python/sambe/tests/samba_tool: PY3 port for tests.samba_tool.group
[samba.git] / python / samba / tests / samba_tool / group.py
1 # Unix SMB/CIFS implementation.
2 # Copyright (C) Michael Adam 2012
3 #
4 # This program is free software; you can redistribute it and/or modify
5 # it under the terms of the GNU General Public License as published by
6 # the Free Software Foundation; either version 3 of the License, or
7 # (at your option) any later version.
8 #
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
12 # GNU General Public License for more details.
13 #
14 # You should have received a copy of the GNU General Public License
15 # along with this program.  If not, see <http://www.gnu.org/licenses/>.
16 #
17
18 import os
19 import time
20 import ldb
21 from samba.tests.samba_tool.base import SambaToolCmdTest
22 from samba import (
23         nttime2unix,
24         dsdb
25         )
26
27
28 class GroupCmdTestCase(SambaToolCmdTest):
29     """Tests for samba-tool group subcommands"""
30     groups = []
31     samdb = None
32
33     def setUp(self):
34         super(GroupCmdTestCase, self).setUp()
35         self.samdb = self.getSamDB("-H", "ldap://%s" % os.environ["DC_SERVER"],
36                                    "-U%s%%%s" % (os.environ["DC_USERNAME"], os.environ["DC_PASSWORD"]))
37         self.groups = []
38         self.groups.append(self._randomGroup({"name": "testgroup1"}))
39         self.groups.append(self._randomGroup({"name": "testgroup2"}))
40         self.groups.append(self._randomGroup({"name": "testgroup3"}))
41         self.groups.append(self._randomGroup({"name": "testgroup4"}))
42
43         # setup the 4 groups and ensure they are correct
44         for group in self.groups:
45             (result, out, err) = self._create_group(group)
46
47             self.assertCmdSuccess(result, out, err)
48             self.assertEquals(err, "", "There shouldn't be any error message")
49             self.assertIn("Added group %s" % group["name"], out)
50
51             found = self._find_group(group["name"])
52
53             self.assertIsNotNone(found)
54
55             self.assertEquals("%s" % found.get("name"), group["name"])
56             self.assertEquals("%s" % found.get("description"), group["description"])
57
58     def tearDown(self):
59         super(GroupCmdTestCase, self).tearDown()
60         # clean up all the left over groups, just in case
61         for group in self.groups:
62             if self._find_group(group["name"]):
63                 self.runsubcmd("group", "delete", group["name"])
64
65     def test_newgroup(self):
66         """This tests the "group add" and "group delete" commands"""
67         # try to add all the groups again, this should fail
68         for group in self.groups:
69             (result, out, err) = self._create_group(group)
70             self.assertCmdFail(result, "Succeeded to create existing group")
71             self.assertIn("LDAP error 68 LDAP_ENTRY_ALREADY_EXISTS", err)
72
73         # try to delete all the groups we just added
74         for group in self.groups:
75             (result, out, err) = self.runsubcmd("group", "delete", group["name"])
76             self.assertCmdSuccess(result, out, err,
77                                   "Failed to delete group '%s'" % group["name"])
78             found = self._find_group(group["name"])
79             self.assertIsNone(found,
80                               "Deleted group '%s' still exists" % group["name"])
81
82         # test adding groups
83         for group in self.groups:
84             (result, out, err) = self.runsubcmd("group", "add", group["name"],
85                                                  "--description=%s" % group["description"],
86                                                  "-H", "ldap://%s" % os.environ["DC_SERVER"],
87                                                  "-U%s%%%s" % (os.environ["DC_USERNAME"],
88                                                                os.environ["DC_PASSWORD"]))
89
90             self.assertCmdSuccess(result, out, err)
91             self.assertEquals(err, "", "There shouldn't be any error message")
92             self.assertIn("Added group %s" % group["name"], out)
93
94             found = self._find_group(group["name"])
95
96             self.assertEquals("%s" % found.get("samaccountname"),
97                               "%s" % group["name"])
98
99     def test_list(self):
100         (result, out, err) = self.runsubcmd("group", "list",
101                                             "-H", "ldap://%s" % os.environ["DC_SERVER"],
102                                             "-U%s%%%s" % (os.environ["DC_USERNAME"],
103                                                           os.environ["DC_PASSWORD"]))
104         self.assertCmdSuccess(result, out, err, "Error running list")
105
106         search_filter = "(objectClass=group)"
107
108         grouplist = self.samdb.search(base=self.samdb.domain_dn(),
109                                       scope=ldb.SCOPE_SUBTREE,
110                                       expression=search_filter,
111                                       attrs=["samaccountname"])
112
