Hot-keys on this page

r m x p   toggle line displays

j k   next/prev highlighted chunk

0   (zero) top of page

1   (one) first highlighted chunk

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

# Authors: 

#   Rob Crittenden <rcritten@redhat.com> 

# 

# Copyright (C) 2010  Red Hat 

# see file 'COPYING' for use and warranty information 

# 

# This program is free software; you can redistribute it and/or modify 

# it under the terms of the GNU General Public License as published by 

# the Free Software Foundation, either version 3 of the License, or 

# (at your option) any later version. 

# 

# This program is distributed in the hope that it will be useful, 

# but WITHOUT ANY WARRANTY; without even the implied warranty of 

# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the 

# GNU General Public License for more details. 

# 

# You should have received a copy of the GNU General Public License 

# along with this program.  If not, see <http://www.gnu.org/licenses/>. 

 

# Test some simple LDAP requests using the ldap2 backend 

 

# This fetches a certificate from a host principal so we can ensure that the 

# schema is working properly. We know this because the schema will tell the 

# encoder not to utf-8 encode binary attributes. 

 

# The DM password needs to be set in ~/.ipa/.dmpw 

 

import os 

 

import nose 

from nose.tools import assert_raises  # pylint: disable=E0611 

import nss.nss as nss 

 

from ipaserver.plugins.ldap2 import ldap2 

from ipalib.plugins.service import service, service_show 

from ipalib.plugins.host import host 

from ipalib import api, x509, create_api, errors 

from ipapython import ipautil 

from ipapython.dn import DN 

 

class test_ldap(object): 

    """ 

    Test various LDAP client bind methods. 

    """ 

 

    def setUp(self): 

        self.conn = None 

        self.ldapuri = 'ldap://%s' % ipautil.format_netloc(api.env.host) 

        self.ccache = '/tmp/krb5cc_%d' % os.getuid() 

        nss.nss_init_nodb() 

        self.dn = DN(('krbprincipalname','ldap/%s@%s' % (api.env.host, api.env.realm)), 

                     ('cn','services'),('cn','accounts'),api.env.basedn) 

 

    def tearDown(self): 

        if self.conn and self.conn.isconnected(): 

            self.conn.disconnect() 

 

    def test_anonymous(self): 

        """ 

        Test an anonymous LDAP bind using ldap2 

        """ 

        self.conn = ldap2(shared_instance=False, ldap_uri=self.ldapuri) 

        self.conn.connect() 

        (dn, entry_attrs) = self.conn.get_entry(self.dn, ['usercertificate']) 

        cert = entry_attrs.get('usercertificate') 

        cert = cert[0] 

        serial = unicode(x509.get_serial_number(cert, x509.DER)) 

        assert serial is not None 

 

    def test_GSSAPI(self): 

        """ 

        Test a GSSAPI LDAP bind using ldap2 

        """ 

        if not ipautil.file_exists(self.ccache): 

            raise nose.SkipTest('Missing ccache %s' % self.ccache) 

        self.conn = ldap2(shared_instance=False, ldap_uri=self.ldapuri) 

        self.conn.connect(ccache='FILE:%s' % self.ccache) 

        (dn, entry_attrs) = self.conn.get_entry(self.dn, ['usercertificate']) 

        cert = entry_attrs.get('usercertificate') 

        cert = cert[0] 

        serial = unicode(x509.get_serial_number(cert, x509.DER)) 

        assert serial is not None 

 

    def test_simple(self): 

        """ 

        Test a simple LDAP bind using ldap2 

        """ 

        pwfile = api.env.dot_ipa + os.sep + ".dmpw" 

        if ipautil.file_exists(pwfile): 

            fp = open(pwfile, "r") 

            dm_password = fp.read().rstrip() 

            fp.close() 

        else: 

            raise nose.SkipTest("No directory manager password in %s" % pwfile) 

        self.conn = ldap2(shared_instance=False, ldap_uri=self.ldapuri) 

        self.conn.connect(bind_dn=DN(('cn', 'directory manager')), bind_pw=dm_password) 

        (dn, entry_attrs) = self.conn.get_entry(self.dn, ['usercertificate']) 

        cert = entry_attrs.get('usercertificate') 

        cert = cert[0] 

        serial = unicode(x509.get_serial_number(cert, x509.DER)) 

        assert serial is not None 

 

    def test_Backend(self): 

        """ 

        Test using the ldap2 Backend directly (ala ipa-server-install) 

        """ 

 

        # Create our own api because the one generated for the tests is 

        # a client-only api. Then we register in the commands and objects 

        # we need for the test. 

        myapi = create_api(mode=None) 

        myapi.bootstrap(context='cli', in_server=True, in_tree=True) 

        myapi.register(ldap2) 

        myapi.register(host) 

        myapi.register(service) 

        myapi.register(service_show) 

        myapi.finalize() 

