1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-23 17:34:34 +03:00
samba-mirror/source4/dsdb/tests/python/asq.py
Joseph Sutton b59fc43523 python: Fix usage strings
Signed-off-by: Joseph Sutton <josephsutton@catalyst.net.nz>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
Reviewed-by: Jeremy Allison <jra@samba.org>
2021-09-04 00:10:37 +00:00

226 lines
7.6 KiB
Python

#!/usr/bin/env python3
#
# Test ASQ LDAP control behaviour in Samba
# Copyright (C) Andrew Bartlett 2019-2020
#
# Based on Unit tests for the notification control
# Copyright (C) Stefan Metzmacher 2016
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
import optparse
import sys
import os
import random
sys.path.insert(0, "bin/python")
import samba
from samba.tests.subunitrun import SubunitOptions, TestProgram
import samba.getopt as options
from samba.auth import system_session
from samba import ldb
from samba.samdb import SamDB
from samba.ndr import ndr_unpack
from samba import gensec
from samba.credentials import Credentials
import samba.tests
from ldb import SCOPE_SUBTREE, SCOPE_ONELEVEL, SCOPE_BASE, LdbError
from ldb import ERR_TIME_LIMIT_EXCEEDED, ERR_ADMIN_LIMIT_EXCEEDED, ERR_UNWILLING_TO_PERFORM
from ldb import Message
parser = optparse.OptionParser("asq.py [options] <host>")
sambaopts = options.SambaOptions(parser)
parser.add_option_group(sambaopts)
parser.add_option_group(options.VersionOptions(parser))
# use command line creds if available
credopts = options.CredentialsOptions(parser)
parser.add_option_group(credopts)
subunitopts = SubunitOptions(parser)
parser.add_option_group(subunitopts)
opts, args = parser.parse_args()
if len(args) < 1:
parser.print_usage()
sys.exit(1)
url = args[0]
lp = sambaopts.get_loadparm()
creds = credopts.get_credentials(lp)
class ASQLDAPTest(samba.tests.TestCase):
def setUp(self):
super(ASQLDAPTest, self).setUp()
self.ldb = samba.Ldb(url, credentials=creds, session_info=system_session(lp), lp=lp)
self.base_dn = self.ldb.get_default_basedn()
self.NAME_ASQ="asq_" + format(random.randint(0, 99999), "05")
self.OU_NAME_ASQ= self.NAME_ASQ + "_ou"
self.ou_dn = ldb.Dn(self.ldb, "ou=" + self.OU_NAME_ASQ + "," + str(self.base_dn))
samba.tests.delete_force(self.ldb, self.ou_dn,
controls=['tree_delete:1'])
self.ldb.add({
"dn": self.ou_dn,
"objectclass": "organizationalUnit",
"ou": self.OU_NAME_ASQ})
self.members = []
self.members2 = []
for x in range(20):
name = self.NAME_ASQ + "_" + str(x)
dn = ldb.Dn(self.ldb,
"cn=" + name + "," + str(self.ou_dn))
self.members.append(dn)
self.ldb.add({
"dn": dn,
"objectclass": "group"})
for x in range(20):
name = self.NAME_ASQ + "_" + str(x + 20)
dn = ldb.Dn(self.ldb,
"cn=" + name + "," + str(self.ou_dn))
self.members2.append(dn)
self.ldb.add({
"dn": dn,
"objectclass": "group",
"member": [str(x) for x in self.members]})
name = self.NAME_ASQ + "_" + str(x + 40)
self.top_dn = ldb.Dn(self.ldb,
"cn=" + name + "," + str(self.ou_dn))
self.ldb.add({
"dn": self.top_dn,
"objectclass": "group",
"member": [str(x) for x in self.members2]})
def tearDown(self):
samba.tests.delete_force(self.ldb, self.ou_dn,
controls=['tree_delete:1'])
def test_asq(self):
"""Testing ASQ behaviour.
ASQ is very strange, it turns a BASE search into a search for
all the objects pointed to by the specified attribute,
returning multiple entries!
"""
msgs = self.ldb.search(base=self.top_dn,
scope=ldb.SCOPE_BASE,
attrs=["objectGUID", "cn", "member"],
controls=["asq:1:member"])
self.assertEqual(len(msgs), 20)
for msg in msgs:
self.assertNotEqual(msg.dn, self.top_dn)
self.assertIn(msg.dn, self.members2)
for group in msg["member"]:
self.assertIn(ldb.Dn(self.ldb, str(group)),
self.members)
def test_asq_paged(self):
"""Testing ASQ behaviour with paged_results set.
ASQ is very strange, it turns a BASE search into a search for
all the objects pointed to by the specified attribute,
returning multiple entries!
"""
msgs = self.ldb.search(base=self.top_dn,
scope=ldb.SCOPE_BASE,
attrs=["objectGUID", "cn", "member"],
controls=["asq:1:member",
"paged_results:1:1024"])
self.assertEqual(len(msgs), 20)
for msg in msgs:
self.assertNotEqual(msg.dn, self.top_dn)
self.assertIn(msg.dn, self.members2)
for group in msg["member"]:
self.assertIn(ldb.Dn(self.ldb, str(group)),
self.members)
def test_asq_vlv(self):
"""Testing ASQ behaviour with VLV set.
ASQ is very strange, it turns a BASE search into a search for
all the objects pointed to by the specified attribute,
returning multiple entries!
"""
sort_control = "server_sort:1:0:cn"
msgs = self.ldb.search(base=self.top_dn,
scope=ldb.SCOPE_BASE,
attrs=["objectGUID", "cn", "member"],
controls=["asq:1:member",
sort_control,
"vlv:1:20:20:11:0"])
self.assertEqual(len(msgs), 20)
for msg in msgs:
self.assertNotEqual(msg.dn, self.top_dn)
self.assertIn(msg.dn, self.members2)
for group in msg["member"]:
self.assertIn(ldb.Dn(self.ldb, str(group)),
self.members)
def test_asq_vlv_paged(self):
"""Testing ASQ behaviour with VLV and paged_results set.
ASQ is very strange, it turns a BASE search into a search for
all the objects pointed to by the specified attribute,
returning multiple entries!
Thankfully combining both of these gives
unavailable-critical-extension against Windows 1709
"""
sort_control = "server_sort:1:0:cn"
try:
msgs = self.ldb.search(base=self.top_dn,
scope=ldb.SCOPE_BASE,
attrs=["objectGUID", "cn", "member"],
controls=["asq:1:member",
sort_control,
"vlv:1:20:20:11:0",
"paged_results:1:1024"])
self.fail("should have failed with LDAP_UNAVAILABLE_CRITICAL_EXTENSION")
except ldb.LdbError as e:
(enum, estr) = e.args
self.assertEqual(enum, ldb.ERR_UNSUPPORTED_CRITICAL_EXTENSION)
if "://" not in url:
if os.path.isfile(url):
url = "tdb://%s" % url
else:
url = "ldap://%s" % url
TestProgram(module=__name__, opts=subunitopts)