summaryrefslogtreecommitdiffstats
path: root/ipatests/test_webui/test_group.py
diff options
context:
space:
mode:
Diffstat (limited to 'ipatests/test_webui/test_group.py')
-rw-r--r--ipatests/test_webui/test_group.py194
1 files changed, 194 insertions, 0 deletions
diff --git a/ipatests/test_webui/test_group.py b/ipatests/test_webui/test_group.py
new file mode 100644
index 000000000..645dba0a0
--- /dev/null
+++ b/ipatests/test_webui/test_group.py
@@ -0,0 +1,194 @@
+# Authors:
+# Petr Vobornik <pvoborni@redhat.com>
+#
+# Copyright (C) 2013 Red Hat
+# see file 'COPYING' for use and warranty information
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program. If not, see <http://www.gnu.org/licenses/>.
+
+"""
+Group tests
+"""
+
+from ipatests.test_webui.ui_driver import UI_driver
+import ipatests.test_webui.data_group as group
+import ipatests.test_webui.data_user as user
+import ipatests.test_webui.data_netgroup as netgroup
+import ipatests.test_webui.data_hbac as hbac
+import ipatests.test_webui.test_rbac as rbac
+import ipatests.test_webui.data_sudo as sudo
+
+
+class test_group(UI_driver):
+
+ def test_crud(self):
+ """
+ Basic CRUD: group
+ """
+ self.init_app()
+ self.basic_crud(group.ENTITY, group.DATA,
+ default_facet=group.DEFAULT_FACET)
+
+ def test_actions(self):
+ """
+ Test group actions
+ """
+
+ self.init_app()
+
+ self.add_record(group.ENTITY, group.DATA)
+ self.navigate_to_record(group.PKEY)
+ self.switch_to_facet('details')
+ self.make_posix_action()
+ self.delete_action()
+
+ self.add_record(group.ENTITY, group.DATA, navigate=False)
+ self.navigate_to_record(group.PKEY)
+ self.switch_to_facet('details')
+ self.facet_button_click('refresh')# workaround for BUG: #3702
+ self.make_external_action()
+ self.delete_action()
+
+ def make_external_action(self):
+ self.action_list_action('make_external')
+ self.wait_for_request(n=2)
+ self.assert_no_error_dialog()
+ self.assert_text_field('external', 'External', element='span')
+
+ def make_posix_action(self):
+ self.action_list_action('make_posix')
+ self.wait_for_request(n=2)
+ self.assert_no_error_dialog()
+ self.assert_text_field('external', 'POSIX', element='span')
+
+ def delete_action(self, entity=group.ENTITY, pkey=group.PKEY):
+ self.action_list_action('delete')
+ self.wait_for_request(n=4)
+ self.assert_no_error_dialog()
+ self.assert_facet(entity, 'search')
+ self.assert_record(pkey, negative=True)
+
+ def test_associations(self):
+ """
+ Test group associations
+ """
+ self.init_app()
+
+ # prepare
+ # -------
+ self.add_record(group.ENTITY, group.DATA)
+ self.add_record(group.ENTITY, group.DATA2, navigate=False)
+ self.add_record(group.ENTITY, group.DATA3, navigate=False)
+ self.add_record(user.ENTITY, user.DATA)
+ self.add_record(netgroup.ENTITY, netgroup.DATA)
+ self.add_record(rbac.ROLE_ENTITY, rbac.ROLE_DATA)
+ self.add_record(hbac.RULE_ENTITY, hbac.RULE_DATA)
+ self.add_record(sudo.RULE_ENTITY, sudo.RULE_DATA)
+
+ # add & remove associations
+ # -------------------------
+ self.navigate_to_record(group.PKEY, entity=group.ENTITY)
+
+ # members
+ self.add_associations([group.PKEY2], facet='member_group', delete=True)
+ self.add_associations([user.PKEY], facet='member_user', delete=True)
+ # TODO: external
+
+ # member of
+ self.add_associations([group.PKEY3], facet='memberof_group', delete=True)
+ self.add_associations([netgroup.PKEY], facet='memberof_netgroup', delete=True)
