Imported Debian patch 4.0.5-6~numeezy
This commit is contained in:
committed by
Mario Fetka
parent
c44de33144
commit
10dfc9587b
@@ -27,42 +27,23 @@ from ipatests.test_xmlrpc.xmlrpc_test import fuzzy_digits, fuzzy_date, fuzzy_iss
|
||||
from ipatests.test_xmlrpc.xmlrpc_test import fuzzy_hex
|
||||
from ipatests.test_xmlrpc import objectclasses
|
||||
from ipatests.test_xmlrpc.testcert import get_testcert
|
||||
from ipatests.test_xmlrpc.test_user_plugin import (
|
||||
get_user_result, get_user_dn, get_group_dn)
|
||||
import base64
|
||||
from ipapython.dn import DN
|
||||
import pytest
|
||||
|
||||
fqdn1 = u'testhost1.%s' % api.env.domain
|
||||
fqdn2 = u'testhost2.%s' % api.env.domain
|
||||
fqdn3 = u'TestHost3.%s' % api.env.domain
|
||||
service1_no_realm = u'HTTP/%s' % fqdn1
|
||||
service1 = u'%s@%s' % (service1_no_realm, api.env.realm)
|
||||
service1 = u'HTTP/%s@%s' % (fqdn1, api.env.realm)
|
||||
hostprincipal1 = u'host/%s@%s' % (fqdn1, api.env.realm)
|
||||
service1dn = DN(('krbprincipalname',service1),('cn','services'),('cn','accounts'),api.env.basedn)
|
||||
host1dn = DN(('fqdn',fqdn1),('cn','computers'),('cn','accounts'),api.env.basedn)
|
||||
host2dn = DN(('fqdn',fqdn2),('cn','computers'),('cn','accounts'),api.env.basedn)
|
||||
host3dn = DN(('fqdn',fqdn3),('cn','computers'),('cn','accounts'),api.env.basedn)
|
||||
|
||||
role1 = u'Test Role'
|
||||
role1_dn = DN(('cn', role1), api.env.container_rolegroup, api.env.basedn)
|
||||
|
||||
servercert= get_testcert(DN(('CN', api.env.host), x509.subject_base()),
|
||||
'unittest/%s@%s' % (api.env.host, api.env.realm))
|
||||
badservercert = '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'
|
||||
|
||||
user1 = u'tuser1'
|
||||
user2 = u'tuser2'
|
||||
group1 = u'group1'
|
||||
group1_dn = get_group_dn(group1)
|
||||
group2 = u'group2'
|
||||
group2_dn = get_group_dn(group2)
|
||||
hostgroup1 = u'testhostgroup1'
|
||||
hostgroup1_dn = DN(('cn',hostgroup1),('cn','hostgroups'),('cn','accounts'),
|
||||
api.env.basedn)
|
||||
|
||||
|
||||
@pytest.mark.tier1
|
||||
class test_service(Declarative):
|
||||
|
||||
cleanup_commands = [
|
||||
@@ -83,7 +64,7 @@ class test_service(Declarative):
|
||||
|
||||
dict(
|
||||
desc='Try to update non-existent %r' % service1,
|
||||
command=('service_mod', [service1], dict(usercertificate=servercert)),
|
||||
command=('service_mod', [service1], dict(usercertificate=get_testcert())),
|
||||
expected=errors.NotFound(
|
||||
reason=u'%s: service not found' % service1),
|
||||
),
|
||||
@@ -386,11 +367,7 @@ class test_service(Declarative):
|
||||
|
||||
dict(
|
||||
desc='Update %r with a bad certificate' % service1,
|
||||
command=(
|
||||
'service_mod',
|
||||
[service1],
|
||||
dict(usercertificate=base64.b64decode(badservercert))
|
||||
),
|
||||
command=('service_mod', [service1], dict(usercertificate=badservercert)),
|
||||
expected=errors.CertificateOperationError(
|
||||
error=u'Issuer "CN=IPA Test Certificate Authority" does not ' +
|
||||
u'match the expected issuer'),
|
||||
@@ -399,12 +376,12 @@ class test_service(Declarative):
|
||||
|
||||
dict(
|
||||
