Hot-keys on this page
r m x p toggle line displays
j k next/prev highlighted chunk
0 (zero) top of page
1 (one) first highlighted chunk
# Authors: # Rob Crittenden <rcritten@redhat.com> # Pavel Zuna <pzuna@redhat.com> # # Copyright (C) 2008 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see <http://www.gnu.org/licenses/>. Test the `ipalib/plugins/service.py` module. """
('host_del', [fqdn1], {}), ('host_del', [fqdn2], {}), ('host_del', [fqdn3], {}), ('service_del', [service1], {}), ]
dict( desc='Try to retrieve non-existent %r' % service1, command=('service_show', [service1], {}), expected=errors.NotFound( reason=u'%s: service not found' % service1), ),
dict( desc='Try to update non-existent %r' % service1, command=('service_mod', [service1], dict(usercertificate=servercert)), expected=errors.NotFound(reason='no such entry'), ),
dict( desc='Try to delete non-existent %r' % service1, command=('service_del', [service1], {}), expected=errors.NotFound(reason='no such entry'), ),
dict( desc='Create %r' % fqdn1, command=('host_add', [fqdn1], dict( description=u'Test host 1', l=u'Undisclosed location 1', force=True, ), ), expected=dict( value=fqdn1, summary=u'Added host "%s"' % fqdn1, result=dict( dn=lambda x: DN(x) == host1dn, fqdn=[fqdn1], description=[u'Test host 1'], l=[u'Undisclosed location 1'], krbprincipalname=[u'host/%s@%s' % (fqdn1, api.env.realm)], objectclass=objectclasses.host, ipauniqueid=[fuzzy_uuid], managedby_host=[u'%s' % fqdn1], has_keytab=False, has_password=False, ), ), ),
dict( desc='Create %r' % fqdn2, command=('host_add', [fqdn2], dict( description=u'Test host 2', l=u'Undisclosed location 2', force=True, ), ), expected=dict( value=fqdn2, summary=u'Added host "%s"' % fqdn2, result=dict( dn=lambda x: DN(x) == host2dn, fqdn=[fqdn2], description=[u'Test host 2'], l=[u'Undisclosed location 2'], krbprincipalname=[u'host/%s@%s' % (fqdn2, api.env.realm)], objectclass=objectclasses.host, ipauniqueid=[fuzzy_uuid], managedby_host=[u'%s' % fqdn2], has_keytab=False, has_password=False, ), ), ),
dict( desc='Create %r' % fqdn3, command=('host_add', [fqdn3], dict( description=u'Test host 3', l=u'Undisclosed location 3', force=True, ), ), expected=dict( value=fqdn3.lower(), summary=u'Added host "%s"' % fqdn3.lower(), result=dict( dn=lambda x: DN(x) == host3dn, fqdn=[fqdn3.lower()], description=[u'Test host 3'], l=[u'Undisclosed location 3'], krbprincipalname=[u'host/%s@%s' % (fqdn3.lower(), api.env.realm)], objectclass=objectclasses.host, ipauniqueid=[fuzzy_uuid], managedby_host=[u'%s' % fqdn3.lower()], has_keytab=False, has_password=False, ), ), ),
dict( desc='Create %r' % service1, command=('service_add', [service1], dict( force=True, ), ), expected=dict( value=service1, summary=u'Added service "%s"' % service1, result=dict( dn=lambda x: DN(x) == service1dn, krbprincipalname=[service1], objectclass=objectclasses.service, ipauniqueid=[fuzzy_uuid], managedby_host=[fqdn1], ), ), ),
dict( desc='Try to create duplicate %r' % service1, command=('service_add', [service1], dict( force=True, ), ), expected=errors.DuplicateEntry( message=u'service with name "%s" already exists' % service1), ),
dict( desc='Retrieve %r' % service1, command=('service_show', [service1], {}), expected=dict( value=service1, summary=None, result=dict( dn=lambda x: DN(x) == service1dn, krbprincipalname=[service1], has_keytab=False, managedby_host=[fqdn1], ), ), ),
dict( desc='Retrieve %r with all=True' % service1, command=('service_show', [service1], dict(all=True)), expected=dict( value=service1, summary=None, result=dict( dn=lambda x: DN(x) == service1dn, krbprincipalname=[service1], objectclass=objectclasses.service, ipauniqueid=[fuzzy_uuid], managedby_host=[fqdn1], has_keytab=False ), ), ),
dict( desc='Search for %r' % service1, command=('service_find', [service1], {}), expected=dict( count=1, truncated=False, summary=u'1 service matched', result=[ dict( dn=lambda x: DN(x) == service1dn, krbprincipalname=[service1], managedby_host=[fqdn1], has_keytab=False, ), ], ), ),
dict( desc='Search for %r with all=True' % service1, command=('service_find', [service1], dict(all=True)), expected=dict( count=1, truncated=False, summary=u'1 service matched', result=[ dict( dn=lambda x: DN(x) == service1dn, krbprincipalname=[service1], objectclass=objectclasses.service, ipauniqueid=[fuzzy_uuid], has_keytab=False, managedby_host=[fqdn1], ), ], ), ),
dict( desc='Add non-existent host to %r' % service1, command=('service_add_host', [service1], dict(host=u'notfound')), expected=dict( failed=dict(managedby=dict(host=[(u'notfound', u'no such entry')])), completed=0, result=dict( dn=lambda x: DN(x) == service1dn, krbprincipalname=[service1], managedby_host=[fqdn1], ), ), ),
dict( desc='Remove non-existent host from %r' % service1, command=('service_remove_host', [service1], dict(host=u'notfound')), expected=dict( failed=dict(managedby=dict(host=[(u'notfound', u'This entry is not a member')])), completed=0, result=dict( dn=lambda x: DN(x) == service1dn, krbprincipalname=[service1], managedby_host=[fqdn1], ), ), ),
