Imported Upstream version 4.6.2
This commit is contained in:
132
ipatests/test_webui/test_sudo.py
Normal file
132
ipatests/test_webui/test_sudo.py
Normal file
@@ -0,0 +1,132 @@
|
||||
# Authors:
|
||||
# Petr Vobornik <pvoborni@redhat.com>
|
||||
#
|
||||
# Copyright (C) 2013 Red Hat
|
||||
# see file 'COPYING' for use and warranty information
|
||||
#
|
||||
# This program is free software; you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
"""
|
||||
Sudo tests
|
||||
"""
|
||||
|
||||
from ipatests.test_webui.ui_driver import UI_driver
|
||||
from ipatests.test_webui.ui_driver import screenshot
|
||||
import ipatests.test_webui.data_sudo as sudo
|
||||
import ipatests.test_webui.data_netgroup as netgroup
|
||||
import ipatests.test_webui.data_user as user
|
||||
import ipatests.test_webui.data_group as group
|
||||
import ipatests.test_webui.data_hostgroup as hostgroup
|
||||
from ipatests.test_webui.test_host import host_tasks, ENTITY as HOST_ENTITY
|
||||
import pytest
|
||||
|
||||
|
||||
@pytest.mark.tier1
|
||||
class test_sudo(UI_driver):
|
||||
|
||||
@screenshot
|
||||
def test_crud(self):
|
||||
"""
|
||||
Basic CRUD: sudo
|
||||
"""
|
||||
self.init_app()
|
||||
self.basic_crud(sudo.RULE_ENTITY, sudo.RULE_DATA)
|
||||
self.basic_crud(sudo.CMDENTITY, sudo.CMD_DATA)
|
||||
self.basic_crud(sudo.CMDGROUP_ENTITY, sudo.CMDGROUP_DATA,
|
||||
default_facet=sudo.CMDGROUP_DEF_FACET)
|
||||
|
||||
@screenshot
|
||||
def test_mod(self):
|
||||
"""
|
||||
Mod: sudo
|
||||
"""
|
||||
self.init_app()
|
||||
host = host_tasks()
|
||||
host.setup(self.driver, self.config)
|
||||
|
||||
self.add_record(netgroup.ENTITY, netgroup.DATA2)
|
||||
|
||||
self.add_record(user.ENTITY, user.DATA)
|
||||
self.add_record(user.ENTITY, user.DATA2, navigate=False)
|
||||
|
||||
self.add_record(group.ENTITY, group.DATA)
|
||||
self.add_record(group.ENTITY, group.DATA2, navigate=False)
|
||||
|
||||
self.add_record(HOST_ENTITY, host.data)
|
||||
self.add_record(HOST_ENTITY, host.data2, navigate=False)
|
||||
|
||||
self.add_record(hostgroup.ENTITY, hostgroup.DATA)
|
||||
self.add_record(hostgroup.ENTITY, hostgroup.DATA2, navigate=False)
|
||||
|
||||
self.add_record(sudo.CMDENTITY, sudo.CMD_DATA)
|
||||
self.add_record(sudo.CMDENTITY, sudo.CMD_DATA2, navigate=False)
|
||||
|
||||
self.add_record(sudo.CMDGROUP_ENTITY, sudo.CMDGROUP_DATA)
|
||||
self.add_record(sudo.CMDGROUP_ENTITY, sudo.CMDGROUP_DATA2, navigate=False)
|
||||
|
||||
self.add_record(sudo.RULE_ENTITY, sudo.RULE_DATA)
|
||||
self.navigate_to_record(sudo.RULE_PKEY, entity=sudo.RULE_ENTITY)
|
||||
|
||||
tables = [
|
||||
['memberuser_user', [user.PKEY, user.PKEY2], ],
|
||||
['memberuser_group', [group.PKEY, group.PKEY2], ],
|
||||
['memberhost_host', [host.pkey, host.pkey2], ],
|
||||
['memberhost_hostgroup', [hostgroup.PKEY, hostgroup.PKEY2], ],
|
||||
['memberallowcmd_sudocmd', [sudo.CMD_PKEY, sudo.CMD_PKEY2], ],
|
||||
['memberallowcmd_sudocmdgroup', [sudo.CMD_GROUP_PKEY, sudo.CMD_GROUP_PKEY2], ],
|
||||
['memberdenycmd_sudocmd', [sudo.CMD_PKEY, sudo.CMD_PKEY2], ],
|
||||
['memberdenycmd_sudocmdgroup', [sudo.CMD_GROUP_PKEY, sudo.CMD_GROUP_PKEY2], ],
|
||||
['ipasudorunas_user', ['admin'], ],
|
||||
['ipasudorunas_group', ['editors', 'admins'], ],
|
||||
['ipasudorunasgroup_group', ['editors', 'admins'], ],
|
||||
]
|
||||
|
||||
categories = [
|
||||
'usercategory',
|
||||
'hostcategory',
|
||||
'cmdcategory',
|
||||
'ipasudorunasusercategory',
|
||||
'ipasudorunasgroupcategory',
|
||||
]
|
||||
|
||||
no_cats = [
|
||||
'memberdenycmd_sudocmd',
|
||||
'memberdenycmd_sudocmdgroup',
|
||||
]
|
||||
|
||||
self.mod_rule_tables(tables, categories, no_cats)
|
||||
|
||||
# cleanup
|
||||
# -------
|
||||
self.delete(sudo.RULE_ENTITY, [sudo.RULE_DATA])
|
||||
self.delete(user.ENTITY, [user.DATA, user.DATA2])
|
||||
self.delete(group.ENTITY, [group.DATA, group.DATA2])
|
||||
self.delete(HOST_ENTITY, [host.data, host.data2])
|
||||
self.delete(hostgroup.ENTITY, [hostgroup.DATA, hostgroup.DATA2])
|
||||
self.delete(sudo.CMDENTITY, [sudo.CMD_DATA, sudo.CMD_DATA2])
|
||||
self.delete(sudo.CMDGROUP_ENTITY, [sudo.CMDGROUP_DATA, sudo.CMDGROUP_DATA2])
|
||||
|
||||
@screenshot
|
||||
def test_actions(self):
|
||||
"""
|
||||
Test sudo rule actions
|
||||
"""
|
||||
self.init_app()
|
||||
|
||||
self.add_record(sudo.RULE_ENTITY, sudo.RULE_DATA)
|
||||
self.navigate_to_record(sudo.RULE_PKEY)
|
||||
|
||||
self.disable_action()
|
||||
self.enable_action()
|
||||
self.delete_action(sudo.RULE_ENTITY, sudo.RULE_PKEY)
|
||||
Reference in New Issue
Block a user