1
0
mirror of https://github.com/samba-team/samba.git synced 2025-06-12 23:17:06 +03:00
Rob van der Linde 6ac4833678 python: tests: update all super calls to python 3 style in tests
Signed-off-by: Rob van der Linde <rob@catalyst.net.nz>
Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>

[abartlet@samba.org Some python2 style super() calls remain due
 to being an actual, even if reasonable, behaviour change]
2023-11-30 01:05:32 +00:00

203 lines
11 KiB
Python

# Unix SMB/CIFS implementation.
# Copyright (C) David Mulder 2021
#
# based on gpo.py:
# Copyright (C) Andrew Bartlett 2012
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#
import os
from samba.tests.samba_tool.base import SambaToolCmdTest
import shutil
from samba.param import LoadParm
from samba.tests.gpo import stage_file, unstage_file
import xml.etree.ElementTree as etree
class GpoCmdTestCase(SambaToolCmdTest):
"""Tests for samba-tool time subcommands"""
gpo_name = "testgpo"
def test_vgp_access_list(self):
lp = LoadParm()
lp.load(os.environ['SERVERCONFFILE'])
local_path = lp.get('path', 'sysvol')
vgp_xml = os.path.join(local_path, lp.get('realm').lower(), 'Policies',
self.gpo_guid, 'Machine/VGP/VTLA/VAS',
'HostAccessControl/Allow/manifest.xml')
stage = etree.Element('vgppolicy')
policysetting = etree.SubElement(stage, 'policysetting')
pv = etree.SubElement(policysetting, 'version')
pv.text = '1'
name = etree.SubElement(policysetting, 'name')
name.text = 'Host Access Control'
description = etree.SubElement(policysetting, 'description')
description.text = 'Represents host access control data (pam_access)'
apply_mode = etree.SubElement(policysetting, 'apply_mode')
apply_mode.text = 'merge'
data = etree.SubElement(policysetting, 'data')
listelement = etree.SubElement(data, 'listelement')
etype = etree.SubElement(listelement, 'type')
etype.text = 'USER'
entry = etree.SubElement(listelement, 'entry')
entry.text = 'goodguy@%s' % lp.get('realm').lower()
adobject = etree.SubElement(listelement, 'adobject')
name = etree.SubElement(adobject, 'name')
name.text = 'goodguy'
domain = etree.SubElement(adobject, 'domain')
domain.text = lp.get('realm').lower()
etype = etree.SubElement(adobject, 'type')
etype.text = 'user'
groupattr = etree.SubElement(data, 'groupattr')
groupattr.text = 'samAccountName'
listelement = etree.SubElement(data, 'listelement')
etype = etree.SubElement(listelement, 'type')
etype.text = 'GROUP'
entry = etree.SubElement(listelement, 'entry')
entry.text = '%s\\goodguys' % lp.get('realm').lower()
adobject = etree.SubElement(listelement, 'adobject')
name = etree.SubElement(adobject, 'name')
name.text = 'goodguys'
domain = etree.SubElement(adobject, 'domain')
domain.text = lp.get('realm').lower()
etype = etree.SubElement(adobject, 'type')
etype.text = 'group'
ret = stage_file(vgp_xml, etree.tostring(stage, 'utf-8'))
self.assertTrue(ret, 'Could not create the target %s' % vgp_xml)
uentry = '+:%s\\goodguy:ALL' % domain.text
gentry = '+:%s\\goodguys:ALL' % domain.text
(result, out, err) = self.runsublevelcmd("gpo", ("manage",
"access", "list"),
self.gpo_guid, "-H",
"ldap://%s" %
os.environ["SERVER"],
"-U%s%%%s" %
(os.environ["USERNAME"],
os.environ["PASSWORD"]))
self.assertIn(uentry, out, 'The test entry was not found!')
self.assertIn(gentry, out, 'The test entry was not found!')
# Unstage the manifest.xml file
unstage_file(vgp_xml)
def test_vgp_access_add(self):
lp = LoadParm()
lp.load(os.environ['SERVERCONFFILE'])
(result, out, err) = self.runsublevelcmd("gpo", ("manage",
