summaryrefslogtreecommitdiffstats
path: root/ipatests/test_xmlrpc/test_group_plugin.py
diff options
context:
space:
mode:
Diffstat (limited to 'ipatests/test_xmlrpc/test_group_plugin.py')
-rw-r--r--ipatests/test_xmlrpc/test_group_plugin.py1046
1 files changed, 1046 insertions, 0 deletions
diff --git a/ipatests/test_xmlrpc/test_group_plugin.py b/ipatests/test_xmlrpc/test_group_plugin.py
new file mode 100644
index 000000000..1d0cfeb16
--- /dev/null
+++ b/ipatests/test_xmlrpc/test_group_plugin.py
@@ -0,0 +1,1046 @@
+# Authors:
+# Rob Crittenden <rcritten@redhat.com>
+# Pavel Zuna <pzuna@redhat.com>
+#
+# Copyright (C) 2008 Red Hat
+# see file 'COPYING' for use and warranty information
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program. If not, see <http://www.gnu.org/licenses/>.
+"""
+Test the `ipalib/plugins/group.py` module.
+"""
+
+from ipalib import api, errors
+from ipatests.test_xmlrpc import objectclasses
+from ipatests.util import Fuzzy
+from xmlrpc_test import Declarative, fuzzy_digits, fuzzy_uuid, fuzzy_set_ci
+from ipapython.dn import DN
+
+group1 = u'testgroup1'
+group2 = u'testgroup2'
+group3 = u'testgroup3'
+renamedgroup1 = u'testgroup'
+user1 = u'tuser1'
+
+invalidgroup1=u'+tgroup1'
+
+# When adding external SID member to a group we can't test
+# it fully due to possibly missing Samba 4 python bindings
+# and/or not configured AD trusts. Thus, we'll use incorrect
+# SID value to merely test that proper exceptions are raised
+external_sid1=u'S-1-1-123456-789-1'
+
+def get_group_dn(cn):
+ return DN(('cn', cn), api.env.container_group, api.env.basedn)
+
+class test_group(Declarative):
+ cleanup_commands = [
+ ('group_del', [group1], {}),
+ ('group_del', [group2], {}),
+ ('group_del', [group3], {}),
+ ('group_del', [renamedgroup1], {}),
+ ('user_del', [user1], {}),
+ ]
+
+ tests = [
+
+ ################
+ # create group1:
+ dict(
+ desc='Try to retrieve non-existent %r' % group1,
+ command=('group_show', [group1], {}),
+ expected=errors.NotFound(reason=u'%s: group not found' % group1),
+ ),
+
+
+ dict(
+ desc='Try to update non-existent %r' % group1,
+ command=('group_mod', [group1], dict(description=u'Foo')),
+ expected=errors.NotFound(reason=u'%s: group not found' % group1),
+ ),
+
+
+ dict(
+ desc='Try to delete non-existent %r' % group1,
+ command=('group_del', [group1], {}),
+ expected=errors.NotFound(reason=u'%s: group not found' % group1),
+ ),
+
+
+ dict(
+ desc='Try to rename non-existent %r' % group1,
+ command=('group_mod', [group1], dict(setattr=u'cn=%s' % renamedgroup1)),
+ expected=errors.NotFound(reason=u'%s: group not found' % group1),
+ ),
+
+
+ dict(
+ desc='Create non-POSIX %r' % group1,
+ command=(
+ 'group_add', [group1], dict(description=u'Test desc 1',nonposix=True)
+ ),
+ expected=dict(
+ value=group1,
+ summary=u'Added group "testgroup1"',
+ result=dict(
+ cn=[group1],
+ description=[u'Test desc 1'],
+ objectclass=objectclasses.group,
+ ipauniqueid=[fuzzy_uuid],
+ dn=get_group_dn('testgroup1'),
+ ),
+ ),
+ ),
+
+
