diff options
Diffstat (limited to 'ipatests/test_webui/test_sudo.py')
-rw-r--r-- | ipatests/test_webui/test_sudo.py | 122 |
1 files changed, 122 insertions, 0 deletions
diff --git a/ipatests/test_webui/test_sudo.py b/ipatests/test_webui/test_sudo.py new file mode 100644 index 000000000..3e7b448e3 --- /dev/null +++ b/ipatests/test_webui/test_sudo.py @@ -0,0 +1,122 @@ +# Authors: +# Petr Vobornik <pvoborni@redhat.com> +# +# Copyright (C) 2013 Red Hat +# see file 'COPYING' for use and warranty information +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <http://www.gnu.org/licenses/>. + +""" +Sudo tests +""" + +from ipatests.test_webui.ui_driver import UI_driver +import ipatests.test_webui.data_sudo as sudo +import ipatests.test_webui.data_netgroup as netgroup +import ipatests.test_webui.data_user as user +import ipatests.test_webui.data_group as group +import ipatests.test_webui.data_hostgroup as hostgroup +from ipatests.test_webui.test_host import host_tasks, ENTITY as HOST_ENTITY + +class test_sudo(UI_driver): + + def test_crud(self): + """ + Basic CRUD: sudo + """ + self.init_app() + self.basic_crud(sudo.RULE_ENTITY, sudo.RULE_DATA) + self.basic_crud(sudo.CMDENTITY, sudo.CMD_DATA) + self.basic_crud(sudo.CMDGROUP_ENTITY, sudo.CMDGROUP_DATA, + default_facet=sudo.CMDGROUP_DEF_FACET) + + def test_mod(self): + """ + Mod: sudo + """ + self.init_app() + host = host_tasks(self.driver, self.config) + + self.add_record(netgroup.ENTITY, netgroup.DATA2) + + self.add_record(user.ENTITY, user.DATA) + self.add_record(user.ENTITY, user.DATA2, navigate=False) + + self.add_record(group.ENTITY, group.DATA) + self.add_record(group.ENTITY, group.DATA2, navigate=False) + + self.add_record(HOST_ENTITY, host.data) + self.add_record(HOST_ENTITY, host.data2, navigate=False) + + self.add_record(hostgroup.ENTITY, hostgroup.DATA) + self.add_record(hostgroup.ENTITY, hostgroup.DATA2, navigate=False) + + self.add_record(sudo.CMDENTITY, sudo.CMD_DATA) + self.add_record(sudo.CMDENTITY, sudo.CMD_DATA2, navigate=False) + + self.add_record(sudo.CMDGROUP_ENTITY, sudo.CMDGROUP_DATA) + self.add_record(sudo.CMDGROUP_ENTITY, sudo.CMDGROUP_DATA2, navigate=False) + + self.add_record(sudo.RULE_ENTITY, sudo.RULE_DATA) + self.navigate_to_record(sudo.RULE_PKEY, entity=sudo.RULE_ENTITY) + + tables = [ + ['memberuser_user', [user.PKEY, user.PKEY2],], + ['memberuser_group', [group.PKEY, group.PKEY2],], + ['memberhost_host', [host.pkey, host.pkey2],], + ['memberhost_hostgroup', [hostgroup.PKEY, hostgroup.PKEY2],], + ['memberallowcmd_sudocmd', [sudo.CMD_PKEY, sudo.CMD_PKEY2],], + ['memberallowcmd_sudocmdgroup', [sudo.CMD_GROUP_PKEY, sudo.CMD_GROUP_PKEY2],], + ['memberdenycmd_sudocmd', [sudo.CMD_PKEY, sudo.CMD_PKEY2],], + ['memberdenycmd_sudocmdgroup', [sudo.CMD_GROUP_PKEY, sudo.CMD_GROUP_PKEY2],], + ['ipasudorunas_user', ['admin'],], + ['ipasudorunas_group', ['editors', 'admins'],], + ['ipasudorunasgroup_group', ['editors', 'admins'],], + ] + + categories = [ + 'usercategory', + 'hostcategory', + 'cmdcategory', + 'ipasudorunasusercategory', + 'ipasudorunasgroupcategory', + ] + + no_cats = [ + 'memberdenycmd_sudocmd', + 'memberdenycmd_sudocmdgroup', + ] + + self.mod_rule_tables(tables, categories, no_cats) + + # cleanup + # ------- + self.delete(sudo.RULE_ENTITY, [sudo.RULE_DATA]) + self.delete(user.ENTITY, [user.DATA, user.DATA2]) + self.delete(group.ENTITY, [group.DATA, group.DATA2]) + self.delete(HOST_ENTITY, [host.data, host.data2]) + self.delete(hostgroup.ENTITY, [hostgroup.DATA, hostgroup.DATA2]) + + def test_actions(self): + """ + Test sudo rule actions + """ + self.init_app() + + self.add_record(sudo.RULE_ENTITY, sudo.RULE_DATA) + self.navigate_to_record(sudo.RULE_PKEY) + + self.disable_action() + self.enable_action() + self.delete_action(sudo.RULE_ENTITY, sudo.RULE_PKEY) |