]> git.ipfire.org Git - thirdparty/samba.git/commitdiff
netcmd: tests: add tests for user auth policy and silo commands
authorRob van der Linde <rob@catalyst.net.nz>
Tue, 31 Oct 2023 02:20:25 +0000 (15:20 +1300)
committerAndrew Bartlett <abartlet@samba.org>
Wed, 15 Nov 2023 04:05:34 +0000 (04:05 +0000)
Signed-off-by: Rob van der Linde <rob@catalyst.net.nz>
Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
python/samba/tests/samba_tool/user_auth_policy.py [new file with mode: 0644]
python/samba/tests/samba_tool/user_auth_silo.py [new file with mode: 0644]
source4/selftest/tests.py

diff --git a/python/samba/tests/samba_tool/user_auth_policy.py b/python/samba/tests/samba_tool/user_auth_policy.py
new file mode 100644 (file)
index 0000000..c5bdd06
--- /dev/null
@@ -0,0 +1,86 @@
+# Unix SMB/CIFS implementation.
+#
+# Tests for samba-tool user auth policy command
+#
+# Copyright (C) Catalyst.Net Ltd. 2023
+#
+# Written by Rob van der Linde <rob@catalyst.net.nz>
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; either version 3 of the License, or
+# (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program.  If not, see <http://www.gnu.org/licenses/>.
+#
+
+from samba.netcmd.domain.models import AuthenticationPolicy, User
+
+from .silo_base import SiloTest
+
+
+class AuthPolicyCmdTestCase(SiloTest):
+    def test_assign(self):
+        """Test assigning an authentication policy to a user."""
+        self.addCleanup(self.runcmd, "user", "auth", "policy", "remove", "alice")
+        result, out, err = self.runcmd("user", "auth", "policy", "assign",
+                                       "alice", "--policy", "User Policy")
+        self.assertIsNone(result, msg=err)
+
+        # Assigned policy should be 'Developers'
+        user = User.get(self.samdb, username="alice")
+        policy = AuthenticationPolicy.get(self.samdb, dn=user.assigned_policy)
+        self.assertEqual(policy.name, "User Policy")
+
+    def test_assign__invalid_policy(self):
+        """Test assigning a non-existing authentication policy to a user."""
+        result, out, err = self.runcmd("user", "auth", "policy", "assign",
+                                       "alice", "--policy", "doesNotExist")
+        self.assertEqual(result, -1)
+        self.assertIn("Authentication policy doesNotExist not found.", err)
+
+    def test_remove(self):
+        """Test removing the assigned authentication policy from a user."""
+        # First assign a policy, so we can test removing it.
+        self.runcmd("user", "auth", "policy", "assign", "bob", "--policy",
+                    "User Policy")
+
+        # Assigned policy should be set
+        user = User.get(self.samdb, username="bob")
+        self.assertIsNotNone(user.assigned_policy)
+
+        # Now try removing it
+        result, out, err = self.runcmd("user", "auth", "policy", "remove",
+                                       "bob")
+        self.assertIsNone(result, msg=err)
+
+        # Assigned policy should be None
+        user = User.get(self.samdb, username="bob")
+        self.assertIsNone(user.assigned_policy)
+
+    def test_view(self):
+        """Test viewing the current assigned authentication policy on a user."""
+        # Assign a policy on one of the users.
+        self.addCleanup(self.runcmd, "user", "auth", "policy", "remove", "bob")
+        self.runcmd("user", "auth", "policy", "assign", "bob", "--policy",
+                    "User Policy")
+
+        # Test user with a policy assigned.
+        result, out, err = self.runcmd("user", "auth", "policy", "view",
+                                       "bob")
+        self.assertIsNone(result, msg=err)
+        self.assertEqual(
+            out, "User bob assigned to authentication policy User Policy\n")
+
+        # Test user without a policy assigned.
+        result, out, err = self.runcmd("user", "auth", "policy", "view",
+                                       "joe")
+        self.assertIsNone(result, msg=err)
+        self.assertEqual(
+            out, "User joe has no assigned authentication policy.\n")
diff --git a/python/samba/tests/samba_tool/user_auth_silo.py b/python/samba/tests/samba_tool/user_auth_silo.py
new file mode 100644 (file)
index 0000000..19cce26
--- /dev/null
@@ -0,0 +1,84 @@
+# Unix SMB/CIFS implementation.