+ dict(
+ desc='Try to create duplicate %r' % group1,
+ command=(
+ 'group_add', [group1], dict(description=u'Test desc 1')
+ ),
+ expected=errors.DuplicateEntry(
+ message=u'group with name "%s" already exists' % group1),
+ ),
+
+
+ dict(
+ desc='Retrieve non-POSIX %r' % group1,
+ command=('group_show', [group1], {}),
+ expected=dict(
+ value=group1,
+ summary=None,
+ result=dict(
+ cn=[group1],
+ description=[u'Test desc 1'],
+ dn=get_group_dn('testgroup1'),
+ ),
+ ),
+ ),
+
+
+ dict(
+ desc='Updated non-POSIX %r' % group1,
+ command=(
+ 'group_mod', [group1], dict(description=u'New desc 1')
+ ),
+ expected=dict(
+ result=dict(
+ cn=[group1],
+ description=[u'New desc 1'],
+ ),
+ summary=u'Modified group "testgroup1"',
+ value=group1,
+ ),
+ ),
+
+
+ dict(
+ desc='Retrieve %r to verify update' % group1,
+ command=('group_show', [group1], {}),
+ expected=dict(
+ value=group1,
+ result=dict(
+ cn=[group1],
+ description=[u'New desc 1'],
+ dn=get_group_dn('testgroup1'),
+ ),
+ summary=None,
+ ),
+ ),
+
+
+ # FIXME: The return value is totally different here than from the above
+ # group_mod() test. I think that for all *_mod() commands we should
+ # just return the entry exactly as *_show() does.
+ dict(
+ desc='Updated %r to promote it to a POSIX group' % group1,
+ command=('group_mod', [group1], dict(posix=True)),
+ expected=dict(
+ result=dict(
+ cn=[group1],
+ description=[u'New desc 1'],
+ gidnumber=[fuzzy_digits],
+ ),
+ value=group1,
+ summary=u'Modified group "testgroup1"',
+ ),
+ ),
+
+
+ dict(
+ desc="Retrieve %r to verify it's a POSIX group" % group1,
+ command=('group_show', [group1], {}),
+ expected=dict(
+ value=group1,
+ result=dict(
+ cn=[group1],
+ description=(u'New desc 1',),
+ dn=get_group_dn('testgroup1'),
+ gidnumber=[fuzzy_digits],
+ ),
+ summary=None,
+ ),
+ ),
+
+
+ dict(
+ desc='Search for %r' % group1,
+ command=('group_find', [], dict(cn=group1)),
+ expected=dict(
+ count=1,
+ truncated=False,
+ result=[
+ dict(
+ dn=get_group_dn(group1),
+ cn=[group1],
+ description=[u'New desc 1'],
+ gidnumber=[fuzzy_digits],
+ ),
+ ],
+ summary=u'1 group matched',
+ ),
+ ),
+
+
+
+ ################
+ # create group2:
+ dict(
+ desc='Try to retrieve non-existent %r' % group2,
+ command=('group_show', [group2], {}),
+ expected=errors.NotFound(reason=u'%s: group not found' % group2),
+ ),
+
+
+ dict(
+ desc='Try to update non-existent %r' % group2,
+ command=('group_mod', [group2], dict(description=u'Foo')),
+ expected=errors.NotFound(reason=u'%s: group not found' % group2),
+ ),
+
+
+ dict(
+ desc='Try to delete non-existent %r' % group2,
+ command=('group_del', [group2], {}),
+ expected=errors.NotFound(reason=u'%s: group not found' % group2),
+ ),
+
+
+ dict(
+ desc='Create %r' % group2,
+ command=(
+ 'group_add', [group2], dict(description=u'Test desc 2')
+ ),
+ expected=dict(
+ value=group2,
+ summary=u'Added group "testgroup2"',
+ result=dict(
+ cn=[group2],
+ description=[u'Test desc 2'],
+ gidnumber=[fuzzy_digits],
+ objectclass=objectclasses.posixgroup,