113         self.assertTrue(len(grouplist) > 0, "no groups found in samdb")
114
115         for groupobj in grouplist:
116             name = str(groupobj.get("samaccountname", idx=0))
117             found = self.assertMatch(out, name,
118                                      "group '%s' not found" % name)
119
120     def test_listmembers(self):
121         (result, out, err) = self.runsubcmd("group", "listmembers", "Domain Users",
122                                             "-H", "ldap://%s" % os.environ["DC_SERVER"],
123                                             "-U%s%%%s" % (os.environ["DC_USERNAME"],
124                                                           os.environ["DC_PASSWORD"]))
125         self.assertCmdSuccess(result, out, err, "Error running listmembers")
126
127         search_filter = "(|(primaryGroupID=513)(memberOf=CN=Domain Users,CN=Users,%s))" % self.samdb.domain_dn()
128
129         grouplist = self.samdb.search(base=self.samdb.domain_dn(),
130                                       scope=ldb.SCOPE_SUBTREE,
131                                       expression=search_filter,
132                                       attrs=["samAccountName"])
133
134         self.assertTrue(len(grouplist) > 0, "no groups found in samdb")
135
136         for groupobj in grouplist:
137             name = str(groupobj.get("samAccountName", idx=0))
138             found = self.assertMatch(out, name, "group '%s' not found" % name)
139
140     def test_move(self):
141         full_ou_dn = str(self.samdb.normalize_dn_in_domain("OU=movetest"))
142         (result, out, err) = self.runsubcmd("ou", "create", full_ou_dn)
143         self.assertCmdSuccess(result, out, err)
144         self.assertEquals(err, "", "There shouldn't be any error message")
145         self.assertIn('Created ou "%s"' % full_ou_dn, out)
146
147         for group in self.groups:
148             (result, out, err) = self.runsubcmd(
149                 "group", "move", group["name"], full_ou_dn)
150             self.assertCmdSuccess(result, out, err, "Error running move")
151             self.assertIn('Moved group "%s" into "%s"' %
152                           (group["name"], full_ou_dn), out)
153
154         # Should fail as groups objects are in OU
155         (result, out, err) = self.runsubcmd("ou", "delete", full_ou_dn)
156         self.assertCmdFail(result)
157         self.assertIn(("subtree_delete: Unable to delete a non-leaf node "
158                        "(it has %d children)!") % len(self.groups), err)
159
160         for group in self.groups:
161             new_dn = "CN=Users,%s" % self.samdb.domain_dn()
162             (result, out, err) = self.runsubcmd(
163                 "group", "move", group["name"], new_dn)
164             self.assertCmdSuccess(result, out, err, "Error running move")
165             self.assertIn('Moved group "%s" into "%s"' %
166                           (group["name"], new_dn), out)
167
168         (result, out, err) = self.runsubcmd("ou", "delete", full_ou_dn)
169         self.assertCmdSuccess(result, out, err,
170                               "Failed to delete ou '%s'" % full_ou_dn)
171
172     def test_show(self):
173         """Assert that we can show a group correctly."""
174         (result, out, err) = self.runsubcmd("group", "show", "Domain Users",
175                                             "-H", "ldap://%s" % os.environ["DC_SERVER"],
176                                             "-U%s%%%s" % (os.environ["DC_USERNAME"],
177                                                           os.environ["DC_PASSWORD"]))
178         self.assertCmdSuccess(result, out, err)
179         self.assertEquals(err, "", "Shouldn't be any error messages")
180         self.assertIn("dn: CN=Domain Users,CN=Users,DC=samba,DC=example,DC=com", out)
181
182     def _randomGroup(self, base={}):
183         """create a group with random attribute values, you can specify base attributes"""
184         group = {
185             "name": self.randomName(),
186             "description": self.randomName(count=100),
187         }
188         group.update(base)
189         return group
190
191     def _create_group(self, group):
192         return self.runsubcmd("group", "add", group["name"],
193                               "--description=%s" % group["description"],
194                               "-H", "ldap://%s" % os.environ["DC_SERVER"],
195                               "-U%s%%%s" % (os.environ["DC_USERNAME"],
196                                             os.environ["DC_PASSWORD"]))
197
198     def _find_group(self, name):
199         search_filter = ("(&(sAMAccountName=%s)(objectCategory=%s,%s))" %
200                          (ldb.binary_encode(name),
201                           "CN=Group,CN=Schema,CN=Configuration",
202                           self.samdb.domain_dn()))
203         grouplist = self.samdb.search(base=self.samdb.domain_dn(),
204                                       scope=ldb.SCOPE_SUBTREE,
205                                       expression=search_filter,
206                                       attrs=[])
207         if grouplist:
208             return grouplist[0]
209         else:
210             return None