2 # -*- coding: utf-8 -*-
4 # Unix SMB/CIFS implementation.
5 # Copyright (C) Kamen Mazdrashki <kamenim@samba.org> 2010
7 # This program is free software; you can redistribute it and/or modify
8 # it under the terms of the GNU General Public License as published by
9 # the Free Software Foundation; either version 3 of the License, or
10 # (at your option) any later version.
12 # This program is distributed in the hope that it will be useful,
13 # but WITHOUT ANY WARRANTY; without even the implied warranty of
14 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 # GNU General Public License for more details.
17 # You should have received a copy of the GNU General Public License
18 # along with this program. If not, see <http://www.gnu.org/licenses/>.
23 # export DC1=dc1_dns_name
24 # export DC2=dc2_dns_name
25 # export SUBUNITRUN=$samba4srcdir/scripting/bin/subunitrun
26 # PYTHONPATH="$PYTHONPATH:$samba4srcdir/torture/drs/python" $SUBUNITRUN delete_object -U"$DOMAIN/$DC_USERNAME"%"$DC_PASSWORD"
29 from __future__ import print_function
41 class DrsDeleteObjectTestCase(drs_base.DrsBaseTestCase):
44 super(DrsDeleteObjectTestCase, self).setUp()
45 # disable automatic replication temporary
46 self._disable_all_repl(self.dnsname_dc1)
47 self._disable_all_repl(self.dnsname_dc2)
48 # make sure DCs are synchronized before the test
49 self._net_drs_replicate(DC=self.dnsname_dc2, fromDC=self.dnsname_dc1, forced=True)
50 self._net_drs_replicate(DC=self.dnsname_dc1, fromDC=self.dnsname_dc2, forced=True)
53 self._enable_all_repl(self.dnsname_dc1)
54 self._enable_all_repl(self.dnsname_dc2)
55 super(DrsDeleteObjectTestCase, self).tearDown()
57 def _make_username(self):
58 return "DrsDelObjUser_" + time.strftime("%s", time.gmtime())
60 # now also used to check the group
61 def _check_obj(self, sam_ldb, obj_orig, is_deleted):
62 # search the user by guid as it may be deleted
63 guid_str = self._GUID_string(obj_orig["objectGUID"][0])
64 expression = "(objectGUID=%s)" % guid_str
65 res = sam_ldb.search(base=self.domain_dn,
66 expression=expression,
67 controls=["show_deleted:1"])
68 self.assertEquals(len(res), 1)
70 # Deleted Object base DN
71 dodn = self._deleted_objects_dn(sam_ldb)
72 # now check properties of the user
73 cn_orig = str(obj_orig["cn"][0])
74 cn_cur = str(user_cur["cn"][0])
75 name_orig = str(obj_orig["name"][0])
76 name_cur = str(user_cur["name"][0])
78 self.assertEquals(str(user_cur["isDeleted"][0]), "TRUE")
79 self.assertFalse("objectCategory" in user_cur)
80 self.assertFalse("sAMAccountType" in user_cur)
81 self.assertFalse("description" in user_cur)
82 self.assertFalse("memberOf" in user_cur)
83 self.assertFalse("member" in user_cur)
84 self.assertTrue(dodn in str(user_cur["dn"]),
85 "User %s is deleted but it is not located under %s (found at %s)!" % (name_orig, dodn, user_cur["dn"]))
86 self.assertEquals(name_cur, name_orig + "\nDEL:" + guid_str)
87 self.assertEquals(name_cur, user_cur.dn.get_rdn_value())
88 self.assertEquals(cn_cur, cn_orig + "\nDEL:" + guid_str)
89 self.assertEquals(name_cur, cn_cur)
91 self.assertFalse("isDeleted" in user_cur)
92 self.assertEquals(name_cur, name_orig)
93 self.assertEquals(name_cur, user_cur.dn.get_rdn_value())
94 self.assertEquals(cn_cur, cn_orig)
95 self.assertEquals(name_cur, cn_cur)
96 self.assertEquals(obj_orig["dn"], user_cur["dn"])
97 self.assertTrue(dodn not in str(user_cur["dn"]))
100 def test_ReplicateDeletedObject1(self):
101 """Verifies how a deleted-object is replicated between two DCs.
