summaryrefslogtreecommitdiffstats
path: root/tests
diff options
context:
space:
mode:
authorJan Zeleny <jzeleny@redhat.com>2010-12-21 13:20:18 +0100
committerRob Crittenden <rcritten@redhat.com>2011-01-07 09:42:34 -0500
commitbfc338d81c088cca66b4060505ac5742d4c19911 (patch)
treea3f2747e89c6201804d644b9388edc93d27213c0 /tests
parenta1188d95e8e318ebb70181fdb0d03e0485949b26 (diff)
downloadfreeipa-bfc338d81c088cca66b4060505ac5742d4c19911.tar.gz
freeipa-bfc338d81c088cca66b4060505ac5742d4c19911.tar.xz
freeipa-bfc338d81c088cca66b4060505ac5742d4c19911.zip
Rename hbac module to hbacrule
The renaming follows previous discussion on mailing list and it leads to name compatibility with other plugins (e.g. sudorule). It is also necessary for following changes in ipa help.
Diffstat (limited to 'tests')
-rw-r--r--tests/test_xmlrpc/test_hbac_plugin.py186
1 files changed, 93 insertions, 93 deletions
diff --git a/tests/test_xmlrpc/test_hbac_plugin.py b/tests/test_xmlrpc/test_hbac_plugin.py
index b9900b13..1d51c17a 100644
--- a/tests/test_xmlrpc/test_hbac_plugin.py
+++ b/tests/test_xmlrpc/test_hbac_plugin.py
@@ -17,7 +17,7 @@
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
"""
-Test the `ipalib/plugins/hbac.py` module.
+Test the `ipalib/plugins/hbacrule.py` module.
"""
from xmlrpc_test import XMLRPC_test, assert_attr_equal
@@ -27,7 +27,7 @@ from ipalib import errors
class test_hbac(XMLRPC_test):
"""
- Test the `hbac` plugin.
+ Test the `hbacrule` plugin.
"""
rule_name = u'testing_rule1234'
rule_type = u'allow'
@@ -40,19 +40,19 @@ class test_hbac(XMLRPC_test):
rule_desc = u'description'
rule_desc_mod = u'description modified'
- test_user = u'hbac_test_user'
- test_group = u'hbac_test_group'
- test_host = u'hbac._test_netgroup'
- test_hostgroup = u'hbac_test_hostgroup'
- test_sourcehost = u'hbac._test_src_host'
- test_sourcehostgroup = u'hbac_test_src_hostgroup'
+ test_user = u'hbacrule_test_user'
+ test_group = u'hbacrule_test_group'
+ test_host = u'hbacrule._test_netgroup'
+ test_hostgroup = u'hbacrule_test_hostgroup'
+ test_sourcehost = u'hbacrule._test_src_host'
+ test_sourcehostgroup = u'hbacrule_test_src_hostgroup'
test_service = u'sshd'
- def test_0_hbac_add(self):
+ def test_0_hbacrule_add(self):
"""
- Test adding a new HBAC rule using `xmlrpc.hbac_add`.
+ Test adding a new HBAC rule using `xmlrpc.hbacrule_add`.
"""
- ret = self.failsafe_add(api.Object.hbac,
+ ret = self.failsafe_add(api.Object.hbacrule,
self.rule_name,
accessruletype=self.rule_type,
description=self.rule_desc,
@@ -63,12 +63,12 @@ class test_hbac(XMLRPC_test):
assert_attr_equal(entry, 'ipaenabledflag', 'TRUE')
assert_attr_equal(entry, 'description', self.rule_desc)
- def test_1_hbac_add(self):
+ def test_1_hbacrule_add(self):
"""
- Test adding an existing HBAC rule using `xmlrpc.hbac_add'.
+ Test adding an existing HBAC rule using `xmlrpc.hbacrule_add'.
"""
try:
- api.Command['hbac_add'](
+ api.Command['hbacrule_add'](
self.rule_name, accessruletype=self.rule_type
)
except errors.DuplicateEntry:
@@ -76,44 +76,44 @@ class test_hbac(XMLRPC_test):
else:
assert False
- def test_2_hbac_show(self):
+ def test_2_hbacrule_show(self):
"""
- Test displaying a HBAC rule using `xmlrpc.hbac_show`.