desc='Update %r' % service1,
|
||||
command=('service_mod', [service1], dict(usercertificate=servercert)),
|
||||
command=('service_mod', [service1], dict(usercertificate=get_testcert())),
|
||||
expected=dict(
|
||||
value=service1,
|
||||
summary=u'Modified service "%s"' % service1,
|
||||
result=dict(
|
||||
usercertificate=[base64.b64decode(servercert)],
|
||||
usercertificate=[base64.b64decode(get_testcert())],
|
||||
krbprincipalname=[service1],
|
||||
managedby_host=[fqdn1],
|
||||
valid_not_before=fuzzy_date,
|
||||
@@ -439,7 +416,7 @@ class test_service(Declarative):
|
||||
value=service1,
|
||||
summary=u'Modified service "%s"' % service1,
|
||||
result=dict(
|
||||
usercertificate=[base64.b64decode(servercert)],
|
||||
usercertificate=[base64.b64decode(get_testcert())],
|
||||
krbprincipalname=[service1],
|
||||
managedby_host=[fqdn1],
|
||||
ipakrbauthzdata=[u'MS-PAC'],
|
||||
@@ -464,7 +441,7 @@ class test_service(Declarative):
|
||||
summary=None,
|
||||
result=dict(
|
||||
dn=service1dn,
|
||||
usercertificate=[base64.b64decode(servercert)],
|
||||
usercertificate=[base64.b64decode(get_testcert())],
|
||||
krbprincipalname=[service1],
|
||||
has_keytab=False,
|
||||
managedby_host=[fqdn1],
|
||||
@@ -491,7 +468,7 @@ class test_service(Declarative):
|
||||
value=service1,
|
||||
summary=u'Modified service "%s"' % service1,
|
||||
result=dict(
|
||||
usercertificate=[base64.b64decode(servercert)],
|
||||
usercertificate=[base64.b64decode(get_testcert())],
|
||||
krbprincipalname=[service1],
|
||||
managedby_host=[fqdn1],
|
||||
ipakrbauthzdata=[u'MS-PAC'],
|
||||
@@ -518,7 +495,7 @@ class test_service(Declarative):
|
||||
value=service1,
|
||||
summary=u'Modified service "%s"' % service1,
|
||||
result=dict(
|
||||
usercertificate=[base64.b64decode(servercert)],
|
||||
usercertificate=[base64.b64decode(get_testcert())],
|
||||
krbprincipalname=[service1],
|
||||
managedby_host=[fqdn1],
|
||||
ipakrbauthzdata=[u'MS-PAC'],
|
||||
@@ -543,7 +520,7 @@ class test_service(Declarative):
|
||||
value=service1,
|
||||
summary=u'Modified service "%s"' % service1,
|
||||
result=dict(
|
||||
usercertificate=[base64.b64decode(servercert)],
|
||||
usercertificate=[base64.b64decode(get_testcert())],
|
||||
krbprincipalname=[service1],
|
||||
managedby_host=[fqdn1],
|
||||
ipakrbauthzdata=[u'MS-PAC'],
|
||||
@@ -583,7 +560,7 @@ class test_service(Declarative):
|
||||
|
||||
dict(
|
||||
desc='Try to update non-existent %r' % service1,
|
||||
command=('service_mod', [service1], dict(usercertificate=servercert)),
|
||||
command=('service_mod', [service1], dict(usercertificate=get_testcert())),
|
||||
expected=errors.NotFound(
|
||||
reason=u'%s: service not found' % service1),
|
||||
),
|
||||
@@ -649,559 +626,3 @@ class test_service(Declarative):
|
||||
|
||||
|
||||
]
|
||||
|
||||
|
||||
@pytest.mark.tier1
|
||||
class test_service_in_role(Declarative):
|
||||
cleanup_commands = [
|
||||
('host_del', [fqdn1], {}),
|
||||
('service_del', [service1], {}),
|
||||
('role_del', [role1], {}),
|
||||
]
|
||||
|
||||
tests = [
|
||||
dict(
|
||||
desc='Create %r' % fqdn1,
|
||||