102 This test should verify that:
103 - deleted-object is replicated properly
104 - We verify that after replication,
105 object's state to conform to a tombstone-object state
106 - This test replicates the object modifications to
107 the server with the user deleted first
109 TODO: It will also be great if check replPropertyMetaData.
110 TODO: Check for deleted-object state, depending on DC's features
111 when recycle-bin is enabled
113 # work-out unique username to test with
114 username = self._make_username()
117 self.ldb_dc1.newuser(username=username, password="P@sswOrd!")
118 ldb_res = self.ldb_dc1.search(base=self.domain_dn,
120 expression="(samAccountName=%s)" % username)
121 self.assertEquals(len(ldb_res), 1)
122 user_orig = ldb_res[0]
123 user_dn = ldb_res[0]["dn"]
125 # check user info on DC1
126 print("Testing for %s with GUID %s" % (username, self._GUID_string(user_orig["objectGUID"][0])))
127 self._check_obj(sam_ldb=self.ldb_dc1, obj_orig=user_orig, is_deleted=False)
129 # trigger replication from DC1 to DC2
130 self._net_drs_replicate(DC=self.dnsname_dc2, fromDC=self.dnsname_dc1, forced=True)
133 self.ldb_dc1.delete(user_dn)
134 # check user info on DC1 - should be deleted
135 self._check_obj(sam_ldb=self.ldb_dc1, obj_orig=user_orig, is_deleted=True)
136 # check user info on DC2 - should be valid user
137 user_cur = self._check_obj(sam_ldb=self.ldb_dc2, obj_orig=user_orig, is_deleted=False)
139 # The user should not have a description or memberOf yet
140 self.assertFalse("description" in user_cur)
141 self.assertFalse("memberOf" in user_cur)
143 self.ldb_dc2.newgroup("group_%s" % username)
145 self.ldb_dc2.newgroup("group2_%s" % username)
147 ldb_res = self.ldb_dc2.search(base=self.domain_dn,
149 expression="(samAccountName=group_%s)" % username)
150 self.assertTrue(len(ldb_res) == 1)
151 self.assertTrue("sAMAccountName" in ldb_res[0])
152 group_orig = ldb_res[0]
153 group_dn = ldb_res[0]["dn"]
155 # modify user on DC2 to have a description and be a member of the group
158 m["description"] = ldb.MessageElement("a description",
159 ldb.FLAG_MOD_ADD, "description")
160 self.ldb_dc2.modify(m)
163 m["member"] = ldb.MessageElement(str(user_dn),
164 ldb.FLAG_MOD_ADD, "member")
165 self.ldb_dc2.modify(m)
167 ldb_res = self.ldb_dc2.search(base=self.domain_dn,
169 expression="(samAccountName=group2_%s)" % username)
170 self.assertTrue(len(ldb_res) == 1)
171 self.assertTrue("sAMAccountName" in ldb_res[0])
172 group2_dn = ldb_res[0]["dn"]
173 group2_orig = ldb_res[0]
177 m["member"] = ldb.MessageElement(str(group_dn),
178 ldb.FLAG_MOD_ADD, "member")
179 self.ldb_dc2.modify(m)
181 # check user info on DC2 - should be valid user
182 user_cur = self._check_obj(sam_ldb=self.ldb_dc2, obj_orig=user_orig, is_deleted=False)
184 # The user should not have a description yet
185 self.assertTrue("description" in user_cur)
186 self.assertTrue("memberOf" in user_cur)
188 ldb_res = self.ldb_dc2.search(base=self.domain_dn,
190 expression="(samAccountName=group_%s)" % username)
191 self.assertTrue(len(ldb_res) == 1)
193 # This group is a member of another group
194 self.assertTrue("memberOf" in ldb_res[0])
196 # The user was deleted on DC1, but check the modify we just did on DC2