+ ipauniqueid=[fuzzy_uuid],
+ dn=get_group_dn('testgroup2'),
+ ),
+ ),
+ ),
+
+
+ dict(
+ desc='Try to create duplicate %r' % group2,
+ command=(
+ 'group_add', [group2], dict(description=u'Test desc 2')
+ ),
+ expected=errors.DuplicateEntry(
+ message=u'group with name "%s" already exists' % group2),
+ ),
+
+
+ dict(
+ desc='Retrieve %r' % group2,
+ command=('group_show', [group2], {}),
+ expected=dict(
+ value=group2,
+ summary=None,
+ result=dict(
+ cn=[group2],
+ description=[u'Test desc 2'],
+ gidnumber=[fuzzy_digits],
+ dn=get_group_dn('testgroup2'),
+ ),
+ ),
+ ),
+
+
+ dict(
+ desc='Updated %r' % group2,
+ command=(
+ 'group_mod', [group2], dict(description=u'New desc 2')
+ ),
+ expected=dict(
+ result=dict(
+ cn=[group2],
+ gidnumber=[fuzzy_digits],
+ description=[u'New desc 2'],
+ ),
+ summary=u'Modified group "testgroup2"',
+ value=group2,
+ ),
+ ),
+
+
+ dict(
+ desc='Retrieve %r to verify update' % group2,
+ command=('group_show', [group2], {}),
+ expected=dict(
+ value=group2,
+ result=dict(
+ cn=[group2],
+ description=[u'New desc 2'],
+ gidnumber=[fuzzy_digits],
+ dn=get_group_dn('testgroup2'),
+ ),
+ summary=None,
+ ),
+ ),
+
+
+ dict(
+ desc='Search for %r' % group2,
+ command=('group_find', [], dict(cn=group2)),
+ expected=dict(
+ count=1,
+ truncated=False,
+ result=[
+ dict(
+ dn=get_group_dn('testgroup2'),
+ cn=[group2],
+ description=[u'New desc 2'],
+ gidnumber=[fuzzy_digits],
+ ),
+ ],
+ summary=u'1 group matched',
+ ),
+ ),
+
+
+ dict(
+ desc='Search for all groups',
+ command=('group_find', [], {}),
+ expected=dict(
+ summary=u'6 groups matched',
+ count=6,
+ truncated=False,
+ result=[
+ {
+ 'dn': get_group_dn('admins'),
+ 'member_user': [u'admin'],
+ 'gidnumber': [fuzzy_digits],
+ 'cn': [u'admins'],
+ 'description': [u'Account administrators group'],
+ },
+ {
+ 'dn': get_group_dn('editors'),
+ 'gidnumber': [fuzzy_digits],
+ 'cn': [u'editors'],
+ 'description': [u'Limited admins who can edit other users'],
+ },
+ {
+ 'dn': get_group_dn('ipausers'),
+ 'cn': [u'ipausers'],
+ 'description': [u'Default group for all users'],
+ },
+ dict(
+ dn=get_group_dn(group1),
+ cn=[group1],
+ description=[u'New desc 1'],
+ gidnumber=[fuzzy_digits],
+ ),
+ dict(
+ dn=get_group_dn(group2),
+ cn=[group2],
+ description=[u'New desc 2'],
+ gidnumber=[fuzzy_digits],
+ ),
+ {
+ 'dn': get_group_dn('trust admins'),
+ 'member_user': [u'admin'],
+ 'cn': [u'trust admins'],
+ 'description': [u'Trusts administrators group'],
+ },
+ ],
+ ),
+ ),
+
+ dict(
+ desc='Search for non-POSIX groups',
+ command=('group_find', [], dict(nonposix=True, all=True)),
+ expected=dict(
+ summary=u'2 groups matched',
+ count=2,
+ truncated=False,
+ result=[
+ {
+ 'dn': get_group_dn('ipausers'),
+ 'cn': [u'ipausers'],
+ 'description': [u'Default group for all users'],
+ 'objectclass': fuzzy_set_ci(objectclasses.group),
+ 'ipauniqueid': [fuzzy_uuid],
+ },
+ {
+ 'dn': get_group_dn('trust admins'),
+ 'member_user': [u'admin'],
+ 'cn': [u'trust admins'],