command=('host_add', [fqdn1],
|
||||
dict(
|
||||
description=u'Test host 1',
|
||||
l=u'Undisclosed location 1',
|
||||
force=True,
|
||||
),
|
||||
),
|
||||
expected=dict(
|
||||
value=fqdn1,
|
||||
summary=u'Added host "%s"' % fqdn1,
|
||||
result=dict(
|
||||
dn=host1dn,
|
||||
fqdn=[fqdn1],
|
||||
description=[u'Test host 1'],
|
||||
l=[u'Undisclosed location 1'],
|
||||
krbprincipalname=[u'host/%s@%s' % (fqdn1, api.env.realm)],
|
||||
objectclass=objectclasses.host,
|
||||
ipauniqueid=[fuzzy_uuid],
|
||||
managedby_host=[u'%s' % fqdn1],
|
||||
has_keytab=False,
|
||||
has_password=False,
|
||||
),
|
||||
),
|
||||
),
|
||||
|
||||
dict(
|
||||
desc='Create %r' % service1,
|
||||
command=('service_add', [service1_no_realm], dict(force=True)),
|
||||
expected=dict(
|
||||
value=service1,
|
||||
summary=u'Added service "%s"' % service1,
|
||||
result=dict(
|
||||
dn=service1dn,
|
||||
krbprincipalname=[service1],
|
||||
objectclass=objectclasses.service,
|
||||
ipauniqueid=[fuzzy_uuid],
|
||||
managedby_host=[fqdn1],
|
||||
),
|
||||
),
|
||||
),
|
||||
|
||||
dict(
|
||||
desc='Create %r' % role1,
|
||||
command=('role_add', [role1], dict(description=u'role desc 1')),
|
||||
expected=dict(
|
||||
value=role1,
|
||||
summary=u'Added role "%s"' % role1,
|
||||
result=dict(
|
||||
dn=role1_dn,
|
||||
cn=[role1],
|
||||
description=[u'role desc 1'],
|
||||
objectclass=objectclasses.role,
|
||||
),
|
||||
),
|
||||
),
|
||||
|
||||
dict(
|
||||
desc='Add %r to %r' % (service1, role1),
|
||||
command=('role_add_member', [role1],
|
||||
dict(service=service1_no_realm)),
|
||||
expected=dict(
|
||||
failed=dict(
|
||||
member=dict(
|
||||
host=[],
|
||||
group=[],
|
||||
hostgroup=[],
|
||||
service=[],
|
||||
user=[],
|
||||
),
|
||||
),
|
||||
completed=1,
|
||||
result=dict(
|
||||
dn=role1_dn,
|
||||
cn=[role1],
|
||||
description=[u'role desc 1'],
|
||||
member_service=[service1],
|
||||
),
|
||||
),
|
||||
),
|
||||
|
||||
dict(
|
||||
desc='Verify %r is member of %r' % (service1, role1),
|
||||
command=('service_show', [service1_no_realm], {}),
|
||||
expected=dict(
|
||||
value=service1,
|
||||
summary=None,
|
||||
result=dict(
|
||||
dn=service1dn,
|
||||
krbprincipalname=[service1],
|
||||
managedby_host=[fqdn1],
|
||||
memberof_role=[role1],
|
||||
has_keytab=False,
|
||||
),
|
||||
),
|
||||
),
|
||||
|
||||
dict(
|
||||
desc='Verify %r has member %r' % (role1, service1),
|
||||
command=('role_show', [role1], {}),
|
||||
expected=dict(
|
||||
value=role1,
|
||||
summary=None,
|
||||
result=dict(
|
||||
dn=role1_dn,
|
||||
cn=[role1],
|
||||
description=[u'role desc 1'],
|
||||
member_service=[service1],
|
||||
),
|
||||
),
|
||||
),
|
||||
]
|
||||
|
||||
|
||||
@pytest.mark.tier1
|
||||
class test_service_allowed_to(Declarative):
|
||||
cleanup_commands = [
|
||||
('user_del', [user1], {}),
|
||||
('user_del', [user2], {}),
|
||||
('group_del', [group1], {}),
|
||||
('group_del', [group2], {}),
|
||||
('host_del', [fqdn1], {}),
|
||||
('service_del', [service1], {}),
|
||||
('hostgroup_del', [hostgroup1], {}),
|
||||
]
|
||||
|
||||
tests = [
|
||||
# prepare entries
|
||||
