2 # -*- coding: utf-8 -*-
8 sys.path.append("bin/python")
10 samba.ensure_external_module("testtools", "testtools")
11 samba.ensure_external_module("subunit", "subunit/python")
13 import samba.getopt as options
15 from samba.auth import system_session
16 from ldb import SCOPE_BASE, LdbError
17 from ldb import ERR_NO_SUCH_OBJECT, ERR_NOT_ALLOWED_ON_NON_LEAF
18 from ldb import ERR_UNWILLING_TO_PERFORM
19 from samba.samdb import SamDB
21 from subunit.run import SubunitTestRunner
24 parser = optparse.OptionParser("deletetest.py [options] <host|file>")
25 sambaopts = options.SambaOptions(parser)
26 parser.add_option_group(sambaopts)
27 parser.add_option_group(options.VersionOptions(parser))
28 # use command line creds if available
29 credopts = options.CredentialsOptions(parser)
30 parser.add_option_group(credopts)
31 opts, args = parser.parse_args()
39 lp = sambaopts.get_loadparm()
40 creds = credopts.get_credentials(lp)
42 class BasicDeleteTests(unittest.TestCase):
44 def delete_force(self, ldb, dn):
47 except LdbError, (num, _):
48 self.assertEquals(num, ERR_NO_SUCH_OBJECT)
50 def GUID_string(self, guid):
51 return self.ldb.schema_format_value("objectGUID", guid)
55 self.base_dn = ldb.domain_dn()
56 self.configuration_dn = ldb.get_config_basedn().get_linearized()
58 def search_guid(self, guid):
59 print "SEARCH by GUID %s" % self.GUID_string(guid)
61 res = ldb.search(base="<GUID=%s>" % self.GUID_string(guid),
62 scope=SCOPE_BASE, controls=["show_deleted:1"])
63 self.assertEquals(len(res), 1)
66 def search_dn(self,dn):
67 print "SEARCH by DN %s" % dn
69 res = ldb.search(expression="(objectClass=*)",
72 controls=["show_deleted:1"])
73 self.assertEquals(len(res), 1)
76 def del_attr_values(self, delObj):
77 print "Checking attributes for %s" % delObj["dn"]
79 self.assertEquals(delObj["isDeleted"][0],"TRUE")
80 self.assertTrue(not("objectCategory" in delObj))
81 self.assertTrue(not("sAMAccountType" in delObj))
83 def preserved_attributes_list(self, liveObj, delObj):
84 print "Checking for preserved attributes list"
86 preserved_list = ["nTSecurityDescriptor", "attributeID", "attributeSyntax", "dNReferenceUpdate", "dNSHostName",
87 "flatName", "governsID", "groupType", "instanceType", "lDAPDisplayName", "legacyExchangeDN",
88 "isDeleted", "isRecycled", "lastKnownParent", "msDS-LastKnownRDN", "mS-DS-CreatorSID",
89 "mSMQOwnerID", "nCName", "objectClass", "distinguishedName", "objectGUID", "objectSid",
90 "oMSyntax", "proxiedObjectName", "name", "replPropertyMetaData", "sAMAccountName",
91 "securityIdentifier", "sIDHistory", "subClassOf", "systemFlags", "trustPartner", "trustDirection",
92 "trustType", "trustAttributes", "userAccountControl", "uSNChanged", "uSNCreated", "whenCreated"]
95 if a in preserved_list:
96 self.assertTrue(a in delObj)
98 def check_rdn(self, liveObj, delObj, rdnName):
99 print "Checking for correct rDN"
100 rdn=liveObj[rdnName][0]
101 rdn2=delObj[rdnName][0]
102 name2=delObj[rdnName][0]
103 guid=liveObj["objectGUID"][0]
104 self.assertEquals(rdn2, rdn + "\nDEL:" + self.GUID_string(guid))
105 self.assertEquals(name2, rdn + "\nDEL:" + self.GUID_string(guid))
107 def delete_deleted(self, ldb, dn):
108 print "Testing the deletion of the already deleted dn %s" % dn
113 except LdbError, (num, _):
114 self.assertEquals(num, ERR_NO_SUCH_OBJECT)
116 def test_delete_protection(self):
117 """Delete protection tests"""
121 self.delete_force(self.ldb, "cn=entry1,cn=ldaptestcontainer," + self.base_dn)
122 self.delete_force(self.ldb, "cn=entry2,cn=ldaptestcontainer," + self.base_dn)
123 self.delete_force(self.ldb, "cn=ldaptestcontainer," + self.base_dn)
126 "dn": "cn=ldaptestcontainer," + self.base_dn,
127 "objectclass": "container"})
129 "dn": "cn=entry1,cn=ldaptestcontainer," + self.base_dn,
130 "objectclass": "container"})
132 "dn": "cn=entry2,cn=ldaptestcontainer," + self.base_dn,