+ 'description': [u'Trusts administrators group'],
+ 'objectclass': fuzzy_set_ci(objectclasses.group),
+ 'ipauniqueid': [fuzzy_uuid],
+ },
+ ],
+ ),
+ ),
+
+ dict(
+ desc='Search for non-POSIX groups with criteria filter',
+ command=('group_find', [u'users'], dict(nonposix=True, all=True)),
+ expected=dict(
+ summary=u'1 group matched',
+ count=1,
+ truncated=False,
+ result=[
+ {
+ 'dn': get_group_dn('ipausers'),
+ 'cn': [u'ipausers'],
+ 'description': [u'Default group for all users'],
+ 'objectclass': fuzzy_set_ci(objectclasses.group),
+ 'ipauniqueid': [fuzzy_uuid],
+ },
+ ],
+ ),
+ ),
+
+ dict(
+ desc='Search for POSIX groups',
+ command=('group_find', [], dict(posix=True, all=True)),
+ expected=dict(
+ summary=u'4 groups matched',
+ count=4,
+ truncated=False,
+ result=[
+ {
+ 'dn': get_group_dn('admins'),
+ 'member_user': [u'admin'],
+ 'gidnumber': [fuzzy_digits],
+ 'cn': [u'admins'],
+ 'description': [u'Account administrators group'],
+ 'objectclass': fuzzy_set_ci(objectclasses.posixgroup),
+ 'ipauniqueid': [fuzzy_uuid],
+ },
+ {
+ 'dn': get_group_dn('editors'),
+ 'gidnumber': [fuzzy_digits],
+ 'cn': [u'editors'],
+ 'description': [u'Limited admins who can edit other users'],
+ 'objectclass': fuzzy_set_ci(objectclasses.posixgroup),
+ 'ipauniqueid': [fuzzy_uuid],
+ },
+ dict(
+ dn=get_group_dn(group1),
+ cn=[group1],
+ description=[u'New desc 1'],
+ gidnumber=[fuzzy_digits],
+ objectclass=fuzzy_set_ci(objectclasses.posixgroup),
+ ipauniqueid=[fuzzy_uuid],
+ ),
+ dict(
+ dn=get_group_dn(group2),
+ cn=[group2],
+ description=[u'New desc 2'],
+ gidnumber=[fuzzy_digits],
+ objectclass=fuzzy_set_ci(objectclasses.posixgroup),
+ ipauniqueid=[fuzzy_uuid],
+ ),
+ ],
+ ),
+ ),
+
+
+ ###############
+ # test external SID members for group3:
+ dict(
+ desc='Create external %r' % group3,
+ command=(
+ 'group_add', [group3], dict(description=u'Test desc 3',external=True)
+ ),
+ expected=dict(
+ value=group3,
+ summary=u'Added group "testgroup3"',
+ result=dict(
+ cn=[group3],
+ description=[u'Test desc 3'],
+ objectclass=objectclasses.externalgroup,
+ ipauniqueid=[fuzzy_uuid],
+ dn=get_group_dn(group3),
+ ),
+ ),
+ ),
+
+ dict(
+ desc='Search for external groups',
+ command=('group_find', [], dict(external=True, all=True)),
+ expected=dict(
+ summary=u'1 group matched',
+ count=1,
+ truncated=False,
+ result=[
+ dict(
+ cn=[group3],
+ description=[u'Test desc 3'],
+ objectclass=fuzzy_set_ci(objectclasses.externalgroup),
+ ipauniqueid=[fuzzy_uuid],
+ dn=get_group_dn(group3),
+ ),
+ ],
+ ),
+ ),
+
+
+ dict(
+ desc='Convert posix group %r to support external membership' % (group2),
+ command=(
+ 'group_mod', [group2], dict(external=True)
+ ),
+ expected=errors.PosixGroupViolation(),
+ ),
+
+
+ dict(
+ desc='Convert external members group %r to posix' % (group3),
+ command=(
+ 'group_mod', [group3], dict(posix=True)
+ ),
+ expected=errors.ExternalGroupViolation(),
+ ),
+
+
+ dict(
+ desc='Add external member %r to %r' % (external_sid1, group3),
+ command=(