 

        pwfile = api.env.dot_ipa + os.sep + ".dmpw" 

        if ipautil.file_exists(pwfile): 

            fp = open(pwfile, "r") 

            dm_password = fp.read().rstrip() 

            fp.close() 

        else: 

            raise nose.SkipTest("No directory manager password in %s" % pwfile) 

        myapi.Backend.ldap2.connect(bind_dn=DN(('cn', 'Directory Manager')), bind_pw=dm_password) 

 

        result = myapi.Command['service_show']('ldap/%s@%s' %  (api.env.host, api.env.realm,)) 

        entry_attrs = result['result'] 

        cert = entry_attrs.get('usercertificate') 

        cert = cert[0] 

        serial = unicode(x509.get_serial_number(cert, x509.DER)) 

        assert serial is not None 

 

    def test_autobind(self): 

        """ 

        Test an autobind LDAP bind using ldap2 

        """ 

        ldapuri = 'ldapi://%%2fvar%%2frun%%2fslapd-%s.socket' % api.env.realm.replace('.','-') 

        self.conn = ldap2(shared_instance=False, ldap_uri=ldapuri) 

        try: 

            self.conn.connect(autobind=True) 

        except errors.ACIError: 

            raise nose.SkipTest("Only executed as root") 

        (dn, entry_attrs) = self.conn.get_entry(self.dn, ['usercertificate']) 

        cert = entry_attrs.get('usercertificate') 

        cert = cert[0] 

        serial = unicode(x509.get_serial_number(cert, x509.DER)) 

        assert serial is not None 

 

 

class test_LDAPEntry(object): 

    """ 

    Test the LDAPEntry class 

    """ 

    cn1 = [u'test1'] 

    cn2 = [u'test2'] 

    dn1 = DN(('cn', cn1[0])) 

    dn2 = DN(('cn', cn2[0])) 

 

    def setUp(self): 

        self.ldapuri = 'ldap://%s' % ipautil.format_netloc(api.env.host) 

        self.conn = ldap2(shared_instance=False, ldap_uri=self.ldapuri) 

        self.conn.connect() 

 

        self.entry = self.conn.make_entry(self.dn1, cn=self.cn1) 

 

    def tearDown(self): 

        if self.conn and self.conn.isconnected(): 

            self.conn.disconnect() 

 

    def test_entry(self): 

        e = self.entry 

        assert e.dn is self.dn1 

        assert u'cn' in e 

        assert u'cn' in e.keys() 

        assert 'CN' in e 

        assert 'CN' not in e.keys() 

        assert 'commonName' in e 

        assert 'commonName' not in e.keys() 

        assert e['CN'] is self.cn1 

        assert e['CN'] is e[u'cn'] 

 

        e.dn = self.dn2 

        assert e.dn is self.dn2 

 

    def test_set_attr(self): 

        e = self.entry 

        e['commonName'] = self.cn2 

        assert u'cn' in e 

        assert u'cn' not in e.keys() 

        assert 'CN' in e 

        assert 'CN' not in e.keys() 

        assert 'commonName' in e 

        assert 'commonName' in e.keys() 

        assert e['CN'] is self.cn2 

        assert e['CN'] is e[u'cn'] 

 

    def test_del_attr(self): 

        e = self.entry 

        del e['CN'] 

        assert 'CN' not in e 

        assert 'CN' not in e.keys() 

        assert u'cn' not in e 

        assert u'cn' not in e.keys() 

        assert 'commonName' not in e 

        assert 'commonName' not in e.keys() 

 

    def test_popitem(self): 

        e = self.entry 

        assert e.popitem() == ('cn', self.cn1) 

        e.keys() == [] 

 

    def test_setdefault(self): 

        e = self.entry 

        assert e.setdefault('cn', self.cn2) == self.cn1 

        assert e['cn'] == self.cn1 

        assert e.setdefault('xyz', self.cn2) == self.cn2 

        assert e['xyz'] == self.cn2 

 

    def test_update(self): 

        e = self.entry 

        e.update({'cn': self.cn2}, xyz=self.cn2) 

        assert e['cn'] == self.cn2 

        assert e['xyz'] == self.cn2 

 

    def test_pop(self): 

        e = self.entry 

        assert e.pop('cn') == self.cn1 

        assert 'cn' not in e 

        assert e.pop('cn', 'default') is 'default' 

        with assert_raises(KeyError): 

            e.pop('cn') 

 

    def test_clear(self): 

        e = self.entry 

        e.clear() 

        assert not e 

        assert 'cn' not in e 

 

    def test_has_key(self): 

        e = self.entry 

        assert not e.has_key('xyz') 

        assert e.has_key('cn') 

        assert e.has_key('COMMONNAME') 

 

    def test_get(self): 

        e = self.entry 

        assert e.get('cn') == self.cn1 

        assert e.get('commonname') == self.cn1 

        assert e.get('COMMONNAME', 'default') == self.cn1 

        assert e.get('bad key', 'default') == 'default' 

 

    def test_single_value(self): 

        e = self.entry 

        assert e.single_value('cn') == self.cn1[0] 

        assert e.single_value('commonname') == self.cn1[0] 

        assert e.single_value('COMMONNAME', 'default') == self.cn1[0] 

        assert e.single_value('bad key', 'default') == 'default'