dict(
|
||||
desc='Create %r' % user1,
|
||||
command=(
|
||||
'user_add', [], dict(givenname=u'Test', sn=u'User1')
|
||||
),
|
||||
expected=dict(
|
||||
value=user1,
|
||||
summary=u'Added user "%s"' % user1,
|
||||
result=get_user_result(user1, u'Test', u'User1', 'add'),
|
||||
),
|
||||
),
|
||||
dict(
|
||||
desc='Create %r' % user2,
|
||||
command=(
|
||||
'user_add', [], dict(givenname=u'Test', sn=u'User2')
|
||||
),
|
||||
expected=dict(
|
||||
value=user2,
|
||||
summary=u'Added user "%s"' % user2,
|
||||
result=get_user_result(user2, u'Test', u'User2', 'add'),
|
||||
),
|
||||
),
|
||||
dict(
|
||||
desc='Create group: %r' % group1,
|
||||
command=(
|
||||
'group_add', [group1], dict()
|
||||
),
|
||||
expected=dict(
|
||||
value=group1,
|
||||
summary=u'Added group "%s"' % group1,
|
||||
result=dict(
|
||||
cn=[group1],
|
||||
objectclass=objectclasses.group + [u'posixgroup'],
|
||||
ipauniqueid=[fuzzy_uuid],
|
||||
gidnumber=[fuzzy_digits],
|
||||
dn=group1_dn
|
||||
),
|
||||
),
|
||||
),
|
||||
dict(
|
||||
desc='Create group: %r' % group2,
|
||||
command=(
|
||||
'group_add', [group2], dict()
|
||||
),
|
||||
expected=dict(
|
||||
value=group2,
|
||||
summary=u'Added group "%s"' % group2,
|
||||
result=dict(
|
||||
cn=[group2],
|
||||
objectclass=objectclasses.group + [u'posixgroup'],
|
||||
ipauniqueid=[fuzzy_uuid],
|
||||
gidnumber=[fuzzy_digits],
|
||||
dn=group2_dn
|
||||
),
|
||||
),
|
||||
),
|
||||
dict(
|
||||
desc='Create %r' % fqdn1,
|
||||
command=(
|
||||
'host_add', [fqdn1],
|
||||
dict(
|
||||
description=u'Test host 1',
|
||||
l=u'Undisclosed location 1',
|
||||
force=True,
|
||||
),
|
||||
),
|
||||
expected=dict(
|
||||
value=fqdn1,
|
||||
summary=u'Added host "%s"' % fqdn1,
|
||||
result=dict(
|
||||
dn=host1dn,
|
||||
fqdn=[fqdn1],
|
||||
description=[u'Test host 1'],
|
||||
l=[u'Undisclosed location 1'],
|
||||
krbprincipalname=[u'host/%s@%s' % (fqdn1, api.env.realm)],
|
||||
objectclass=objectclasses.host,
|
||||
ipauniqueid=[fuzzy_uuid],
|
||||
managedby_host=[u'%s' % fqdn1],
|
||||
has_keytab=False,
|
||||
has_password=False,
|
||||
),
|
||||
),
|
||||
),
|
||||
dict(
|
||||
desc='Create %r' % hostgroup1,
|
||||
command=('hostgroup_add', [hostgroup1],
|
||||
dict(description=u'Test hostgroup 1')
|
||||
),
|
||||
expected=dict(
|
||||
value=hostgroup1,
|
||||
summary=u'Added hostgroup "testhostgroup1"',
|
||||
result=dict(
|
||||
dn=hostgroup1_dn,
|
||||
cn=[hostgroup1],
|
||||
objectclass=objectclasses.hostgroup,
|
||||
description=[u'Test hostgroup 1'],
|
||||
ipauniqueid=[fuzzy_uuid],
|
||||
mepmanagedentry=[DN(('cn',hostgroup1),('cn','ng'),('cn','alt'),
|
||||
api.env.basedn)],
|
||||
),
|
||||
),
|
||||
),
|
||||
dict(
|
||||
desc='Create %r' % service1,
|
||||
command=('service_add', [service1_no_realm], dict(force=True)),
|
||||
expected=dict(
|
||||
value=service1,
|
||||
summary=u'Added service "%s"' % service1,
|
||||
result=dict(
|
||||
dn=service1dn,
|
||||
krbprincipalname=[service1],
|
||||
objectclass=objectclasses.service,
|
||||
ipauniqueid=[fuzzy_uuid],
|
||||
managedby_host=[fqdn1],
|
||||
),
|
||||
),
|
||||
),
|
||||