+ 'group_add_member', [group3], dict(ipaexternalmember=external_sid1)
+ ),
+ expected=lambda x, output: type(x) == errors.ValidationError or type(x) == errors.NotFound,
+ ),
+
+
+ dict(
+ desc='Remove group %r with external membership' % (group3),
+ command=('group_del', [group3], {}),
+ expected=dict(
+ result=dict(failed=u''),
+ value=group3,
+ summary=u'Deleted group "testgroup3"',
+ ),
+ ),
+
+
+ ###############
+ # member stuff:
+ dict(
+ desc='Add member %r to %r' % (group2, group1),
+ command=(
+ 'group_add_member', [group1], dict(group=group2)
+ ),
+ expected=dict(
+ completed=1,
+ failed=dict(
+ member=dict(
+ group=tuple(),
+ user=tuple(),
+ ),
+ ),
+ result={
+ 'dn': get_group_dn(group1),
+ 'member_group': (group2,),
+ 'gidnumber': [fuzzy_digits],
+ 'cn': [group1],
+ 'description': [u'New desc 1'],
+ },
+ ),
+ ),
+
+ dict(
+ # FIXME: Shouldn't this raise a NotFound instead?
+ desc='Try to add non-existent member to %r' % group1,
+ command=(
+ 'group_add_member', [group1], dict(group=u'notfound')
+ ),
+ expected=dict(
+ completed=0,
+ failed=dict(
+ member=dict(
+ group=[(u'notfound', u'no such entry')],
+ user=tuple(),
+ ),
+ ),
+ result={
+ 'dn': get_group_dn(group1),
+ 'member_group': (group2,),
+ 'gidnumber': [fuzzy_digits],
+ 'cn': [group1],
+ 'description': [u'New desc 1'],
+ },
+ ),
+ ),
+
+ dict(
+ desc='Remove member %r from %r' % (group2, group1),
+ command=('group_remove_member',
+ [group1], dict(group=group2)
+ ),
+ expected=dict(
+ completed=1,
+ failed=dict(
+ member=dict(
+ group=tuple(),
+ user=tuple(),
+ ),
+ ),
+ result={
+ 'dn': get_group_dn(group1),
+ 'cn': [group1],
+ 'gidnumber': [fuzzy_digits],
+ 'description': [u'New desc 1'],
+ },
+ ),
+ ),
+
+ dict(
+ # FIXME: Shouldn't this raise a NotFound instead?
+ desc='Try to remove non-existent member from %r' % group1,
+ command=('group_remove_member',
+ [group1], dict(group=u'notfound')
+ ),
+ expected=dict(
+ completed=0,
+ failed=dict(
+ member=dict(
+ group=[(u'notfound', u'This entry is not a member')],
+ user=tuple(),
+ ),
+ ),
+ result={
+ 'dn': get_group_dn(group1),
+ 'cn': [group1],
+ 'gidnumber': [fuzzy_digits],
+ 'description': [u'New desc 1'],
+ },
+ ),
+ ),
+
+
+ dict(
+ desc='Rename %r' % group1,
+ command=('group_mod', [group1], dict(setattr=u'cn=%s' % renamedgroup1)),
+ expected=dict(
+ value=group1,
+ result=dict(
+ cn=[renamedgroup1],
+ description=[u'New desc 1'],
+ gidnumber=[fuzzy_digits],
+ ),
+ summary=u'Modified group "%s"' % group1
+ )
+ ),
+
+
+ dict(
+ desc='Rename %r back' % renamedgroup1,
+ command=('group_mod', [renamedgroup1], dict(setattr=u'cn=%s' % group1)),
+ expected=dict(
+ value=renamedgroup1,
+ result=dict(
+ cn=[group1],
+ description=[u'New desc 1'],
+ gidnumber=[fuzzy_digits],
+ ),
+ summary=u'Modified group "%s"' % renamedgroup1
+ )
+ ),
+
+
+
+ ################
+ # delete group1:
+ dict(
+ desc='Delete %r' % group1,
+ command=('group_del', [group1], {}),
+ expected=dict(
+ result=dict(failed=u''),
+ value=group1,
+ summary=u'Deleted group "testgroup1"',
+ )
