s4:selftest: add a new testsuite for the "samba-tool group" command
authorMichael Adam <obnox@samba.org>
Sun, 18 Mar 2012 21:19:46 +0000 (22:19 +0100)
committerMichael Adam <obnox@samba.org>
Sun, 18 Mar 2012 22:41:40 +0000 (23:41 +0100)
source4/scripting/python/samba/tests/samba_tool/group.py [new file with mode: 0644]
source4/selftest/tests.py

diff --git a/source4/scripting/python/samba/tests/samba_tool/group.py b/source4/scripting/python/samba/tests/samba_tool/group.py
new file mode 100644 (file)
index 0000000..7831674
--- /dev/null
@@ -0,0 +1,128 @@
+# Unix SMB/CIFS implementation.
+# Copyright (C) Michael Adam 2012
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; either version 3 of the License, or
+# (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program.  If not, see <http://www.gnu.org/licenses/>.
+#
+
+import os
+import time
+import ldb
+from samba.tests.samba_tool.base import SambaToolCmdTest
+from samba import (
+        nttime2unix,
+        dsdb
+        )
+
+class GroupCmdTestCase(SambaToolCmdTest):
+    """Tests for samba-tool group subcommands"""
+    groups = []
+    samdb = None
+
+    def setUp(self):
+        super(GroupCmdTestCase, self).setUp()
+        self.samdb = self.getSamDB("-H", "ldap://%s" % os.environ["DC_SERVER"],
+            "-U%s%%%s" % (os.environ["DC_USERNAME"], os.environ["DC_PASSWORD"]))
+        self.groups = []
+        self.groups.append(self._randomGroup({"name": "testgroup1"}))
+        self.groups.append(self._randomGroup({"name": "testgroup2"}))
+        self.groups.append(self._randomGroup({"name": "testgroup3"}))
+        self.groups.append(self._randomGroup({"name": "testgroup4"}))
+
+        # setup the 4 groups and ensure they are correct
+        for group in self.groups:
+            (result, out, err) = self._create_group(group)
+
+            self.assertCmdSuccess(result)
+            self.assertEquals(err, "", "There shouldn't be any error message")
+            self.assertIn("Added group %s" % group["name"], out)
+
+            found = self._find_group(group["name"])
+
+            self.assertIsNotNone(found)
+
+            self.assertEquals("%s" % found.get("name"), group["name"])
+            self.assertEquals("%s" % found.get("description"), group["description"])
+
+    def tearDown(self):
+        super(GroupCmdTestCase, self).tearDown()
+        # clean up all the left over groups, just in case
+        for group in self.groups:
+            if self._find_group(group["name"]):
+                self.runsubcmd("group", "delete", group["name"])
+
+
+    def test_newgroup(self):
+        """This tests the "group add" and "group delete" commands"""
+        # try to add all the groups again, this should fail
+        for group in self.groups:
+            (result, out, err) = self._create_group(group)
+            self.assertCmdFail(result, "Succeeded to create existing group")
+            self.assertIn("LDAP error 68 LDAP_ENTRY_ALREADY_EXISTS", err)
+
+        # try to delete all the groups we just added
+        for group in self.groups:
+            (result, out, err) = self.runsubcmd("group", "delete", group["name"])
+            self.assertCmdSuccess(result,
+                                  "Failed to delete group '%s'" % group["name"])
+            found = self._find_group(group["name"])
+            self.assertIsNone(found,
+                              "Deleted group '%s' still exists" % group["name"])
+
+        # test adding groups
+        for group in self.groups:
+            (result, out, err) =  self.runsubcmd("group", "add", group["name"],
+                                                 "--description=%s" % group["description"],
+                                                 "-H", "ldap://%s" % os.environ["DC_SERVER"],
+                                                 "-U%s%%%s" % (os.environ["DC_USERNAME"],
+                                                 os.environ["DC_PASSWORD"]))
+
+            self.assertCmdSuccess(result)
+            self.assertEquals(err,"","There shouldn't be any error message")
+            self.assertIn("Added group %s" % group["name"], out)
+
+            found = self._find_group(group["name"])
+
+            self.assertEquals("%s" % found.get("samaccountname"),
+                              "%s" % group["name"])
+
+
+    def _randomGroup(self, base={}):
+        """create a group with random attribute values, you can specify base attributes"""
+        group = {
+            "name": self.randomName(),
+            "description": self.randomName(count=100),
+            }
+        group.update(base)
+        return group
+
+    def _create_group(self, group):
+        return self.runsubcmd("group", "add", group["name"],
+                              "--description=%s" % group["description"],
+                              "-H", "ldap://%s" % os.environ["DC_SERVER"],
+                              "-U%s%%%s" % (os.environ["DC_USERNAME"],
+                                            os.environ["DC_PASSWORD"]))
+
+    def _find_group(self, name):
+        search_filter = ("(&(sAMAccountName=%s)(objectCategory=%s,%s))" %
+                         (ldb.binary_encode(name),
+                         "CN=Group,CN=Schema,CN=Configuration",
+                         self.samdb.domain_dn()))
+        grouplist = self.samdb.search(base=self.samdb.domain_dn(),
+                                      scope=ldb.SCOPE_SUBTREE,
+                                      expression=search_filter,
+                                      attrs=[])
+        if grouplist:
+            return grouplist[0]
+        else:
+            return None
index 8b44cdcbe630a8859adea08dfd4b5b6c7ca13b19..63d1b80ef212905b7364ea96214c2f9003df3c9d 100755 (executable)
@@ -433,6 +433,7 @@ planpythontestsuite("none", "samba.tests.samba3sam")
 
 planpythontestsuite("dc:local", "samba.tests.samba_tool.timecmd")
 planpythontestsuite("dc:local", "samba.tests.samba_tool.user")
+planpythontestsuite("dc:local", "samba.tests.samba_tool.group")
 
 planpythontestsuite("none", "subunit")
 planpythontestsuite("dc:local", "samba.tests.dcerpc.rpcecho")