|
||||
# verify
|
||||
dict(
|
||||
desc='Allow %r to a retrieve keytab of %r' % (user1, service1),
|
||||
command=('service_allow_retrieve_keytab', [service1],
|
||||
dict(user=user1)),
|
||||
expected=dict(
|
||||
failed=dict(
|
||||
ipaallowedtoperform_read_keys=dict(
|
||||
group=[],
|
||||
host=[],
|
||||
hostgroup=[],
|
||||
user=[],
|
||||
),
|
||||
),
|
||||
completed=1,
|
||||
result=dict(
|
||||
dn=service1dn,
|
||||
ipaallowedtoperform_read_keys_user=[user1],
|
||||
krbprincipalname=[service1],
|
||||
managedby_host=[fqdn1],
|
||||
),
|
||||
),
|
||||
),
|
||||
|
||||
dict(
|
||||
desc='Duplicate add: user %r' % (user1),
|
||||
command=('service_allow_retrieve_keytab', [service1],
|
||||
dict(user=user1)),
|
||||
expected=dict(
|
||||
failed=dict(
|
||||
ipaallowedtoperform_read_keys=dict(
|
||||
group=[],
|
||||
host=[],
|
||||
hostgroup=[],
|
||||
user=[[user1, u'This entry is already a member']],
|
||||
),
|
||||
),
|
||||
completed=0,
|
||||
result=dict(
|
||||
dn=service1dn,
|
||||
ipaallowedtoperform_read_keys_user=[user1],
|
||||
krbprincipalname=[service1],
|
||||
managedby_host=[fqdn1],
|
||||
),
|
||||
),
|
||||
),
|
||||
|
||||
dict(
|
||||
desc='Allow %r, %r, %r to a retrieve keytab of %r' % (
|
||||
group1, group2, fqdn1, service1),
|
||||
command=('service_allow_retrieve_keytab', [service1],
|
||||
dict(group=[group1, group2], host=[fqdn1],
|
||||
hostgroup=[hostgroup1])),
|
||||
expected=dict(
|
||||
failed=dict(
|
||||
ipaallowedtoperform_read_keys=dict(
|
||||
group=[],
|
||||
host=[],
|
||||
hostgroup=[],
|
||||
user=[],
|
||||
),
|
||||
),
|
||||
completed=4,
|
||||
result=dict(
|
||||
dn=service1dn,
|
||||
ipaallowedtoperform_read_keys_user=[user1],
|
||||
ipaallowedtoperform_read_keys_group=[group1, group2],
|
||||
ipaallowedtoperform_read_keys_host=[fqdn1],
|
||||
ipaallowedtoperform_read_keys_hostgroup=[hostgroup1],
|
||||
krbprincipalname=[service1],
|
||||
managedby_host=[fqdn1],
|
||||
),
|
||||
),
|
||||
),
|
||||
|
||||
dict(
|
||||
desc='Invalid removal of retrieve keytab %r' % (user2),
|
||||
command=('service_disallow_retrieve_keytab', [service1],
|
||||
dict(user=[user2])),
|
||||
expected=dict(
|
||||
failed=dict(
|
||||
ipaallowedtoperform_read_keys=dict(
|
||||
group=[],
|
||||
host=[],
|
||||
hostgroup=[],
|
||||
user=[[user2, u'This entry is not a member']],
|
||||
),
|
||||
),
|
||||
completed=0,
|
||||
result=dict(
|
||||
dn=service1dn,
|
||||
ipaallowedtoperform_read_keys_user=[user1],
|
||||
ipaallowedtoperform_read_keys_group=[group1, group2],
|
||||
ipaallowedtoperform_read_keys_host=[fqdn1],
|
||||
ipaallowedtoperform_read_keys_hostgroup=[hostgroup1],
|
||||
krbprincipalname=[service1],
|
||||
managedby_host=[fqdn1],
|
||||
),
|
||||
),
|
||||
),
|
||||
|
||||
dict(
|
||||
desc='Removal of retrieve keytab %r' % (group2),
|
||||
command=('service_disallow_retrieve_keytab', [service1],
|
||||
dict(group=[group2])),
|
||||
expected=dict(
|
||||
failed=dict(
|
||||
ipaallowedtoperform_read_keys=dict(
|
||||
group=[],
|
||||
host=[],
|
||||
hostgroup=[],
|
||||
user=[],
|
||||
),
|
||||
),
|
||||
completed=1,
|
||||
result=dict(