+ ),
+
+
+ dict(
+ desc='Try to delete non-existent %r' % group1,
+ command=('group_del', [group1], {}),
+ expected=errors.NotFound(reason=u'%s: group not found' % group1),
+ ),
+
+
+ dict(
+ desc='Try to retrieve non-existent %r' % group1,
+ command=('group_show', [group1], {}),
+ expected=errors.NotFound(reason=u'%s: group not found' % group1),
+ ),
+
+
+ dict(
+ desc='Try to update non-existent %r' % group1,
+ command=('group_mod', [group1], dict(description=u'Foo')),
+ expected=errors.NotFound(reason=u'%s: group not found' % group1),
+ ),
+
+
+
+ ################
+ # delete group2:
+ dict(
+ desc='Delete %r' % group2,
+ command=('group_del', [group2], {}),
+ expected=dict(
+ result=dict(failed=u''),
+ value=group2,
+ summary=u'Deleted group "testgroup2"',
+ )
+ ),
+
+
+ dict(
+ desc='Try to delete non-existent %r' % group2,
+ command=('group_del', [group2], {}),
+ expected=errors.NotFound(reason=u'%s: group not found' % group2),
+ ),
+
+
+ dict(
+ desc='Try to retrieve non-existent %r' % group2,
+ command=('group_show', [group2], {}),
+ expected=errors.NotFound(reason=u'%s: group not found' % group2),
+ ),
+
+
+ dict(
+ desc='Try to update non-existent %r' % group2,
+ command=('group_mod', [group2], dict(description=u'Foo')),
+ expected=errors.NotFound(reason=u'%s: group not found' % group2),
+ ),
+
+ dict(
+ desc='Test an invalid group name %r' % invalidgroup1,
+ command=('group_add', [invalidgroup1], dict(description=u'Test')),
+ expected=errors.ValidationError(name='group_name',
+ error=u'may only include letters, numbers, _, -, . and $'),
+ ),
+
+ # The assumption on these next 4 tests is that if we don't get a
+ # validation error then the request was processed normally.
+ dict(
+ desc='Test that validation is disabled on mods',
+ command=('group_mod', [invalidgroup1], {}),
+ expected=errors.NotFound(
+ reason=u'%s: group not found' % invalidgroup1),
+ ),
+
+
+ dict(
+ desc='Test that validation is disabled on deletes',
+ command=('group_del', [invalidgroup1], {}),
+ expected=errors.NotFound(
+ reason=u'%s: group not found' % invalidgroup1),
+ ),
+
+
+ dict(
+ desc='Test that validation is disabled on show',
+ command=('group_show', [invalidgroup1], {}),
+ expected=errors.NotFound(
+ reason=u'%s: group not found' % invalidgroup1),
+ ),
+
+
+ ##### managed entry tests
+ dict(
+ desc='Create %r' % user1,
+ command=(
+ 'user_add', [], dict(givenname=u'Test', sn=u'User1')
+ ),
+ expected=dict(
+ value=user1,
+ summary=u'Added user "%s"' % user1,
+ result=dict(
+ gecos=[u'Test User1'],
+ givenname=[u'Test'],
+ homedirectory=[u'/home/%s' % user1],
+ krbprincipalname=[u'%s@%s' % (user1, api.env.realm)],
+ loginshell=[u'/bin/sh'],
+ objectclass=objectclasses.user,
+ sn=[u'User1'],
+ uid=[user1],
+ uidnumber=[fuzzy_digits],
+ gidnumber=[fuzzy_digits],
+ mail=[u'%s@%s' % (user1, api.env.domain)],
+ displayname=[u'Test User1'],
+ cn=[u'Test User1'],
+ initials=[u'TU'],
+ ipauniqueid=[fuzzy_uuid],
+ krbpwdpolicyreference=[DN(('cn','global_policy'),('cn',api.env.realm),