133 "objectclass": "container"})
136 ldb.delete("cn=ldaptestcontainer," + self.base_dn)
138 except LdbError, (num, _):
139 self.assertEquals(num, ERR_NOT_ALLOWED_ON_NON_LEAF)
141 ldb.delete("cn=ldaptestcontainer," + self.base_dn, ["tree_delete:1"])
144 res = ldb.search("cn=ldaptestcontainer," + self.base_dn,
145 scope=SCOPE_BASE, attrs=[])
147 except LdbError, (num, _):
148 self.assertEquals(num, ERR_NO_SUCH_OBJECT)
150 res = ldb.search("cn=entry1,cn=ldaptestcontainer," + self.base_dn,
151 scope=SCOPE_BASE, attrs=[])
153 except LdbError, (num, _):
154 self.assertEquals(num, ERR_NO_SUCH_OBJECT)
156 res = ldb.search("cn=entry2,cn=ldaptestcontainer," + self.base_dn,
157 scope=SCOPE_BASE, attrs=[])
159 except LdbError, (num, _):
160 self.assertEquals(num, ERR_NO_SUCH_OBJECT)
162 self.delete_force(self.ldb, "cn=entry1,cn=ldaptestcontainer," + self.base_dn)
163 self.delete_force(self.ldb, "cn=entry2,cn=ldaptestcontainer," + self.base_dn)
164 self.delete_force(self.ldb, "cn=ldaptestcontainer," + self.base_dn)
166 # Performs some protected object delete testing
168 res = ldb.search(base="", expression="", scope=SCOPE_BASE,
169 attrs=["dsServiceName", "dNSHostName"])
170 self.assertEquals(len(res), 1)
172 # Delete failing since DC's nTDSDSA object is protected
174 ldb.delete(res[0]["dsServiceName"][0])
176 except LdbError, (num, _):
177 self.assertEquals(num, ERR_UNWILLING_TO_PERFORM)
179 res = ldb.search(self.base_dn, attrs=["rIDSetReferences"],
180 expression="(&(objectClass=computer)(dNSHostName=" + res[0]["dNSHostName"][0] + "))")
181 self.assertEquals(len(res), 1)
183 # Deletes failing since DC's rIDSet object is protected
185 ldb.delete(res[0]["rIDSetReferences"][0])
187 except LdbError, (num, _):
188 self.assertEquals(num, ERR_UNWILLING_TO_PERFORM)
190 ldb.delete(res[0]["rIDSetReferences"][0], ["tree_delete:1"])
192 except LdbError, (num, _):
193 self.assertEquals(num, ERR_UNWILLING_TO_PERFORM)
195 # Deletes failing since three main crossRef objects are protected
198 ldb.delete("cn=Enterprise Schema,cn=Partitions," + self.configuration_dn)
200 except LdbError, (num, _):
201 self.assertEquals(num, ERR_UNWILLING_TO_PERFORM)
203 ldb.delete("cn=Enterprise Schema,cn=Partitions," + self.configuration_dn, ["tree_delete:1"])
205 except LdbError, (num, _):
206 self.assertEquals(num, ERR_UNWILLING_TO_PERFORM)
209 ldb.delete("cn=Enterprise Configuration,cn=Partitions," + self.configuration_dn)
211 except LdbError, (num, _):
212 self.assertEquals(num, ERR_NOT_ALLOWED_ON_NON_LEAF)
214 ldb.delete("cn=Enterprise Configuration,cn=Partitions," + self.configuration_dn, ["tree_delete:1"])
216 except LdbError, (num, _):
217 self.assertEquals(num, ERR_NOT_ALLOWED_ON_NON_LEAF)
219 res = ldb.search("cn=Partitions," + self.configuration_dn, attrs=[],
220 expression="(nCName=%s)" % self.base_dn)
221 self.assertEquals(len(res), 1)
224 ldb.delete(res[0].dn)
226 except LdbError, (num, _):
227 self.assertEquals(num, ERR_NOT_ALLOWED_ON_NON_LEAF)
229 ldb.delete(res[0].dn, ["tree_delete:1"])
231 except LdbError, (num, _):
232 self.assertEquals(num, ERR_NOT_ALLOWED_ON_NON_LEAF)
234 # Delete failing since "SYSTEM_FLAG_DISALLOW_DELETE"
236 ldb.delete("CN=Users," + self.base_dn)
238 except LdbError, (num, _):
239 self.assertEquals(num, ERR_UNWILLING_TO_PERFORM)
241 # Tree-delete failing since "isCriticalSystemObject"
243 ldb.delete("CN=Computers," + self.base_dn, ["tree_delete:1"])
245 except LdbError, (num, _):
246 self.assertEquals(num, ERR_UNWILLING_TO_PERFORM)
249 """Basic delete tests"""
253 usr1="cn=testuser,cn=users," + self.base_dn
254 usr2="cn=testuser2,cn=users," + self.base_dn
255 grp1="cn=testdelgroup1,cn=users," + self.base_dn
256 sit1="cn=testsite1,cn=sites," + self.configuration_dn
257 ss1="cn=NTDS Site Settings,cn=testsite1,cn=sites," + self.configuration_dn