|
||||
dn=service1dn,
|
||||
ipaallowedtoperform_read_keys_user=[user1],
|
||||
ipaallowedtoperform_read_keys_group=[group1],
|
||||
ipaallowedtoperform_read_keys_host=[fqdn1],
|
||||
ipaallowedtoperform_read_keys_hostgroup=[hostgroup1],
|
||||
krbprincipalname=[service1],
|
||||
managedby_host=[fqdn1],
|
||||
),
|
||||
),
|
||||
),
|
||||
|
||||
dict(
|
||||
desc='Allow %r, %r, %r to a create keytab of %r' % (
|
||||
group1, user1, fqdn1, service1),
|
||||
command=('service_allow_create_keytab', [service1],
|
||||
dict(group=[group1, group2], user=[user1], host=[fqdn1],
|
||||
hostgroup=[hostgroup1])),
|
||||
expected=dict(
|
||||
failed=dict(
|
||||
ipaallowedtoperform_write_keys=dict(
|
||||
group=[],
|
||||
host=[],
|
||||
hostgroup=[],
|
||||
user=[],
|
||||
),
|
||||
),
|
||||
completed=5,
|
||||
result=dict(
|
||||
dn=service1dn,
|
||||
ipaallowedtoperform_read_keys_user=[user1],
|
||||
ipaallowedtoperform_read_keys_group=[group1],
|
||||
ipaallowedtoperform_read_keys_host=[fqdn1],
|
||||
ipaallowedtoperform_read_keys_hostgroup=[hostgroup1],
|
||||
ipaallowedtoperform_write_keys_user=[user1],
|
||||
ipaallowedtoperform_write_keys_group=[group1, group2],
|
||||
ipaallowedtoperform_write_keys_host=[fqdn1],
|
||||
ipaallowedtoperform_write_keys_hostgroup=[hostgroup1],
|
||||
krbprincipalname=[service1],
|
||||
managedby_host=[fqdn1],
|
||||
),
|
||||
),
|
||||
),
|
||||
|
||||
dict(
|
||||
desc='Duplicate add: %r, %r' % (user1, group1),
|
||||
command=('service_allow_create_keytab', [service1],
|
||||
dict(group=[group1], user=[user1], host=[fqdn1],
|
||||
hostgroup=[hostgroup1])),
|
||||
expected=dict(
|
||||
failed=dict(
|
||||
ipaallowedtoperform_write_keys=dict(
|
||||
group=[[group1, u'This entry is already a member']],
|
||||
host=[[fqdn1, u'This entry is already a member']],
|
||||
user=[[user1, u'This entry is already a member']],
|
||||
hostgroup=[[hostgroup1, u'This entry is already a member']],
|
||||
),
|
||||
),
|
||||
completed=0,
|
||||
result=dict(
|
||||
dn=service1dn,
|
||||
ipaallowedtoperform_read_keys_user=[user1],
|
||||
ipaallowedtoperform_read_keys_group=[group1],
|
||||
ipaallowedtoperform_read_keys_host=[fqdn1],
|
||||
ipaallowedtoperform_read_keys_hostgroup=[hostgroup1],
|
||||
ipaallowedtoperform_write_keys_user=[user1],
|
||||
ipaallowedtoperform_write_keys_group=[group1, group2],
|
||||
ipaallowedtoperform_write_keys_host=[fqdn1],
|
||||
ipaallowedtoperform_write_keys_hostgroup=[hostgroup1],
|
||||
krbprincipalname=[service1],
|
||||
managedby_host=[fqdn1],
|
||||
),
|
||||
),
|
||||
),
|
||||
|
||||
dict(
|
||||
desc='Invalid removal of create keytab %r' % (user2),
|
||||
command=('service_disallow_create_keytab', [service1],
|
||||
dict(user=[user2])),
|
||||
expected=dict(
|
||||
failed=dict(
|
||||
ipaallowedtoperform_write_keys=dict(
|
||||
group=[],
|
||||
host=[],
|
||||
hostgroup=[],
|
||||
user=[[user2, u'This entry is not a member']],
|
||||
),
|
||||
),
|
||||
completed=0,
|
||||
result=dict(
|
||||
dn=service1dn,
|
||||
ipaallowedtoperform_read_keys_user=[user1],
|
||||
ipaallowedtoperform_read_keys_group=[group1],
|
||||