+ ('cn','kerberos'),api.env.basedn)],
+ mepmanagedentry=[get_group_dn(user1)],
+ memberof_group=[u'ipausers'],
+ dn=DN(('uid',user1),('cn','users'),('cn','accounts'),
+ api.env.basedn),
+ has_keytab=False,
+ has_password=False,
+ ),
+ ),
+ ),
+
+
+ dict(
+ desc='Verify the managed group %r was created' % user1,
+ command=('group_show', [user1], {}),
+ expected=dict(
+ value=user1,
+ summary=None,
+ result=dict(
+ cn=[user1],
+ description=[u'User private group for %s' % user1],
+ gidnumber=[fuzzy_digits],
+ dn=get_group_dn(user1),
+ ),
+ ),
+ ),
+
+
+ dict(
+ desc='Verify that managed group %r can be found' % user1,
+ command=('group_find', [], {'cn': user1, 'private': True}),
+ expected=dict(
+ count=1,
+ truncated=False,
+ result=[
+ dict(
+ dn=get_group_dn(user1),
+ cn=[user1],
+ description=[u'User private group for %s' % user1],
+ gidnumber=[fuzzy_digits],
+ ),
+ ],
+ summary=u'1 group matched',
+ ),
+ ),
+
+
+ dict(
+ desc='Try to delete a managed group %r' % user1,
+ command=('group_del', [user1], {}),
+ expected=errors.ManagedGroupError(),
+ ),
+
+
+ dict(
+ desc='Detach managed group %r' % user1,
+ command=('group_detach', [user1], {}),
+ expected=dict(
+ result=True,
+ value=user1,
+ summary=u'Detached group "%s" from user "%s"' % (user1, user1),
+ ),
+ ),
+
+
+ dict(
+ desc='Now delete the unmanaged group %r' % user1,
+ command=('group_del', [user1], {}),
+ expected=dict(
+ result=dict(failed=u''),
+ value=user1,
+ summary=u'Deleted group "%s"' % user1,
+ )
+ ),
+
+ dict(
+ desc='Verify that %r is really gone' % user1,
+ command=('group_show', [user1], {}),
+ expected=errors.NotFound(reason=u'%s: group not found' % user1),
+ ),
+
+ dict(
+ desc='Delete %r' % user1,
+ command=('user_del', [user1], {}),
+ expected=dict(
+ result=dict(failed=u''),
+ summary=u'Deleted user "tuser1"',
+ value=user1,
+ ),
+ ),
+
+ dict(
+ desc='Create %r without User Private Group' % user1,
+ command=(
+ 'user_add', [user1], dict(givenname=u'Test', sn=u'User1', noprivate=True, gidnumber=1000)
+ ),
+ expected=dict(
+ value=user1,
+ summary=u'Added user "tuser1"',
+ result=dict(
+ gecos=[u'Test User1'],
+ givenname=[u'Test'],
+ description=[],
+ homedirectory=[u'/home/tuser1'],
+ krbprincipalname=[u'tuser1@' + api.env.realm],
+ loginshell=[u'/bin/sh'],
+ objectclass=objectclasses.user_base,
+ sn=[u'User1'],
+ uid=[user1],
+ uidnumber=[fuzzy_digits],
+ gidnumber=[u'1000'],
+ mail=[u'%s@%s' % (user1, api.env.domain)],
+ displayname=[u'Test User1'],
+ cn=[u'Test User1'],
+ initials=[u'TU'],
+ ipauniqueid=[fuzzy_uuid],
+ dn=DN(('uid','tuser1'),('cn','users'),('cn','accounts'),
+ api.env.basedn),
+ krbpwdpolicyreference=[DN(('cn','global_policy'),('cn',api.env.realm),
+ ('cn','kerberos'),api.env.basedn)],
+ memberof_group=[u'ipausers'],
+ has_keytab=False,
+ has_password=False,
+ ),
+ ),
+ ),
+
+ dict(
+ desc='Verify the managed group %r was not created' % user1,
+ command=('group_show', [user1], {}),
+ expected=errors.NotFound(reason=u'%s: group not found' % user1),