+ self.add_associations([rbac.ROLE_PKEY], facet='memberof_role', delete=True)
+ self.add_associations([hbac.RULE_PKEY], facet='memberof_hbacrule', delete=True)
+ self.navigate_to_record(group.PKEY, entity=group.ENTITY)
+ self.add_associations([sudo.RULE_PKEY], facet='memberof_sudorule', delete=True)
+
+ # cleanup
+ # -------
+ self.delete(group.ENTITY, [group.DATA, group.DATA2, group.DATA3])
+ self.delete(user.ENTITY, [user.DATA])
+ self.delete(netgroup.ENTITY, [netgroup.DATA])
+ self.delete(rbac.ROLE_ENTITY, [rbac.ROLE_DATA])
+ self.delete(hbac.RULE_ENTITY, [hbac.RULE_DATA])
+ self.delete(sudo.RULE_ENTITY, [sudo.RULE_DATA])
+
+ def test_indirect_associations(self):
+ """
+ Group indirect associations
+ """
+ self.init_app()
+
+ # add
+ # ---
+ self.add_record(group.ENTITY, group.DATA)
+ self.add_record(group.ENTITY, group.DATA2, navigate=False)
+ self.add_record(group.ENTITY, group.DATA3, navigate=False)
+ self.add_record(group.ENTITY, group.DATA4, navigate=False)
+ self.add_record(group.ENTITY, group.DATA5, navigate=False)
+ self.add_record(user.ENTITY, user.DATA)
+
+ # prepare indirect member
+ self.navigate_to_entity(group.ENTITY, 'search')
+ self.navigate_to_record(group.PKEY2)
+ self.add_associations([user.PKEY])
+ self.add_associations([group.PKEY3], 'member_group')
+
+ self.navigate_to_entity(group.ENTITY, 'search')
+ self.navigate_to_record(group.PKEY)
+ self.add_associations([group.PKEY2], 'member_group')
+
+ # prepare indirect memberof
+ self.navigate_to_entity(group.ENTITY, 'search')
+ self.navigate_to_record(group.PKEY4)
+ self.add_associations([group.PKEY], 'member_group')
+ self.add_associations([group.PKEY5], 'memberof_group')
+
+
+ self.add_record(netgroup.ENTITY, netgroup.DATA)
+ self.navigate_to_record(netgroup.PKEY)
+ self.add_table_associations('memberuser_group', [group.PKEY4])
+
+ self.add_record(rbac.ROLE_ENTITY, rbac.ROLE_DATA)
+ self.navigate_to_record(rbac.ROLE_PKEY)
+ self.add_associations([group.PKEY4], facet='member_group')
+
+ self.add_record(hbac.RULE_ENTITY, hbac.RULE_DATA)
+ self.navigate_to_record(hbac.RULE_PKEY)
+ self.add_table_associations('memberuser_group', [group.PKEY4])
+
+ self.add_record(sudo.RULE_ENTITY, sudo.RULE_DATA)
+ self.navigate_to_record(sudo.RULE_PKEY)
+ self.add_table_associations('memberuser_group', [group.PKEY4])
+
+ # check indirect associations
+ # ---------------------------
+ self.navigate_to_entity(group.ENTITY, 'search')
+ self.navigate_to_record(group.PKEY)
+
+ self.assert_indirect_record(user.PKEY, group.ENTITY, 'member_user')
+ self.assert_indirect_record(group.PKEY3, group.ENTITY, 'member_group')
+
+ self.assert_indirect_record(group.PKEY5, group.ENTITY, 'memberof_group')
+ self.assert_indirect_record(netgroup.PKEY, group.ENTITY, 'memberof_netgroup')
+ self.assert_indirect_record(rbac.ROLE_PKEY, group.ENTITY, 'memberof_role')
+ self.assert_indirect_record(hbac.RULE_PKEY, group.ENTITY, 'memberof_hbacrule')
+ self.assert_indirect_record(sudo.RULE_PKEY, group.ENTITY, 'memberof_sudorule')
+
+ ## cleanup
+ ## -------
+ self.delete(group.ENTITY, [group.DATA, group.DATA2, group.DATA3, group.DATA4, group.DATA5])
+ self.delete(user.ENTITY, [user.DATA])
+ self.delete(netgroup.ENTITY, [netgroup.DATA])
+ self.delete(rbac.ROLE_ENTITY, [rbac.ROLE_DATA])
+ self.delete(hbac.RULE_ENTITY, [hbac.RULE_DATA])
+ self.delete(sudo.RULE_ENTITY, [sudo.RULE_DATA])