"access", "add"),
self.gpo_guid,
"allow", self.test_user,
lp.get('realm').lower(),
"-H", "ldap://%s" %
os.environ["SERVER"],
"-U%s%%%s" %
(os.environ["USERNAME"],
os.environ["PASSWORD"]))
self.assertCmdSuccess(result, out, err, 'Access add failed')
(result, out, err) = self.runsublevelcmd("gpo", ("manage",
"access", "add"),
self.gpo_guid,
"deny", self.test_group,
lp.get('realm').lower(),
"-H", "ldap://%s" %
os.environ["SERVER"],
"-U%s%%%s" %
(os.environ["USERNAME"],
os.environ["PASSWORD"]))
self.assertCmdSuccess(result, out, err, 'Access add failed')
allow_entry = '+:%s\\%s:ALL' % (lp.get('realm').lower(), self.test_user)
deny_entry = '-:%s\\%s:ALL' % (lp.get('realm').lower(), self.test_group)
(result, out, err) = self.runsublevelcmd("gpo", ("manage",
"access", "list"),
self.gpo_guid, "-H",
"ldap://%s" %
os.environ["SERVER"],
"-U%s%%%s" %
(os.environ["USERNAME"],
os.environ["PASSWORD"]))
self.assertIn(allow_entry, out, 'The test entry was not found!')
self.assertIn(deny_entry, out, 'The test entry was not found!')
(result, out, err) = self.runsublevelcmd("gpo", ("manage",
"access", "remove"),
self.gpo_guid,
"allow", self.test_user,
lp.get('realm').lower(),
"-H", "ldap://%s" %
os.environ["SERVER"],
"-U%s%%%s" %
(os.environ["USERNAME"],
os.environ["PASSWORD"]))
self.assertCmdSuccess(result, out, err, 'Access remove failed')
(result, out, err) = self.runsublevelcmd("gpo", ("manage",
"access", "remove"),
self.gpo_guid,
"deny", self.test_group,
lp.get('realm').lower(),
"-H", "ldap://%s" %
os.environ["SERVER"],
"-U%s%%%s" %
(os.environ["USERNAME"],
os.environ["PASSWORD"]))
self.assertCmdSuccess(result, out, err, 'Access remove failed')
(result, out, err) = self.runsublevelcmd("gpo", ("manage",
"access", "list"),
self.gpo_guid, "-H",
"ldap://%s" %
os.environ["SERVER"],
"-U%s%%%s" %
(os.environ["USERNAME"],
os.environ["PASSWORD"]))
self.assertNotIn(allow_entry, out, 'The test entry was still found!')
self.assertNotIn(deny_entry, out, 'The test entry was still found!')
def setUp(self):
"""set up a temporary GPO to work with"""
super().setUp()
(result, out, err) = self.runsubcmd("gpo", "create", self.gpo_name,
"-H", "ldap://%s" % os.environ["SERVER"],
"-U%s%%%s" % (os.environ["USERNAME"], os.environ["PASSWORD"]),
"--tmpdir", self.tempdir)
self.assertCmdSuccess(result, out, err, "Ensuring gpo created successfully")
shutil.rmtree(os.path.join(self.tempdir, "policy"))
try:
self.gpo_guid = "{%s}" % out.split("{")[1].split("}")[0]
except IndexError:
self.fail("Failed to find GUID in output: %s" % out)
self.test_user = 'testuser'
(result, out, err) = self.runsubcmd("user", "add", self.test_user,
"--random-password")
self.assertCmdSuccess(result, out, err, 'User creation failed')
self.test_group = 'testgroup'
(result, out, err) = self.runsubcmd("group", "add", self.test_group)
self.assertCmdSuccess(result, out, err, 'Group creation failed')
def tearDown(self):
"""remove the temporary GPO to work with"""
(result, out, err) = self.runsubcmd("gpo", "del", self.gpo_guid, "-H", "ldap://%s" % os.environ["SERVER"], "-U%s%%%s" % (os.environ["USERNAME"], os.environ["PASSWORD"]))
self.assertCmdSuccess(result, out, err, "Ensuring gpo deleted successfully")
(result, out, err) = self.runsubcmd("user", "delete", self.test_user)
self.assertCmdSuccess(result, out, err, 'User delete failed')
(result, out, err) = self.runsubcmd("group", "delete", self.test_group)
self.assertCmdSuccess(result, out, err, 'Group delete failed')
super().tearDown()