+#
+# Tests for samba-tool user auth silo command
+#
+# Copyright (C) Catalyst.Net Ltd. 2023
+#
+# Written by Rob van der Linde <rob@catalyst.net.nz>
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; either version 3 of the License, or
+# (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program.  If not, see <http://www.gnu.org/licenses/>.
+#
+
+from samba.netcmd.domain.models import AuthenticationSilo, User
+
+from .silo_base import SiloTest
+
+
+class AuthPolicyCmdTestCase(SiloTest):
+    def test_assign(self):
+        """Test assigning an authentication silo to a user."""
+        self.addCleanup(self.runcmd, "user", "auth", "silo", "remove", "alice")
+        result, out, err = self.runcmd("user", "auth", "silo", "assign",
+                                       "alice", "--silo", "Developers")
+        self.assertIsNone(result, msg=err)
+
+        # Assigned silo should be 'Developers'
+        user = User.get(self.samdb, username="alice")
+        silo = AuthenticationSilo.get(self.samdb, dn=user.assigned_silo)
+        self.assertEqual(silo.name, "Developers")
+
+    def test_assign__invalid_silo(self):
+        """Test assigning a non-existing authentication silo to a user."""
+        result, out, err = self.runcmd("user", "auth", "silo", "assign",
+                                       "alice", "--silo", "doesNotExist")
+        self.assertEqual(result, -1)
+        self.assertIn("Authentication silo doesNotExist not found.", err)
+
+    def test_remove(self):
+        """Test removing the assigned authentication silo from a user."""
+        # First assign a silo, so we can test removing it.
+        self.runcmd("user", "auth", "silo", "assign", "bob", "--silo", "QA")
+
+        # Assigned silo should be set
+        user = User.get(self.samdb, username="bob")
+        self.assertIsNotNone(user.assigned_silo)
+
+        # Now try removing it
+        result, out, err = self.runcmd("user", "auth", "silo", "remove",
+                                       "bob")
+        self.assertIsNone(result, msg=err)
+
+        # Assigned silo should be None
+        user = User.get(self.samdb, username="bob")
+        self.assertIsNone(user.assigned_silo)
+
+    def test_view(self):
+        """Test viewing the current assigned authentication silo on a user."""
+        # Assign a silo on one of the users.
+        self.addCleanup(self.runcmd, "user", "auth", "silo", "remove", "bob")
+        self.runcmd("user", "auth", "silo", "assign", "bob", "--silo", "QA")
+
+        # Test user with a silo assigned.
+        result, out, err = self.runcmd("user", "auth", "silo", "view",
+                                       "bob")
+        self.assertIsNone(result, msg=err)
+        self.assertEqual(
+            out, "User bob assigned to authentication silo QA (revoked)\n")
+
+        # Test user without a silo assigned.
+        result, out, err = self.runcmd("user", "auth", "silo", "view",
+                                       "joe")
+        self.assertIsNone(result, msg=err)
+        self.assertEqual(
+            out, "User joe has no assigned authentication silo.\n")
index 1492e13a7c1cf75c2a7f86a3b2812f8cfbb9ef51..07be4b983a7eaf194c8e403f1d4f813def9d303a 100755 (executable)
@@ -1138,6 +1138,8 @@ for env in ["ad_dc_ntvfs", "ad_dc"]:
 planpythontestsuite("ad_dc_default:local", "samba.tests.samba_tool.processes")
 
 planpythontestsuite("ad_dc_ntvfs:local", "samba.tests.samba_tool.user")
+planpythontestsuite("ad_dc_default", "samba.tests.samba_tool.user_auth_policy")
+planpythontestsuite("ad_dc_default", "samba.tests.samba_tool.user_auth_silo")
 for env in ["ad_dc_default:local", "ad_dc_no_ntlm:local"]:
     planpythontestsuite(env, "samba.tests.samba_tool.user_wdigest")
 for env, nt_hash in [("ad_dc:local", True),