+ Test displaying a HBAC rule using `xmlrpc.hbacrule_show`.
"""
- entry = api.Command['hbac_show'](self.rule_name)['result']
+ entry = api.Command['hbacrule_show'](self.rule_name)['result']
assert_attr_equal(entry, 'cn', self.rule_name)
assert_attr_equal(entry, 'accessruletype', self.rule_type)
assert_attr_equal(entry, 'ipaenabledflag', 'TRUE')
assert_attr_equal(entry, 'description', self.rule_desc)
- def test_3_hbac_mod(self):
+ def test_3_hbacrule_mod(self):
"""
- Test modifying a HBAC rule using `xmlrpc.hbac_mod`.
+ Test modifying a HBAC rule using `xmlrpc.hbacrule_mod`.
"""
- ret = api.Command['hbac_mod'](
+ ret = api.Command['hbacrule_mod'](
self.rule_name, description=self.rule_desc_mod
)
entry = ret['result']
assert_attr_equal(entry, 'description', self.rule_desc_mod)
-# def test_4_hbac_add_accesstime(self):
+# def test_4_hbacrule_add_accesstime(self):
# """
-# Test adding access time to HBAC rule using `xmlrpc.hbac_add_accesstime`.
+# Test adding access time to HBAC rule using `xmlrpc.hbacrule_add_accesstime`.
# """
# return
-# ret = api.Command['hbac_add_accesstime'](
+# ret = api.Command['hbacrule_add_accesstime'](
# self.rule_name, accesstime=self.rule_time2
# )
# entry = ret['result']
# assert_attr_equal(entry, 'accesstime', self.rule_time);
# assert_attr_equal(entry, 'accesstime', self.rule_time2);
-# def test_5_hbac_add_accesstime(self):
+# def test_5_hbacrule_add_accesstime(self):
# """
-# Test adding invalid access time to HBAC rule using `xmlrpc.hbac_add_accesstime`.
+# Test adding invalid access time to HBAC rule using `xmlrpc.hbacrule_add_accesstime`.
# """
# try:
-# api.Command['hbac_add_accesstime'](
+# api.Command['hbacrule_add_accesstime'](
# self.rule_name, accesstime=self.rule_time_fail
# )
# except errors.ValidationError:
@@ -121,11 +121,11 @@ class test_hbac(XMLRPC_test):
# else:
# assert False
- def test_6_hbac_find(self):
+ def test_6_hbacrule_find(self):
"""
- Test searching for HBAC rules using `xmlrpc.hbac_find`.
+ Test searching for HBAC rules using `xmlrpc.hbacrule_find`.
"""
- ret = api.Command['hbac_find'](
+ ret = api.Command['hbacrule_find'](
name=self.rule_name, accessruletype=self.rule_type,
description=self.rule_desc_mod
)
@@ -135,7 +135,7 @@ class test_hbac(XMLRPC_test):
assert_attr_equal(entries[0], 'accessruletype', self.rule_type)
assert_attr_equal(entries[0], 'description', self.rule_desc_mod)
- def test_7_hbac_init_testing_data(self):
+ def test_7_hbacrule_init_testing_data(self):
"""
Initialize data for more HBAC plugin testing.
"""
@@ -161,11 +161,11 @@ class test_hbac(XMLRPC_test):
self.test_service, description=u'desc', force=True
)
- def test_8_hbac_add_user(self):
+ def test_8_hbacrule_add_user(self):
"""
- Test adding user and group to HBAC rule using `xmlrpc.hbac_add_user`.
+ Test adding user and group to HBAC rule using `xmlrpc.hbacrule_add_user`.
"""
- ret = api.Command['hbac_add_user'](
+ ret = api.Command['hbacrule_add_user'](
self.rule_name, user=self.test_user, group=self.test_group
)
assert ret['completed'] == 2
@@ -179,11 +179,11 @@ class test_hbac(XMLRPC_test):
assert_attr_equal(entry, 'memberuser_user', self.test_user)
assert_attr_equal(entry, 'memberuser_group', self.test_group)
- def test_9_hbac_remove_user(self):
+ def test_9_hbacrule_remove_user(self):
"""
- Test removing user and group from HBAC rule using `xmlrpc.hbac_remove_user'.
