALLOW = "(version 3.0; acl \"SelfDN write\"; allow (write)"
- ACI_SUBJECT = " userattr = \"member#selfDN\";)"
- ACI_BODY = ACI_TARGET + ACI_TARGETATTR + ACI_TARGETFILTER + ACI_ALLOW + ACI_SUBJECT
- mod = [(ldap.MOD_ADD, 'aci', ACI_BODY)]
- topology.standalone.modify_s(SUFFIX, mod)
- # bind as bind_entry
- topology.standalone.log.info("Bind as %s" % BIND_DN)
- topology.standalone.simple_bind_s(BIND_DN, BIND_PW)
- # modify the entry and checks the value
- topology.standalone.log.info("Try to modify %s. It should succeeds" % ENTRY_DN)
- mod = [(ldap.MOD_REPLACE, 'postalCode', '1928')]
- topology.standalone.modify_s(ENTRY_DN, mod)
- ents = topology.standalone.search_s(ENTRY_DN, ldap.SCOPE_BASE, 'objectclass=*')
- assert len(ents) == 1
- assert ents[0].postalCode == '1928'
- def test_ticket47653_delete(topology):
- '''
- It checks that, bound as bind_entry,
- - we can not delete an entry without the proper SELFDN aci.
- - adding the ACI, we can delete the entry
- '''
- topology.standalone.log.info("\n\n######################### DELETE ######################\n")
- # bind as bind_entry
- topology.standalone.log.info("Bind as %s" % BIND_DN)
- topology.standalone.simple_bind_s(BIND_DN, BIND_PW)
- # entry to delete WITH member being BIND_DN but WITHOUT the ACI -> ldap.INSUFFICIENT_ACCESS
- try:
- topology.standalone.log.info("Try to delete %s (aci is missing)" % ENTRY_DN)
- topology.standalone.delete_s(ENTRY_DN)
- except Exception as e:
- topology.standalone.log.info("Exception (expected): %s" % type(e).__name__)
- assert isinstance(e, ldap.INSUFFICIENT_ACCESS)
- # Ok Now add the proper ACI
- topology.standalone.log.info("Bind as %s and add the READ/SEARCH SELFDN aci" % DN_DM)
- topology.standalone.simple_bind_s(DN_DM, PASSWORD)
- ACI_TARGET = "(target = \"ldap:///cn=*,%s\")" % SUFFIX
- ACI_TARGETFILTER = "(targetfilter =\"(objectClass=%s)\")" % OC_NAME
- ACI_ALLOW = "(version 3.0; acl \"SelfDN delete\"; allow (delete)"
- ACI_SUBJECT = " userattr = \"member#selfDN\";)"
- ACI_BODY = ACI_TARGET + ACI_TARGETFILTER + ACI_ALLOW + ACI_SUBJECT
- mod = [(ldap.MOD_ADD, 'aci', ACI_BODY)]
- topology.standalone.modify_s(SUFFIX, mod)
- # bind as bind_entry
- topology.standalone.log.info("Bind as %s" % BIND_DN)
- topology.standalone.simple_bind_s(BIND_DN, BIND_PW)
- # entry to search with the proper aci
- topology.standalone.log.info("Try to delete %s should be successful" % ENTRY_DN)
- topology.standalone.delete_s(ENTRY_DN)
- def test_ticket47653_final(topology):
- topology.standalone.delete()
- log.info('Testcase PASSED')
- def run_isolated():
- '''
- run_isolated is used to run these test cases independently of a test scheduler (xunit, py.test..)
- To run isolated without py.test, you need to
- - edit this file and comment '@pytest.fixture' line before 'topology' function.
- - set the installation prefix
- - run this program
- '''
- global installation_prefix
- installation_prefix = None
- topo = topology(True)
- test_ticket47653_init(topo)
- test_ticket47653_add(topo)
- test_ticket47653_search(topo)
- test_ticket47653_modify(topo)
- test_ticket47653_delete(topo)
- test_ticket47653_final(topo)
- if __name__ == '__main__':
- run_isolated()
|