diff options
Diffstat (limited to 'ipatests/test_integration')
-rw-r--r-- | ipatests/test_integration/tasks.py | 2 | ||||
-rw-r--r-- | ipatests/test_integration/test_sudo.py | 335 |
2 files changed, 336 insertions, 1 deletions
diff --git a/ipatests/test_integration/tasks.py b/ipatests/test_integration/tasks.py index 2334e254e..a6c6f30d4 100644 --- a/ipatests/test_integration/tasks.py +++ b/ipatests/test_integration/tasks.py @@ -430,7 +430,7 @@ def clear_sssd_cache(host): host.run_command(['/sbin/service', 'sssd', 'start']) # To avoid false negatives due to SSSD not responding yet - time.sleep(2) + time.sleep(10) def sync_time(host, server): diff --git a/ipatests/test_integration/test_sudo.py b/ipatests/test_integration/test_sudo.py new file mode 100644 index 000000000..42c9b6b6a --- /dev/null +++ b/ipatests/test_integration/test_sudo.py @@ -0,0 +1,335 @@ +# Authors: +# Tomas Babej <tbabej@redhat.com> +# +# Copyright (C) 2014 Red Hat +# see file 'COPYING' for use and warranty information +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <http://www.gnu.org/licenses/>. + +from ipatests.test_integration.base import IntegrationTest +from ipatests.test_integration.tasks import clear_sssd_cache + + +class TestSudo(IntegrationTest): + """ + Test Sudo + http://www.freeipa.org/page/V4/Sudo_Integration#Test_Plan + """ + num_clients = 1 + topology = 'line' + + @classmethod + def setup_class(cls): + super(TestSudo, cls).setup_class() + + cls.client = cls.clients[0] + + for i in range(1, 3): + # Add 1. and 2. testing user + cls.master.run_command(['ipa', 'user-add', + 'testuser%d' % i, + '--first', 'Test', + '--last', 'User%d' % i]) + + # Add 1. and 2. testing groups + cls.master.run_command(['ipa', 'group-add', + 'testgroup%d' % i, + '--desc', '"%d. testing group"' % i]) + + # Add respective members to each group + cls.master.run_command(['ipa', 'group-add-member', + 'testgroup%d' % i, + '--users', 'testuser%d' % i]) + + # Add hostgroup containing the client + cls.master.run_command(['ipa', 'hostgroup-add', + 'testhostgroup', + '--desc', '"Contains client"']) + + # Add the client to the host group + cls.master.run_command(['ipa', 'hostgroup-add-member', + 'testhostgroup', + '--hosts', cls.client.hostname]) + + def list_sudo_commands(self, user, raiseonerr=False, verbose=False): + clear_sssd_cache(self.client) + list_flag = '-ll' if verbose else '-l' + return self.client.run_command('su -c "sudo %s" %s' % (list_flag, user), + raiseonerr=raiseonerr) + + def reset_rule_categories(self): + # Reset testrule to allow everything + self.master.run_command(['ipa', 'sudorule-mod', + 'testrule', + '--usercat=all', + '--hostcat=all', + '--cmdcat=all', + '--runasusercat=all', + '--runasgroupcat=all'], raiseonerr=False) + + def test_nisdomainname(self): + result = self.client.run_command('nisdomainname') + assert self.client.domain.name in result.stdout_text + + def test_add_sudo_commands(self): + # Group: Readers + self.master.run_command(['ipa', 'sudocmd-add', '/usr/bin/cat']) + self.master.run_command(['ipa', 'sudocmd-add', '/usr/bin/tail']) + + # No group + self.master.run_command(['ipa', 'sudocmd-add', '/usr/bin/yum']) + + def test_add_sudo_command_groups(self): + self.master.run_command(['ipa', 'sudocmdgroup-add', 'readers', + '--desc', '"Applications that read"']) + + self.master.run_command(['ipa', 'sudocmdgroup-add-member', 'readers', + '--sudocmds', '/usr/bin/cat']) + + self.master.run_command(['ipa', 'sudocmdgroup-add-member', 'readers', + '--sudocmds', '/usr/bin/tail']) + + def test_create_allow_all_rule(self): + # Create rule that allows everything + self.master.run_command(['ipa', 'sudorule-add', + 'testrule', + '--usercat=all', + '--hostcat=all', + '--cmdcat=all', + '--runasusercat=all', + '--runasgroupcat=all']) + + # Add !authenticate option + self.master.run_command(['ipa', 'sudorule-add-option', + 