+ Test removing user and group from HBAC rule using `xmlrpc.hbacrule_remove_user'.
"""
- ret = api.Command['hbac_remove_user'](
+ ret = api.Command['hbacrule_remove_user'](
self.rule_name, user=self.test_user, group=self.test_group
)
assert ret['completed'] == 2
@@ -197,11 +197,11 @@ class test_hbac(XMLRPC_test):
assert 'memberuser_user' not in entry
assert 'memberuser_group' not in entry
- def test_a_hbac_add_host(self):
+ def test_a_hbacrule_add_host(self):
"""
- Test adding host and hostgroup to HBAC rule using `xmlrpc.hbac_add_host`.
+ Test adding host and hostgroup to HBAC rule using `xmlrpc.hbacrule_add_host`.
"""
- ret = api.Command['hbac_add_host'](
+ ret = api.Command['hbacrule_add_host'](
self.rule_name, host=self.test_host, hostgroup=self.test_hostgroup
)
assert ret['completed'] == 2
@@ -215,11 +215,11 @@ class test_hbac(XMLRPC_test):
assert_attr_equal(entry, 'memberhost_host', self.test_host)
assert_attr_equal(entry, 'memberhost_hostgroup', self.test_hostgroup)
- def test_b_hbac_remove_host(self):
+ def test_b_hbacrule_remove_host(self):
"""
- Test removing host and hostgroup from HBAC rule using `xmlrpc.hbac_remove_host`.
+ Test removing host and hostgroup from HBAC rule using `xmlrpc.hbacrule_remove_host`.
"""
- ret = api.Command['hbac_remove_host'](
+ ret = api.Command['hbacrule_remove_host'](
self.rule_name, host=self.test_host, hostgroup=self.test_hostgroup
)
assert ret['completed'] == 2
@@ -233,11 +233,11 @@ class test_hbac(XMLRPC_test):
assert 'memberhost_host' not in res[1]
assert 'memberhost_hostgroup' not in res[1]
- def test_a_hbac_add_sourcehost(self):
+ def test_a_hbacrule_add_sourcehost(self):
"""
- Test adding source host and hostgroup to HBAC rule using `xmlrpc.hbac_add_host`.
+ Test adding source host and hostgroup to HBAC rule using `xmlrpc.hbacrule_add_host`.
"""
- ret = api.Command['hbac_add_sourcehost'](
+ ret = api.Command['hbacrule_add_sourcehost'](
self.rule_name, host=self.test_host, hostgroup=self.test_hostgroup
)
assert ret['completed'] == 2
@@ -251,11 +251,11 @@ class test_hbac(XMLRPC_test):
assert_attr_equal(entry, 'sourcehost_host', self.test_host)
assert_attr_equal(entry, 'sourcehost_hostgroup', self.test_hostgroup)
- def test_a_hbac_add_service(self):
+ def test_a_hbacrule_add_service(self):
"""
- Test adding service to HBAC rule using `xmlrpc.hbac_add_service`.
+ Test adding service to HBAC rule using `xmlrpc.hbacrule_add_service`.
"""
- ret = api.Command['hbac_add_service'](
+ ret = api.Command['hbacrule_add_service'](
self.rule_name, hbacsvc=self.test_service
)
assert ret['completed'] == 1
@@ -266,11 +266,11 @@ class test_hbac(XMLRPC_test):
entry = ret['result']
assert_attr_equal(entry, 'memberservice_hbacsvc', self.test_service)
- def test_a_hbac_remove_service(self):
+ def test_a_hbacrule_remove_service(self):
"""
- Test removing service to HBAC rule using `xmlrpc.hbac_remove_service`.
+ Test removing service to HBAC rule using `xmlrpc.hbacrule_remove_service`.