197 self.assertTrue("member" in ldb_res[0])
199 # trigger replication from DC2 to DC1
200 # to check if deleted object gets restored
201 self._net_drs_replicate(DC=self.dnsname_dc1, fromDC=self.dnsname_dc2, forced=True)
202 # check user info on DC1 - should be deleted
203 self._check_obj(sam_ldb=self.ldb_dc1, obj_orig=user_orig, is_deleted=True)
204 # check user info on DC2 - should be valid user
205 self._check_obj(sam_ldb=self.ldb_dc2, obj_orig=user_orig, is_deleted=False)
207 ldb_res = self.ldb_dc1.search(base=self.domain_dn,
209 expression="(samAccountName=group_%s)" % username)
210 self.assertTrue(len(ldb_res) == 1)
212 # This group is a member of another group
213 self.assertTrue("memberOf" in ldb_res[0])
215 # The user was deleted on DC1, but the modify we did on DC2, check it never replicated in
216 self.assertFalse("member" in ldb_res[0])
218 # trigger replication from DC1 to DC2
219 # to check if deleted object is replicated
220 self._net_drs_replicate(DC=self.dnsname_dc2, fromDC=self.dnsname_dc1, forced=True)
221 # check user info on DC1 - should be deleted
222 self._check_obj(sam_ldb=self.ldb_dc1, obj_orig=user_orig, is_deleted=True)
223 # check user info on DC2 - should be deleted
224 self._check_obj(sam_ldb=self.ldb_dc2, obj_orig=user_orig, is_deleted=True)
226 # delete group on DC1
227 self.ldb_dc1.delete(group_dn)
229 # trigger replication from DC1 to DC2
230 # to check if deleted object is replicated
231 self._net_drs_replicate(DC=self.dnsname_dc2, fromDC=self.dnsname_dc1, forced=True)
233 # check group info on DC1 - should be deleted
234 self._check_obj(sam_ldb=self.ldb_dc1, obj_orig=group_orig, is_deleted=True)
235 # check group info on DC2 - should be deleted
236 self._check_obj(sam_ldb=self.ldb_dc2, obj_orig=group_orig, is_deleted=True)
238 ldb_res = self.ldb_dc2.search(base=self.domain_dn,
240 expression="(samAccountName=group2_%s)" % username)
241 self.assertTrue(len(ldb_res) == 1)
242 self.assertFalse("member" in ldb_res[0])
244 # delete group on DC1
245 self.ldb_dc1.delete(group2_dn)
247 # trigger replication from DC1 to DC2
248 # to check if deleted object is replicated
249 self._net_drs_replicate(DC=self.dnsname_dc2, fromDC=self.dnsname_dc1, forced=True)
251 # check group info on DC1 - should be deleted
252 self._check_obj(sam_ldb=self.ldb_dc1, obj_orig=group2_orig, is_deleted=True)
253 # check group info on DC2 - should be deleted
254 self._check_obj(sam_ldb=self.ldb_dc2, obj_orig=group2_orig, is_deleted=True)
256 def test_ReplicateDeletedObject2(self):
257 """Verifies how a deleted-object is replicated between two DCs.
258 This test should verify that:
259 - deleted-object is replicated properly
260 - We verify that after replication,
261 object's state to conform to a tombstone-object state
262 - This test replicates the delete to the server with the
263 object modifications first
265 TODO: It will also be great if check replPropertyMetaData.
266 TODO: Check for deleted-object state, depending on DC's features
267 when recycle-bin is enabled
269 # work-out unique username to test with
270 username = self._make_username()
273 self.ldb_dc1.newuser(username=username, password="P@sswOrd!")