'testrule', + '--sudooption', "!authenticate"]) + + def test_add_sudo_rule(self): + result1 = self.list_sudo_commands("testuser1") + assert "(ALL) NOPASSWD: ALL" in result1.stdout_text + + result2 = self.list_sudo_commands("testuser2") + assert "(ALL) NOPASSWD: ALL" in result2.stdout_text + + def test_sudo_rule_restricted_to_one_user_setup(self): + # Configure the rule to not apply to anybody + self.master.run_command(['ipa', 'sudorule-mod', + 'testrule', + '--usercat=']) + + # Add the testuser1 to the rule + self.master.run_command(['ipa', 'sudorule-add-user', + 'testrule', + '--users', 'testuser1']) + + def test_sudo_rule_restricted_to_one_user(self): + result1 = self.list_sudo_commands("testuser1") + assert "(ALL) NOPASSWD: ALL" in result1.stdout_text + + result2 = self.list_sudo_commands("testuser2", raiseonerr=False) + assert result2.returncode != 0 + + def test_sudo_rule_restricted_to_one_user_teardown(self): + # Remove the testuser1 from the rule + self.master.run_command(['ipa', 'sudorule-remove-user', + 'testrule', + '--users', 'testuser1']) + + def test_sudo_rule_restricted_to_one_group_setup(self): + # Add the testgroup2 to the rule + self.master.run_command(['ipa', 'sudorule-add-user', + 'testrule', + '--groups', 'testgroup2']) + + def test_sudo_rule_restricted_to_one_group(self): + result1 = self.list_sudo_commands("testuser1", raiseonerr=False) + assert result1.returncode != 0 + + result2 = self.list_sudo_commands("testuser2") + assert "(ALL) NOPASSWD: ALL" in result2.stdout_text + + def test_sudo_rule_restricted_to_one_group_teardown(self): + # Remove the testgroup2 from the rule + self.master.run_command(['ipa', 'sudorule-remove-user', + 'testrule', + '--groups', 'testgroup2']) + + def test_sudo_rule_restricted_to_one_host_negative_setup(self): + # Reset testrule configuration + self.reset_rule_categories() + + # Configure the rule to not apply anywhere + self.master.run_command(['ipa', 'sudorule-mod', + 'testrule', + '--hostcat=']) + + # Add the master to the rule + self.master.run_command(['ipa', 'sudorule-add-host', + 'testrule', + '--hosts', self.master.hostname]) + + def test_sudo_rule_restricted_to_one_host_negative(self): + result1 = self.list_sudo_commands("testuser1", raiseonerr=False) + assert result1.returncode != 0 + + def test_sudo_rule_restricted_to_one_host_negative_teardown(self): + # Remove the master from the rule + self.master.run_command(['ipa', 'sudorule-remove-host', + 'testrule', + '--hosts', self.master.hostname]) + + def test_sudo_rule_restricted_to_one_host_setup(self): + # Configure the rulle to not apply anywhere + self.master.run_command(['ipa', 'sudorule-mod', + 'testrule', + '--hostcat='], raiseonerr=False) + + # Add the master to the rule + self.master.run_command(['ipa', 'sudorule-add-host', + 'testrule', + '--hosts', self.client.hostname]) + + def test_sudo_rule_restricted_to_one_host(self): + result1 = self.list_sudo_commands("testuser1", raiseonerr=False) + assert "(ALL) NOPASSWD: ALL" in result1.stdout_text + + def test_sudo_rule_restricted_to_one_host_teardown(self): + # Remove the master from the rule + self.master.run_command(['ipa', 'sudorule-remove-host', + 'testrule', + '--hosts', self.client.hostname]) + + def test_sudo_rule_restricted_to_one_hostgroup_setup(self): + # Add the testhostgroup to the rule + self.master.run_command(['ipa', 'sudorule-add-host', + 'testrule', + '--hostgroups', 'testhostgroup']) + + def test_sudo_rule_restricted_to_one_hostgroup(self): + result1 = self.list_sudo_commands("testuser1") + assert "(ALL) NOPASSWD: ALL" in result1.stdout_text + + def test_sudo_rule_restricted_to_one_hostgroup_teardown(self): + # Remove the testhostgroup from the rule + self.master.run_command(['ipa', 'sudorule-remove-host', + 'testrule', + '--hostgroups', 'testhostgroup']) + + def test_sudo_rule_restricted_to_one_command_setup(self): + # Reset testrule configuration + self.reset_rule_categories() + + # Configure the rule to not allow any command + self.master.run_command(['ipa', 'sudorule-mod', + 'testrule', + '--cmdcat=']) + + # Add the yum command to the rule + self.master.run_command(['ipa', 'sudorule-add-allow-command', + 'testrule', + '--sudocmds', '/usr/bin/yum']) + + def test_sudo_rule_restricted_to_one_command(self): + result1 = self.list_sudo_commands("testuser1") + assert "(ALL) NOPASSWD: /usr/bin/yum" in result1.stdout_text + + def test_sudo_rule_restricted_to_command_and_command_group_setup(self): + # Add the readers command group to the rule + self.master.run_command(['ipa', 'sudorule-add-allow-command', + 'testrule', + '--sudocmdgroups', 'readers']) + + def test_sudo_rule_restricted_to_command_and_command_group(self): + result1 = self.list_sudo_commands("testuser1") + assert "(ALL) NOPASSWD:" in result1.stdout_text + assert "/usr/bin/yum" in result1.stdout_text + assert "/usr/bin/tail" in result1.stdout_text + assert "/usr/bin/cat" in result1.stdout_text + + def test_sudo_rule_restricted_to_command_and_command_group_teardown(self): + # Remove the yum command from the rule + self.master.run_command(['ipa', 'sudorule-remove-allow-command', + 'testrule', + '--sudocmds', '/usr/bin/yum']) + + # Remove the readers command group from the rule + self.master.run_command(['ipa', 'sudorule-remove-allow-command', + 'testrule', + '--sudocmdgroups', 'readers']) + + def test_sudo_rule_restricted_to_running_as_single_user_setup(self): + # Reset testrule configuration + self.reset_rule_categories() + + # Configure the rule to not allow running commands as anybody + self.master.run_command(['ipa', 'sudorule-mod', + 'testrule', + '--runasusercat=']) + + self.master.run_command(['ipa', 'sudorule-mod', + 'testrule', + '--runasgroupcat=']) + + # Allow running commands as testuser2 + self.master.run_command(['ipa', 'sudorule-add-runasuser', + 'testrule', + '--users', 'testuser2']) + + def test_sudo_rule_restricted_to_running_as_single_user(self): + result1 = self.list_sudo_commands("testuser1", verbose=True) + assert "RunAsUsers: testuser2" in result1.stdout_text + assert "RunAsGroups:" not in result1.stdout_text + + def test_sudo_rule_restricted_to_running_as_single_user_teardown(self): + # Remove permission to run commands as testuser2 + self.master.run_command(['ipa', 'sudorule-remove-runasuser', + 'testrule', + '--users', 'testuser2']) + + def test_sudo_rule_restricted_to_running_as_users_from_group_setup(self): + # Allow running commands as users from testgroup2 + self.master.run_command(['ipa', 'sudorule-add-runasuser', + 'testrule', + '--groups', 'testgroup2']) + + def test_sudo_rule_restricted_to_running_as_users_from_group(self): + result1 = self.list_sudo_commands("testuser1", verbose=True) + assert "RunAsUsers: testuser2" in result1.stdout_text + assert "RunAsGroups:" not in result1.stdout_text + + def test_sudo_rule_restricted_to_running_as_users_from_group_teardown(self): + # Remove permission to run commands as testuser2 + self.master.run_command(['ipa', 'sudorule-remove-runasuser', + 'testrule', + '--groups', 'testgroup2']) + + def test_sudo_rule_restricted_to_running_as_single_group_setup(self): + # Allow running commands as testgroup2 + self.master.run_command(['ipa', 'sudorule-add-runasgroup', + 'testrule', + '--groups', 'testgroup2']) + + def test_sudo_rule_restricted_to_running_as_single_group(self): + result1 = self.list_sudo_commands("testuser1", verbose=True) + assert "RunAsUsers:" not in result1.stdout_text + assert "RunAsGroups: testgroup2" in result1.stdout_text + + def test_sudo_rule_restricted_to_running_as_single_group_teardown(self): + # Remove permission to run commands as testgroup2 + self.master.run_command(['ipa', 'sudorule-remove-runasgroup', + 'testrule', + '--groups', 'testgroup2']) + + # Reset testrule configuration + self.reset_rule_categories() |