"""
- ret = api.Command['hbac_remove_service'](
+ ret = api.Command['hbacrule_remove_service'](
self.rule_name, hbacsvc=self.test_service
)
assert ret['completed'] == 1
@@ -281,11 +281,11 @@ class test_hbac(XMLRPC_test):
entry = ret['result']
assert 'memberservice service' not in entry
- def test_b_hbac_remove_host(self):
+ def test_b_hbacrule_remove_host(self):
"""
- Test removing source host and hostgroup from HBAC rule using `xmlrpc.hbac_remove_host`.
+ Test removing source host and hostgroup from HBAC rule using `xmlrpc.hbacrule_remove_host`.
"""
- ret = api.Command['hbac_remove_sourcehost'](
+ ret = api.Command['hbacrule_remove_sourcehost'](
self.rule_name, host=self.test_host, hostgroup=self.test_hostgroup
)
assert ret['completed'] == 2
@@ -299,12 +299,12 @@ class test_hbac(XMLRPC_test):
assert 'sourcehost host' not in entry
assert 'sourcehost hostgroup' not in entry
- def test_c_hbac_clear_testing_data(self):
+ def test_c_hbacrule_clear_testing_data(self):
"""
Clear data for HBAC plugin testing.
"""
- api.Command['hbac_remove_host'](self.rule_name, host=self.test_host)
- api.Command['hbac_remove_host'](self.rule_name, hostgroup=self.test_hostgroup)
+ api.Command['hbacrule_remove_host'](self.rule_name, host=self.test_host)
+ api.Command['hbacrule_remove_host'](self.rule_name, hostgroup=self.test_hostgroup)
api.Command['user_del'](self.test_user)
api.Command['group_del'](self.test_group)
api.Command['host_del'](self.test_host)
@@ -313,102 +313,102 @@ class test_hbac(XMLRPC_test):
api.Command['hostgroup_del'](self.test_sourcehostgroup)
api.Command['hbacsvc_del'](self.test_service)
- def test_d_hbac_disable(self):
+ def test_d_hbacrule_disable(self):
"""
- Test disabling HBAC rule using `xmlrpc.hbac_disable`.
+ Test disabling HBAC rule using `xmlrpc.hbacrule_disable`.
"""
- assert api.Command['hbac_disable'](self.rule_name)['result'] is True
- entry = api.Command['hbac_show'](self.rule_name)['result']
+ assert api.Command['hbacrule_disable'](self.rule_name)['result'] is True
+ entry = api.Command['hbacrule_show'](self.rule_name)['result']
# FIXME: Should this be 'disabled' or 'FALSE'?
assert_attr_equal(entry, 'ipaenabledflag', 'FALSE')
- def test_e_hbac_enabled(self):
+ def test_e_hbacrule_enabled(self):
"""
- Test enabling HBAC rule using `xmlrpc.hbac_enable`.
+ Test enabling HBAC rule using `xmlrpc.hbacrule_enable`.
"""
- assert api.Command['hbac_enable'](self.rule_name)['result'] is True
+ assert api.Command['hbacrule_enable'](self.rule_name)['result'] is True
# check it's really enabled
- entry = api.Command['hbac_show'](self.rule_name)['result']
+ entry = api.Command['hbacrule_show'](self.rule_name)['result']