dict( desc='Add host to %r' % service1, command=('service_add_host', [service1], dict(host=fqdn2)), expected=dict( failed=dict(managedby=dict(host=[])), completed=1, result=dict( dn=lambda x: DN(x) == service1dn, krbprincipalname=[service1], managedby_host=[fqdn1, fqdn2], ), ), ),
dict( desc='Remove host from %r' % service1, command=('service_remove_host', [service1], dict(host=fqdn2)), expected=dict( failed=dict(managedby=dict(host=[])), completed=1, result=dict( dn=lambda x: DN(x) == service1dn, krbprincipalname=[service1], managedby_host=[fqdn1], ), ), ),
dict( desc='Add mixed-case host to %r' % service1, command=('service_add_host', [service1], dict(host=fqdn3)), expected=dict( failed=dict(managedby=dict(host=[])), completed=1, result=dict( dn=lambda x: DN(x) == service1dn, krbprincipalname=[service1], managedby_host=[fqdn1, fqdn3.lower()], ), ), ),
dict( desc='Remove mixed-case host from %r' % service1, command=('service_remove_host', [service1], dict(host=fqdn3)), expected=dict( failed=dict(managedby=dict(host=[])), completed=1, result=dict( dn=lambda x: DN(x) == service1dn, krbprincipalname=[service1], managedby_host=[fqdn1], ), ), ),
dict( desc='Update %r with a bad certificate' % service1, command=('service_mod', [service1], dict(usercertificate=badservercert)), expected=errors.CertificateOperationError( error=u'Issuer "CN=IPA Test Certificate Authority" does not ' + u'match the expected issuer'), ),
dict( desc='Update %r' % service1, command=('service_mod', [service1], dict(usercertificate=servercert)), expected=dict( value=service1, summary=u'Modified service "%s"' % service1, result=dict( usercertificate=[base64.b64decode(servercert)], krbprincipalname=[service1], managedby_host=[fqdn1], valid_not_before=fuzzy_date, valid_not_after=fuzzy_date, subject=lambda x: DN(x) == \ DN(('CN',api.env.host),x509.subject_base()), serial_number=fuzzy_digits, serial_number_hex=fuzzy_hex, md5_fingerprint=fuzzy_hash, sha1_fingerprint=fuzzy_hash, issuer=fuzzy_issuer, ), ), ),
dict( desc='Retrieve %r to verify update' % service1, command=('service_show', [service1], {}), expected=dict( value=service1, summary=None, result=dict( dn=lambda x: DN(x) == service1dn, usercertificate=[base64.b64decode(servercert)], krbprincipalname=[service1], has_keytab=False, managedby_host=[fqdn1], # These values come from the servercert that is in this # test case. valid_not_before=fuzzy_date, valid_not_after=fuzzy_date, subject=lambda x: DN(x) == \ DN(('CN',api.env.host),x509.subject_base()), serial_number=fuzzy_digits, serial_number_hex=fuzzy_hex, md5_fingerprint=fuzzy_hash, sha1_fingerprint=fuzzy_hash, issuer=fuzzy_issuer, ), ), ),
dict( desc='Delete %r' % service1, command=('service_del', [service1], {}), expected=dict( value=service1, summary=u'Deleted service "%s"' % service1, result=dict(failed=u''), ), ),
dict( desc='Try to retrieve non-existent %r' % service1, command=('service_show', [service1], {}), expected=errors.NotFound( reason=u'%s: service not found' % service1), ),
dict( desc='Try to update non-existent %r' % service1, command=('service_mod', [service1], dict(usercertificate=servercert)), expected=errors.NotFound(reason='no such entry'), ),
dict( desc='Try to delete non-existent %r' % service1, command=('service_del', [service1], {}), expected=errors.NotFound(reason='no such entry'), ),
dict( desc='Create service with malformed principal "foo"', command=('service_add', [u'foo'], {}), expected=errors.MalformedServicePrincipal(reason='missing service') ),
dict( desc='Create service with bad realm "HTTP/foo@FOO.NET"', command=('service_add', [u'HTTP/foo@FOO.NET'], {}), expected=errors.RealmMismatch(), ),
dict( desc='Create a host service %r' % hostprincipal1, command=('service_add', [hostprincipal1], {}), expected=errors.HostService() ),
# These tests will only succeed when running against lite-server.py # on same box as IPA install. dict( desc='Delete the current host (master?) %s HTTP service, should be caught' % api.env.host, command=('service_del', ['HTTP/%s' % api.env.host], {}), expected=errors.ValidationError(name='principal', error='This principal is required by the IPA master'), ),
dict( desc='Delete the current host (master?) %s ldap service, should be caught' % api.env.host, command=('service_del', ['ldap/%s' % api.env.host], {}), expected=errors.ValidationError(name='principal', error='This principal is required by the IPA master'), ),
dict( desc='Disable the current host (master?) %s HTTP service, should be caught' % api.env.host, command=('service_disable', ['HTTP/%s' % api.env.host], {}), expected=errors.ValidationError(name='principal', error='This principal is required by the IPA master'), ),
dict( desc='Disable the current host (master?) %s ldap service, should be caught' % api.env.host, command=('service_disable', ['ldap/%s' % api.env.host], {}), expected=errors.ValidationError(name='principal', error='This principal is required by the IPA master'), ),
] |