diff options
Diffstat (limited to 'ipatests/test_webui/test_group.py')
-rw-r--r-- | ipatests/test_webui/test_group.py | 194 |
1 files changed, 194 insertions, 0 deletions
diff --git a/ipatests/test_webui/test_group.py b/ipatests/test_webui/test_group.py new file mode 100644 index 000000000..645dba0a0 --- /dev/null +++ b/ipatests/test_webui/test_group.py @@ -0,0 +1,194 @@ +# Authors: +# Petr Vobornik <pvoborni@redhat.com> +# +# Copyright (C) 2013 Red Hat +# see file 'COPYING' for use and warranty information +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <http://www.gnu.org/licenses/>. + +""" +Group tests +""" + +from ipatests.test_webui.ui_driver import UI_driver +import ipatests.test_webui.data_group as group +import ipatests.test_webui.data_user as user +import ipatests.test_webui.data_netgroup as netgroup +import ipatests.test_webui.data_hbac as hbac +import ipatests.test_webui.test_rbac as rbac +import ipatests.test_webui.data_sudo as sudo + + +class test_group(UI_driver): + + def test_crud(self): + """ + Basic CRUD: group + """ + self.init_app() + self.basic_crud(group.ENTITY, group.DATA, + default_facet=group.DEFAULT_FACET) + + def test_actions(self): + """ + Test group actions + """ + + self.init_app() + + self.add_record(group.ENTITY, group.DATA) + self.navigate_to_record(group.PKEY) + self.switch_to_facet('details') + self.make_posix_action() + self.delete_action() + + self.add_record(group.ENTITY, group.DATA, navigate=False) + self.navigate_to_record(group.PKEY) + self.switch_to_facet('details') + self.facet_button_click('refresh')# workaround for BUG: #3702 + self.make_external_action() + self.delete_action() + + def make_external_action(self): + self.action_list_action('make_external') + self.wait_for_request(n=2) + self.assert_no_error_dialog() + self.assert_text_field('external', 'External', element='span') + + def make_posix_action(self): + self.action_list_action('make_posix') + self.wait_for_request(n=2) + self.assert_no_error_dialog() + self.assert_text_field('external', 'POSIX', element='span') + + def delete_action(self, entity=group.ENTITY, pkey=group.PKEY): + self.action_list_action('delete') + self.wait_for_request(n=4) + self.assert_no_error_dialog() + self.assert_facet(entity, 'search') + self.assert_record(pkey, negative=True) + + def test_associations(self): + """ + Test group associations + """ + self.init_app() + + # prepare + # ------- + self.add_record(group.ENTITY, group.DATA) + self.add_record(group.ENTITY, group.DATA2, navigate=False) + self.add_record(group.ENTITY, group.DATA3, navigate=False) + self.add_record(user.ENTITY, user.DATA) + self.add_record(netgroup.ENTITY, netgroup.DATA) + self.add_record(rbac.ROLE_ENTITY, rbac.ROLE_DATA) + self.add_record(hbac.RULE_ENTITY, hbac.RULE_DATA) + self.add_record(sudo.RULE_ENTITY, sudo.RULE_DATA) + + # add & remove associations + # ------------------------- + self.navigate_to_record(group.PKEY, entity=group.ENTITY) + + # members + self.add_associations([group.PKEY2], facet='member_group', delete=True) + self.add_associations([user.PKEY], facet='member_user', delete=True) + # TODO: external + + # member of + self.add_associations([group.PKEY3], facet='memberof_group', delete=True) + self.add_associations([netgroup.PKEY], facet='memberof_netgroup', delete=True) + self.add_associations([rbac.ROLE_PKEY], facet='memberof_role', delete=True) + self.add_associations([hbac.RULE_PKEY], facet='memberof_hbacrule', delete=True) + self.navigate_to_record(group.PKEY, entity=group.ENTITY) + self.add_associations([sudo.RULE_PKEY], facet='memberof_sudorule', delete=True) + + # cleanup + # ------- + self.delete(group.ENTITY, [group.DATA, group.DATA2, group.DATA3]) + self.delete(user.ENTITY, [user.DATA]) + self.delete(netgroup.ENTITY, [netgroup.DATA]) + self.delete(rbac.ROLE_ENTITY, [rbac.ROLE_DATA]) + self.delete(hbac.RULE_ENTITY, [hbac.RULE_DATA]) + self.delete(sudo.RULE_ENTITY, [sudo.RULE_DATA]) + + def test_indirect_associations(self): + """ + Group indirect associations + """ + self.init_app() + + # add + # --- + self.add_record(group.ENTITY, group.DATA) + self.add_record(group.ENTITY, group.DATA2, navigate=False) + self.add_record(group.ENTITY, group.DATA3, navigate=False) + self.add_record(group.ENTITY, group.DATA4, navigate=False) + self.add_record(group.ENTITY, group.DATA5, navigate=False) + self.add_record(user.ENTITY, user.DATA) + + # prepare indirect member + self.navigate_to_entity(group.ENTITY, 'search') + self.navigate_to_record(group.PKEY2) + self.add_associations([user.PKEY]) + self.add_associations([group.PKEY3], 'member_group') + + self.navigate_to_entity(group.ENTITY, 'search') + self.navigate_to_record(group.PKEY) + self.add_associations([group.PKEY2], 'member_group') + + # prepare indirect memberof + self.navigate_to_entity(group.ENTITY, 'search') + self.navigate_to_record(group.PKEY4) + self.add_associations([group.PKEY], 'member_group') + self.add_associations([group.PKEY5], 'memberof_group') + + + self.add_record(netgroup.ENTITY, netgroup.DATA) + self.navigate_to_record(netgroup.PKEY) + self.add_table_associations('memberuser_group', [group.PKEY4]) + + self.add_record(rbac.ROLE_ENTITY, rbac.ROLE_DATA) + self.navigate_to_record(rbac.ROLE_PKEY) + self.add_associations([group.PKEY4], facet='member_group') + + self.add_record(hbac.RULE_ENTITY, hbac.RULE_DATA) + self.navigate_to_record(hbac.RULE_PKEY) + self.add_table_associations('memberuser_group', [group.PKEY4]) + + self.add_record(sudo.RULE_ENTITY, sudo.RULE_DATA) + self.navigate_to_record(sudo.RULE_PKEY) + self.add_table_associations('memberuser_group', [group.PKEY4]) + + # check indirect associations + # --------------------------- + self.navigate_to_entity(group.ENTITY, 'search') + self.navigate_to_record(group.PKEY) + + self.assert_indirect_record(user.PKEY, group.ENTITY, 'member_user') + self.assert_indirect_record(group.PKEY3, group.ENTITY, 'member_group') + + self.assert_indirect_record(group.PKEY5, group.ENTITY, 'memberof_group') + self.assert_indirect_record(netgroup.PKEY, group.ENTITY, 'memberof_netgroup') + self.assert_indirect_record(rbac.ROLE_PKEY, group.ENTITY, 'memberof_role') + self.assert_indirect_record(hbac.RULE_PKEY, group.ENTITY, 'memberof_hbacrule') + self.assert_indirect_record(sudo.RULE_PKEY, group.ENTITY, 'memberof_sudorule') + + ## cleanup + ## ------- + self.delete(group.ENTITY, [group.DATA, group.DATA2, group.DATA3, group.DATA4, group.DATA5]) + self.delete(user.ENTITY, [user.DATA]) + self.delete(netgroup.ENTITY, [netgroup.DATA]) + self.delete(rbac.ROLE_ENTITY, [rbac.ROLE_DATA]) + self.delete(hbac.RULE_ENTITY, [hbac.RULE_DATA]) + self.delete(sudo.RULE_ENTITY, [sudo.RULE_DATA]) |