+ ),
+
+ dict(
+ desc='Try to remove the admin user from the admins group',
+ command=('group_remove_member', [u'admins'], dict(user=[u'admin'])),
+ expected=errors.LastMemberError(key=u'admin', label=u'group',
+ container='admins'),
+ ),
+
+ dict(
+ desc='Add %r to the admins group' % user1,
+ command=('group_add_member', [u'admins'], dict(user=user1)),
+ expected=dict(
+ completed=1,
+ failed=dict(
+ member=dict(
+ group=tuple(),
+ user=tuple(),
+ ),
+ ),
+ result={
+ 'dn': get_group_dn('admins'),
+ 'member_user': [u'admin', user1],
+ 'gidnumber': [fuzzy_digits],
+ 'cn': [u'admins'],
+ 'description': [u'Account administrators group'],
+ },
+ ),
+ ),
+
+ dict(
+ desc='Try to remove admin and %r from the admins group' % user1,
+ command=('group_remove_member', [u'admins'],
+ dict(user=[u'admin', user1])),
+ expected=errors.LastMemberError(key=u'admin', label=u'group',
+ container='admins'),
+ ),
+
+ dict(
+ desc='Try to delete the admins group',
+ command=('group_del', [u'admins'], {}),
+ expected=errors.ProtectedEntryError(label=u'group',
+ key='admins', reason='privileged group'),
+ ),
+
+
+ dict(
+ desc='Try to rename the admins group',
+ command=('group_mod', [u'admins'], dict(rename=u'loosers')),
+ expected=errors.ProtectedEntryError(label=u'group',
+ key='admins', reason='Cannot be renamed'),
+ ),
+
+ dict(
+ desc='Try to rename the admins group via setattr',
+ command=('group_mod', [u'admins'], {'setattr': u'cn=loosers'}),
+ expected=errors.ProtectedEntryError(label=u'group',
+ key='admins', reason='Cannot be renamed'),
+ ),
+
+ dict(
+ desc='Try to modify the admins group to support external membership',
+ command=('group_mod', [u'admins'], dict(external=True)),
+ expected=errors.ProtectedEntryError(label=u'group',
+ key='admins', reason='Cannot support external non-IPA members'),
+ ),
+
+ dict(
+ desc='Try to delete the trust admins group',
+ command=('group_del', [u'trust admins'], {}),
+ expected=errors.ProtectedEntryError(label=u'group',
+ key='trust admins', reason='privileged group'),
+ ),
+
+ dict(
+ desc='Try to rename the trust admins group',
+ command=('group_mod', [u'trust admins'], dict(rename=u'loosers')),
+ expected=errors.ProtectedEntryError(label=u'group',
+ key='trust admins', reason='Cannot be renamed'),
+ ),
+
+ dict(
+ desc='Try to rename the trust admins group via setattr',
+ command=('group_mod', [u'trust admins'], {'setattr': u'cn=loosers'}),
+ expected=errors.ProtectedEntryError(label=u'group',
+ key='trust admins', reason='Cannot be renamed'),
+ ),
+
+
+ dict(
+ desc='Try to modify the trust admins group to support external membership',
+ command=('group_mod', [u'trust admins'], dict(external=True)),
+ expected=errors.ProtectedEntryError(label=u'group',
+ key='trust admins', reason='Cannot support external non-IPA members'),
+ ),
+
+ dict(
+ desc='Delete %r' % user1,
+ command=('user_del', [user1], {}),
+ expected=dict(
+ result=dict(failed=u''),
+ summary=u'Deleted user "%s"' % user1,
+ value=user1,
+ ),
+ ),
+
+ ]