Skip to content

Commit

Permalink
Tests: Test transformation of bash-ldap-id-ldap-auth netgroup
Browse files Browse the repository at this point in the history
Test transformation of bash-ldap-id-ldap-auth netgroup
  • Loading branch information
aborah-sudo committed Oct 30, 2024
1 parent b928dbe commit 9b6e65b
Showing 1 changed file with 141 additions and 1 deletion.
142 changes: 141 additions & 1 deletion src/tests/system/tests/test_netgroups.py
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,8 @@
import pytest
from sssd_test_framework.roles.client import Client
from sssd_test_framework.roles.generic import GenericProvider
from sssd_test_framework.topology import KnownTopologyGroup
from sssd_test_framework.roles.ipa import IPA
from sssd_test_framework.topology import KnownTopology, KnownTopologyGroup


@pytest.mark.importance("medium")
Expand Down Expand Up @@ -108,3 +109,142 @@ def test_netgroups__add_remove_netgroup_member(client: Client, provider: Generic
assert len(result.members) == 1
assert "(-, user-1)" not in result.members
assert "(-, user-2)" in result.members


@pytest.mark.parametrize("operation", ["Add", "Replace"])
@pytest.mark.importance("low")
@pytest.mark.topology(KnownTopology.LDAP)
@pytest.mark.topology(KnownTopology.AD)
@pytest.mark.topology(KnownTopology.Samba)
def test_netgroup__user_attribute_membernisnetgroup_uses_group_dn(
client: Client, provider: GenericProvider, operation: str
):
"""
:title: User's 'memberNisNetgroup' attribute values are the DN of the group.
:setup:
1. Create users, groups.
2. Create a new netgroup called QAUsers and add a member (ng1) to QAUsers
3. Create another netgroup named DEVUsers and add a member (ng2) to DEVUsers
4. Modify the DEVUsers netgroup to replace its members with the members of QAUsers.
5. Start sssd
:steps:
1. Retrieve all members of the DEVUsers netgroup.
2. Confirm that the member directly added to DEVUsers is present.
3. Confirm that the member from QAUsers is now part of DEVUsers.
:expectedresults:
1. All members should be retrieved
2. Members directly added to DEVUsers is present.
3. Members from QAUsers is now part of DEVUsers.
:customerscenario: False
"""
for id in [1, 2]:
provider.user(f"ng{id}").add()

netgroup_qa = provider.netgroup("QAUsers").add()
netgroup_qa.add_member(host="testhost1", user="ng1", domain="ldap.test")

netgroup_dev = provider.netgroup("DEVUsers").add()
netgroup_dev.add_member(host="testhost2", user="ng2", domain="ldap.test")
if operation == "Replace":
netgroup_dev.add_member(ng=netgroup_qa.dn)
else:
netgroup_dev.add_member(ng="QAUsers")
client.sssd.start()

member = client.tools.getent.netgroup("DEVUsers").members
assert "(testhost2, ng2, ldap.test)" in member
assert "(testhost1, ng1, ldap.test)" in member


@pytest.mark.importance("low")
@pytest.mark.topology(KnownTopology.LDAP)
@pytest.mark.topology(KnownTopology.AD)
@pytest.mark.topology(KnownTopology.Samba)
def test_netgroup__lookup_nested_groups(client: Client, provider: GenericProvider):
"""
:title: Nesting netgroups and verifying user memberships using LDAP with sssd.
:setup:
1. Create users, groups.
2. Create netgroup named netgroup and Add Member
3. Create another netgroup named nested_netgroup
4. Add Members to nested_netgroup
5. Add Circular Netgroup Nesting to nested_netgroup
6. Start sssd
:steps:
1. Retrieves all members of the "nested_netgroup" group using the getent netgroup tool.
2. Verify that users from another group is also part of "nested_netgroup".
3. Checks if a user who is not in any netgroup is part of "nested_netgroup".
4. After the SSSD restart, it retrieves the members of "nested_netgroup" again to ensure they still intact.
:expectedresults:
1. All members of the "nested_netgroup" group be there
2. Users from another group is also part of "nested_netgroup".
3. User who is not in any netgroup is part of "nested_netgroup".
4. After restart all members of the "nested_netgroup" group be there
"""
for id in [1, 2, 3]:
provider.user(f"ng{id}").add()

netgroup = provider.netgroup("netgroup").add()
netgroup.add_member(host="testhost1", user="ng1", domain="ldap.test")

nested_netgroup = provider.netgroup("nested_netgroup").add()
nested_netgroup.add_member(ng=netgroup.dn)
nested_netgroup.add_member(host="testhost2", user="ng2", domain="ldap.test")
nested_netgroup.add_member(user="ng3")

netgroup.add_member(ng=nested_netgroup.dn)

client.sssd.start()

member = client.tools.getent.netgroup("nested_netgroup").members
assert "(testhost1,ng1,ldap.test)" in member
assert "(-,ng3,)" in member
assert "(testhost2,ng2,ldap.test)" in member

client.sssd.restart()

member = client.tools.getent.netgroup("nested_netgroup").members
assert "(testhost1,ng1,ldap.test)" in member
assert "(-,ng3,)" in member
assert "(testhost2,ng2,ldap.test)" in member


@pytest.mark.parametrize(
"user, domain, expected",
[("host", "host.ldap.test", "(host,-,host.ldap.test)"), ("ng3", "", "(-,ng3,)")],
)
@pytest.mark.importance("low")
@pytest.mark.topology(KnownTopology.LDAP)
@pytest.mark.topology(KnownTopology.AD)
@pytest.mark.topology(KnownTopology.Samba)
def test_netgroup__host_and_domain(client: Client, provider: GenericProvider, user: str, domain: str, expected: str):
"""
:title: Netgroup contains a member that has a host and domain specified.
:setup:
1. Create users, groups.
2. Create QAUsers Netgroup and Add Member
3. Create DEVUsers Netgroup and Add Members
4. Start sssd
:steps:
1. Check whether the expected member is present in the DEVUsers netgroup.
:expectedresults:
1. Member is present in the DEVUsers netgroup.
:customerscenario: False
"""
for id in [1, 2]:
provider.user(f"ng{id}").add()

netgroup_qa = provider.netgroup("QAUsers").add()
netgroup_qa.add_member(host="testhost1", user="ng1", domain="ldap.test")

netgroup_dev = provider.netgroup("DEVUsers").add()
netgroup_dev.add_member(host="testhost2", user="ng2", domain="ldap.test")
if domain == "host.ldap.test":
netgroup_dev.add_member(host=user, domain=domain)
else:
netgroup_dev.add_member(user=user)

client.sssd.start()

member = client.tools.getent.netgroup("DEVUsers").members
assert expected in member

0 comments on commit 9b6e65b

Please sign in to comment.