# FIXME: Should this be 'enabled' or 'TRUE'?
assert_attr_equal(entry, 'ipaenabledflag', 'TRUE')
- def test_f_hbac_exclusiveuser(self):
+ def test_f_hbacrule_exclusiveuser(self):
"""
Test adding a user to an HBAC rule when usercat='all'
"""
- api.Command['hbac_mod'](self.rule_name, usercategory=u'all')
+ api.Command['hbacrule_mod'](self.rule_name, usercategory=u'all')
try:
- api.Command['hbac_add_user'](self.rule_name, users='admin')
+ api.Command['hbacrule_add_user'](self.rule_name, users='admin')
except errors.MutuallyExclusiveError:
pass
- api.Command['hbac_mod'](self.rule_name, usercategory=u'')
+ api.Command['hbacrule_mod'](self.rule_name, usercategory=u'')
- def test_g_hbac_exclusiveuser(self):
+ def test_g_hbacrule_exclusiveuser(self):
"""
Test setting usercat='all' in an HBAC rule when there are users
"""
- api.Command['hbac_add_user'](self.rule_name, users='admin')
+ api.Command['hbacrule_add_user'](self.rule_name, users='admin')
try:
- api.Command['hbac_mod'](self.rule_name, usercategory=u'all')
+ api.Command['hbacrule_mod'](self.rule_name, usercategory=u'all')
except errors.MutuallyExclusiveError:
pass
finally:
- api.Command['hbac_remove_user'](self.rule_name, users='admin')
+ api.Command['hbacrule_remove_user'](self.rule_name, users='admin')
- def test_h_hbac_exclusivehost(self):
+ def test_h_hbacrule_exclusivehost(self):
"""
Test adding a host to an HBAC rule when hostcat='all'
"""
- api.Command['hbac_mod'](self.rule_name, hostcategory=u'all')
+ api.Command['hbacrule_mod'](self.rule_name, hostcategory=u'all')
try:
- api.Command['hbac_add_host'](self.rule_name, host=self.test_host)
+ api.Command['hbacrule_add_host'](self.rule_name, host=self.test_host)
except errors.MutuallyExclusiveError:
pass
- api.Command['hbac_mod'](self.rule_name, hostcategory=u'')
+ api.Command['hbacrule_mod'](self.rule_name, hostcategory=u'')
- def test_i_hbac_exclusivehost(self):
+ def test_i_hbacrule_exclusivehost(self):
"""
Test setting hostcat='all' in an HBAC rule when there are hosts
"""
- api.Command['hbac_add_host'](self.rule_name, host=self.test_host)
+ api.Command['hbacrule_add_host'](self.rule_name, host=self.test_host)
try:
- api.Command['hbac_mod'](self.rule_name, hostcategory=u'all')
+ api.Command['hbacrule_mod'](self.rule_name, hostcategory=u'all')
except errors.MutuallyExclusiveError:
pass
finally:
- api.Command['hbac_remove_host'](self.rule_name, host=self.test_host)
+ api.Command['hbacrule_remove_host'](self.rule_name, host=self.test_host)
- def test_j_hbac_exclusiveservice(self):
+ def test_j_hbacrule_exclusiveservice(self):
"""
Test adding a service to an HBAC rule when servicecat='all'
"""
- api.Command['hbac_mod'](self.rule_name, servicecategory=u'all')
+ api.Command['hbacrule_mod'](self.rule_name, servicecategory=u'all')
try:
- api.Command['hbac_add_host'](self.rule_name, hbacsvc=self.test_service)
+ api.Command['hbacrule_add_host'](self.rule_name, hbacsvc=self.test_service)
except errors.MutuallyExclusiveError:
pass
- api.Command['hbac_mod'](self.rule_name, servicecategory=u'')
+ api.Command['hbacrule_mod'](self.rule_name, servicecategory=u'')
- def test_k_hbac_exclusiveservice(self):
+ def test_k_hbacrule_exclusiveservice(self):
"""
Test setting servicecat='all' in an HBAC rule when there are services
"""
- api.Command['hbac_add_service'](self.rule_name, hbacsvc=self.test_service)
+ api.Command['hbacrule_add_service'](self.rule_name, hbacsvc=self.test_service)
try:
- api.Command['hbac_mod'](self.rule_name, servicecategory=u'all')
+ api.Command['hbacrule_mod'](self.rule_name, servicecategory=u'all')
except errors.MutuallyExclusiveError:
pass
finally:
- api.Command['hbac_remove_service'](self.rule_name, hbacsvc=self.test_service)
+ api.Command['hbacrule_remove_service'](self.rule_name, hbacsvc=self.test_service)
- def test_z_hbac_del(self):
+ def test_z_hbacrule_del(self):
"""
- Test deleting a HBAC rule using `xmlrpc.hbac_del`.
+ Test deleting a HBAC rule using `xmlrpc.hbacrule_del`.
"""
- assert api.Command['hbac_del'](self.rule_name)['result'] is True
+ assert api.Command['hbacrule_del'](self.rule_name)['result'] is True
# verify that it's gone
try:
- api.Command['hbac_show'](self.rule_name)
+ api.Command['hbacrule_show'](self.rule_name)
except errors.NotFound:
pass
else: