summaryrefslogtreecommitdiffstats
path: root/tests
diff options
context:
space:
mode:
authorroot <root@webui.pzuna>2010-05-04 16:56:17 -0400
committerRob Crittenden <rcritten@redhat.com>2010-05-05 15:00:04 -0400
commitf6cde533fdc480a2bccfdf757f350bbc3aa49799 (patch)
tree5057f5e4915a53d73fa53e0ff1a995f7c3940fd9 /tests
parentfa59c8b9d33853f1676ea5c872451e088e83a8d3 (diff)
downloadfreeipa-f6cde533fdc480a2bccfdf757f350bbc3aa49799.tar.gz
freeipa-f6cde533fdc480a2bccfdf757f350bbc3aa49799.tar.xz
freeipa-f6cde533fdc480a2bccfdf757f350bbc3aa49799.zip
Add new password policy plugin based on baseldap.py classes.
Diffstat (limited to 'tests')
-rw-r--r--tests/test_xmlrpc/test_pwpolicy2.py171
1 files changed, 171 insertions, 0 deletions
diff --git a/tests/test_xmlrpc/test_pwpolicy2.py b/tests/test_xmlrpc/test_pwpolicy2.py
new file mode 100644
index 000000000..72c65beda
--- /dev/null
+++ b/tests/test_xmlrpc/test_pwpolicy2.py
@@ -0,0 +1,171 @@
+# Authors:
+# Rob Crittenden <rcritten@redhat.com>
+# Pavel Zuna <pzuna@redhat.com>
+#
+# Copyright (C) 2010 Red Hat
+# see file 'COPYING' for use and warranty information
+#
+# This program is free software; you can redistribute it and/or
+# modify it under the terms of the GNU General Public License as
+# published by the Free Software Foundation; version 2 only
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
+"""
+Test the `ipalib/plugins/pwpolicy2.py` module.
+"""
+
+import sys
+from xmlrpc_test import XMLRPC_test, assert_attr_equal
+from ipalib import api
+from ipalib import errors
+
+
+class test_pwpolicy2(XMLRPC_test):
+ """
+ Test the `pwpolicy2` plugin.
+ """
+ group = u'testgroup12'
+ group2 = u'testgroup22'
+ user = u'testuser12'
+ kw = {'cospriority': 1, 'krbminpwdlife': 30, 'krbmaxpwdlife': 40, 'krbpwdhistorylength': 5, 'krbpwdminlength': 6 }
+ kw2 = {'cospriority': 2, 'krbminpwdlife': 40, 'krbmaxpwdlife': 60, 'krbpwdhistorylength': 8, 'krbpwdminlength': 9 }
+
+ def test_1_pwpolicy2_add(self):
+ """
+ Test adding a per-group policy using the `xmlrpc.pwpolicy2_add` method.
+ """
+ # First set up a group and user that will use this policy
+ self.failsafe_add(
+ api.Object.group, self.group, description=u'pwpolicy test group',
+ )
+ self.failsafe_add(
+ api.Object.user, self.user, givenname=u'Test', sn=u'User'
+ )
+ api.Command.group_add_member(self.group, users=self.user)
+
+ entry = api.Command['pwpolicy2_add'](self.group, **self.kw)['result']
+ assert_attr_equal(entry, 'krbminpwdlife', '30')
+ assert_attr_equal(entry, 'krbmaxpwdlife', '40')
+ assert_attr_equal(entry, 'krbpwdhistorylength', '5')
+ assert_attr_equal(entry, 'krbpwdminlength', '6')
+ assert_attr_equal(entry, 'cospriority', '1')
+
+ def test_2_pwpolicy2_add(self):
+ """
+ Add a policy with a already used priority.
+
+ The priority validation is done first, so it's OK that the group
+ is the same here.
+ """
+ try:
+ api.Command['pwpolicy2_add'](self.group, **self.kw)
+ except errors.ValidationError:
+ pass
+ else:
+ assert False
+
+ def test_3_pwpolicy2_add(self):
+ """
+ Add a policy that already exists.
+ """
+ try:
+ # cospriority needs to be unique
+ self.kw['cospriority'] = 3
+ api.Command['pwpolicy2_add'](self.group, **self.kw)
+ except errors.DuplicateEntry:
+ pass
+ else:
+ assert False
+
+ def test_4_pwpolicy2_add(self):
+ """
+ Test adding another per-group policy using the `xmlrpc.pwpolicy2_add` method.
+ """
+ self.failsafe_add(
+ api.Object.group, self.group2, description=u'pwpolicy test group 2'
+ )
+ entry = api.Command['pwpolicy2_add'](self.group2, **self.kw2)['result']
+ assert_attr_equal(entry, 'krbminpwdlife', '40')
+ assert_attr_equal(entry, 'krbmaxpwdlife', '60')
+ assert_attr_equal(entry, 'krbpwdhistorylength', '8')
+ assert_attr_equal(entry, 'krbpwdminlength', '9')
+ assert_attr_equal(entry, 'cospriority', '2')
+
+ def test_5_pwpolicy2_add(self):
+ """
+ Add a pwpolicy for a non-existent group
+ """
+ try:
+ api.Command['pwpolicy2_add'](u'nopwpolicy', cospriority=1, krbminpwdlife=1)
+ except errors.NotFound:
+ pass
+ else:
+ assert False
+
+ def test_6_pwpolicy2_show(self):
+ """
+ Test the `xmlrpc.pwpolicy2_show` method with global policy.
+ """
+ entry = api.Command['pwpolicy2_show']()['result']
+ # Note that this assumes an unchanged global policy
+ assert_attr_equal(entry, 'krbminpwdlife', '1')
+ assert_attr_equal(entry, 'krbmaxpwdlife', '90')
+ assert_attr_equal(entry, 'krbpwdhistorylength', '0')
+ assert_attr_equal(entry, 'krbpwdminlength', '8')
+
+ def test_7_pwpolicy2_show(self):
+ """
+ Test the `xmlrpc.pwpolicy2_show` method.
+ """
+ entry = api.Command['pwpolicy2_show'](self.group)['result']
+ assert_attr_equal(entry, 'krbminpwdlife', '30')
+ assert_attr_equal(entry, 'krbmaxpwdlife', '40')
+ assert_attr_equal(entry, 'krbpwdhistorylength', '5')
+ assert_attr_equal(entry, 'krbpwdminlength', '6')
+ assert_attr_equal(entry, 'cospriority', '1')
+
+ def test_8_pwpolicy2_mod(self):
+ """
+ Test the `xmlrpc.pwpolicy2_mod` method for global policy.
+ """
+ entry = api.Command['pwpolicy2_mod'](krbminpwdlife=50)['result']
+ assert_attr_equal(entry, 'krbminpwdlife', '50')
+
+ # Great, now change it back
+ entry = api.Command['pwpolicy2_mod'](krbminpwdlife=1)['result']
+ assert_attr_equal(entry, 'krbminpwdlife', '1')
+
+ def test_9_pwpolicy2_mod(self):
+ """
+ Test the `xmlrpc.pwpolicy2_mod` method.
+ """
+ entry = api.Command['pwpolicy2_mod'](self.group, krbminpwdlife=50)['result']
+ assert_attr_equal(entry, 'krbminpwdlife', '50')
+
+ def test_a_pwpolicy_del(self):
+ """
+ Test the `xmlrpc.pwpolicy2_del` method.
+ """
+ assert api.Command['pwpolicy2_del'](self.group)['result'] is True
+ # Verify that it is gone
+ try:
+ api.Command['pwpolicy2_show'](self.group)
+ except errors.NotFound:
+ pass
+ else:
+ assert False
+
+ # Remove the groups we created
+ api.Command['group_del'](self.group)
+ api.Command['group_del'](self.group2)
+
+ # Remove the user we created
+ api.Command['user_del'](self.user)
+