ipaallowedtoperform_read_keys_host=[fqdn1],
|
||||
ipaallowedtoperform_read_keys_hostgroup=[hostgroup1],
|
||||
ipaallowedtoperform_write_keys_user=[user1],
|
||||
ipaallowedtoperform_write_keys_group=[group1, group2],
|
||||
ipaallowedtoperform_write_keys_host=[fqdn1],
|
||||
ipaallowedtoperform_write_keys_hostgroup=[hostgroup1],
|
||||
krbprincipalname=[service1],
|
||||
managedby_host=[fqdn1],
|
||||
),
|
||||
),
|
||||
),
|
||||
|
||||
dict(
|
||||
desc='Removal of create keytab %r' % (group2),
|
||||
command=('service_disallow_create_keytab', [service1],
|
||||
dict(group=[group2])),
|
||||
expected=dict(
|
||||
failed=dict(
|
||||
ipaallowedtoperform_write_keys=dict(
|
||||
group=[],
|
||||
host=[],
|
||||
hostgroup=[],
|
||||
user=[],
|
||||
),
|
||||
),
|
||||
completed=1,
|
||||
result=dict(
|
||||
dn=service1dn,
|
||||
ipaallowedtoperform_read_keys_user=[user1],
|
||||
ipaallowedtoperform_read_keys_group=[group1],
|
||||
ipaallowedtoperform_read_keys_host=[fqdn1],
|
||||
ipaallowedtoperform_read_keys_hostgroup=[hostgroup1],
|
||||
ipaallowedtoperform_write_keys_user=[user1],
|
||||
ipaallowedtoperform_write_keys_group=[group1],
|
||||
ipaallowedtoperform_write_keys_host=[fqdn1],
|
||||
ipaallowedtoperform_write_keys_hostgroup=[hostgroup1],
|
||||
krbprincipalname=[service1],
|
||||
managedby_host=[fqdn1],
|
||||
),
|
||||
),
|
||||
),
|
||||
|
||||
dict(
|
||||
desc='Presence of ipaallowedtoperform in show output',
|
||||
command=('service_show', [service1_no_realm], {}),
|
||||
expected=dict(
|
||||
value=service1,
|
||||
summary=None,
|
||||
result=dict(
|
||||
dn=service1dn,
|
||||
has_keytab=False,
|
||||
ipaallowedtoperform_read_keys_user=[user1],
|
||||
ipaallowedtoperform_read_keys_group=[group1],
|
||||
ipaallowedtoperform_read_keys_host=[fqdn1],
|
||||
ipaallowedtoperform_read_keys_hostgroup=[hostgroup1],
|
||||
ipaallowedtoperform_write_keys_user=[user1],
|
||||
ipaallowedtoperform_write_keys_group=[group1],
|
||||
ipaallowedtoperform_write_keys_host=[fqdn1],
|
||||
ipaallowedtoperform_write_keys_hostgroup=[hostgroup1],
|
||||
krbprincipalname=[service1],
|
||||
managedby_host=[fqdn1],
|
||||
),
|
||||
),
|
||||
),
|
||||
|
||||
dict(
|
||||
desc='Presence of ipaallowedtoperform in mod output',
|
||||
command=(
|
||||
'service_mod', [service1_no_realm],
|
||||
dict(ipakrbokasdelegate=True)),
|
||||
expected=dict(
|
||||
value=service1,
|
||||
summary=u'Modified service "%s"' % service1,
|
||||
result=dict(
|
||||
ipaallowedtoperform_read_keys_user=[user1],
|
||||
ipaallowedtoperform_read_keys_group=[group1],
|
||||
ipaallowedtoperform_read_keys_host=[fqdn1],
|
||||
ipaallowedtoperform_read_keys_hostgroup=[hostgroup1],
|
||||
ipaallowedtoperform_write_keys_user=[user1],
|
||||
ipaallowedtoperform_write_keys_group=[group1],
|
||||
ipaallowedtoperform_write_keys_host=[fqdn1],
|
||||
ipaallowedtoperform_write_keys_hostgroup=[hostgroup1],
|
||||
ipakrbokasdelegate=True,
|
||||
krbprincipalname=[service1],
|
||||
krbticketflags=[u'1048704'],
|
||||
managedby_host=[fqdn1],
|
||||
),
|
||||
),
|
||||
),
|
||||
]
|
||||
|
||||
Reference in New Issue
Block a user