258 srv1="cn=Servers,cn=testsite1,cn=sites," + self.configuration_dn
259 srv2="cn=TESTSRV,cn=Servers,cn=testsite1,cn=sites," + self.configuration_dn
261 self.delete_force(self.ldb, usr1)
262 self.delete_force(self.ldb, usr2)
263 self.delete_force(self.ldb, grp1)
264 self.delete_force(self.ldb, ss1)
265 self.delete_force(self.ldb, srv2)
266 self.delete_force(self.ldb, srv1)
267 self.delete_force(self.ldb, sit1)
271 "objectclass": "user",
272 "description": "test user description",
273 "samaccountname": "testuser"})
277 "objectclass": "user",
278 "description": "test user 2 description",
279 "samaccountname": "testuser2"})
283 "objectclass": "group",
284 "description": "test group",
285 "samaccountname": "testdelgroup1",
286 "member": [ usr1, usr2 ],
287 "isDeleted": "FALSE" })
291 "objectclass": "site" })
295 "objectclass": ["applicationSiteSettings", "nTDSSiteSettings"] })
299 "objectclass": "serversContainer" })
303 "objectClass": "server" })
305 objLive1 = self.search_dn(usr1)
306 guid1=objLive1["objectGUID"][0]
308 objLive2 = self.search_dn(usr2)
309 guid2=objLive2["objectGUID"][0]
311 objLive3 = self.search_dn(grp1)
312 guid3=objLive3["objectGUID"][0]
314 objLive4 = self.search_dn(sit1)
315 guid4=objLive4["objectGUID"][0]
317 objLive5 = self.search_dn(ss1)
318 guid5=objLive5["objectGUID"][0]
320 objLive6 = self.search_dn(srv1)
321 guid6=objLive6["objectGUID"][0]
323 objLive7 = self.search_dn(srv2)
324 guid7=objLive7["objectGUID"][0]
329 ldb.delete(srv1, ["tree_delete:1"])
330 ldb.delete(sit1, ["tree_delete:1"])
332 objDeleted1 = self.search_guid(guid1)
333 objDeleted2 = self.search_guid(guid2)
334 objDeleted3 = self.search_guid(guid3)
335 objDeleted4 = self.search_guid(guid4)
336 objDeleted5 = self.search_guid(guid5)
337 objDeleted6 = self.search_guid(guid6)
338 objDeleted7 = self.search_guid(guid7)
340 self.del_attr_values(objDeleted1)
341 self.del_attr_values(objDeleted2)
342 self.del_attr_values(objDeleted3)
343 self.del_attr_values(objDeleted4)
344 self.del_attr_values(objDeleted5)
345 self.del_attr_values(objDeleted6)
346 self.del_attr_values(objDeleted7)
348 self.preserved_attributes_list(objLive1, objDeleted1)
349 self.preserved_attributes_list(objLive2, objDeleted2)
350 self.preserved_attributes_list(objLive3, objDeleted3)
351 self.preserved_attributes_list(objLive4, objDeleted4)
352 self.preserved_attributes_list(objLive5, objDeleted5)
353 self.preserved_attributes_list(objLive6, objDeleted6)
354 self.preserved_attributes_list(objLive7, objDeleted7)
356 self.check_rdn(objLive1, objDeleted1, "cn")
357 self.check_rdn(objLive2, objDeleted2, "cn")
358 self.check_rdn(objLive3, objDeleted3, "cn")
359 self.check_rdn(objLive4, objDeleted4, "cn")
360 self.check_rdn(objLive5, objDeleted5, "cn")
361 self.check_rdn(objLive6, objDeleted6, "cn")
362 self.check_rdn(objLive7, objDeleted7, "cn")
364 self.delete_deleted(ldb, usr1)
365 self.delete_deleted(ldb, usr2)
366 self.delete_deleted(ldb, grp1)
367 self.delete_deleted(ldb, sit1)
368 self.delete_deleted(ldb, ss1)
369 self.delete_deleted(ldb, srv1)
370 self.delete_deleted(ldb, srv2)
372 self.assertTrue("CN=Deleted Objects" in str(objDeleted1.dn))
373 self.assertTrue("CN=Deleted Objects" in str(objDeleted2.dn))
374 self.assertTrue("CN=Deleted Objects" in str(objDeleted3.dn))
375 self.assertFalse("CN=Deleted Objects" in str(objDeleted4.dn))
376 self.assertTrue("CN=Deleted Objects" in str(objDeleted5.dn))
377 self.assertFalse("CN=Deleted Objects" in str(objDeleted6.dn))
378 self.assertFalse("CN=Deleted Objects" in str(objDeleted7.dn))
380 if not "://" in host:
381 if os.path.isfile(host):
382 host = "tdb://%s" % host
384 host = "ldap://%s" % host
386 ldb = SamDB(host, credentials=creds, session_info=system_session(), lp=lp)
388 runner = SubunitTestRunner()
390 if not runner.run(unittest.makeSuite(BasicDeleteTests)).wasSuccessful():