274 ldb_res = self.ldb_dc1.search(base=self.domain_dn,
276 expression="(samAccountName=%s)" % username)
277 self.assertEquals(len(ldb_res), 1)
278 user_orig = ldb_res[0]
279 user_dn = ldb_res[0]["dn"]
281 # check user info on DC1
282 print("Testing for %s with GUID %s" % (username, self._GUID_string(user_orig["objectGUID"][0])))
283 self._check_obj(sam_ldb=self.ldb_dc1, obj_orig=user_orig, is_deleted=False)
285 # trigger replication from DC1 to DC2
286 self._net_drs_replicate(DC=self.dnsname_dc2, fromDC=self.dnsname_dc1, forced=True)
289 self.ldb_dc1.delete(user_dn)
290 # check user info on DC1 - should be deleted
291 self._check_obj(sam_ldb=self.ldb_dc1, obj_orig=user_orig, is_deleted=True)
292 # check user info on DC2 - should be valid user
293 user_cur = self._check_obj(sam_ldb=self.ldb_dc2, obj_orig=user_orig, is_deleted=False)
295 # The user should not have a description or memberOf yet
296 self.assertFalse("description" in user_cur)
297 self.assertFalse("memberOf" in user_cur)
299 self.ldb_dc2.newgroup("group_%s" % username)
301 self.ldb_dc2.newgroup("group2_%s" % username)
303 ldb_res = self.ldb_dc2.search(base=self.domain_dn,
305 expression="(samAccountName=group_%s)" % username)
306 self.assertTrue(len(ldb_res) == 1)
307 self.assertTrue("sAMAccountName" in ldb_res[0])
308 group_orig = ldb_res[0]
309 group_dn = ldb_res[0]["dn"]
311 # modify user on DC2 to have a description and be a member of the group
314 m["description"] = ldb.MessageElement("a description",
315 ldb.FLAG_MOD_ADD, "description")
316 self.ldb_dc2.modify(m)
319 m["member"] = ldb.MessageElement(str(user_dn),
320 ldb.FLAG_MOD_ADD, "member")
321 self.ldb_dc2.modify(m)
323 ldb_res = self.ldb_dc2.search(base=self.domain_dn,
325 expression="(samAccountName=group2_%s)" % username)
326 self.assertTrue(len(ldb_res) == 1)
327 self.assertTrue("sAMAccountName" in ldb_res[0])
328 group2_dn = ldb_res[0]["dn"]
329 group2_orig = ldb_res[0]
333 m["member"] = ldb.MessageElement(str(group_dn),
334 ldb.FLAG_MOD_ADD, "member")
335 self.ldb_dc2.modify(m)
337 # check user info on DC2 - should be valid user
338 user_cur = self._check_obj(sam_ldb=self.ldb_dc2, obj_orig=user_orig, is_deleted=False)
340 # The user should not have a description yet
341 self.assertTrue("description" in user_cur)
342 self.assertTrue("memberOf" in user_cur)
344 # trigger replication from DC1 to DC2
345 # to check if deleted object gets restored
346 self._net_drs_replicate(DC=self.dnsname_dc2, fromDC=self.dnsname_dc1, forced=True)
347 # check user info on DC1 - should be deleted
348 self._check_obj(sam_ldb=self.ldb_dc1, obj_orig=user_orig, is_deleted=True)
349 # check user info on DC2 - should be deleted
350 self._check_obj(sam_ldb=self.ldb_dc2, obj_orig=user_orig, is_deleted=True)
352 ldb_res = self.ldb_dc2.search(base=self.domain_dn,
354 expression="(samAccountName=group_%s)" % username)
355 self.assertTrue(len(ldb_res) == 1)
356 self.assertTrue("memberOf" in ldb_res[0])
357 self.assertFalse("member" in ldb_res[0])
359 # trigger replication from DC2 to DC1
360 # to check if deleted object is replicated
361 self._net_drs_replicate(DC=self.dnsname_dc1, fromDC=self.dnsname_dc2, forced=True)
362 # check user info on DC1 - should be deleted
363 self._check_obj(sam_ldb=self.ldb_dc1, obj_orig=user_orig, is_deleted=True)
364 # check user info on DC2 - should be deleted
365 self._check_obj(sam_ldb=self.ldb_dc2, obj_orig=user_orig, is_deleted=True)
367 ldb_res = self.ldb_dc1.search(base=self.domain_dn,
369 expression="(samAccountName=group_%s)" % username)
370 self.assertTrue(len(ldb_res) == 1)
371 self.assertTrue("memberOf" in ldb_res[0])
372 self.assertFalse("member" in ldb_res[0])
374 # delete group on DC1
375 self.ldb_dc1.delete(group_dn)
376 self.ldb_dc1.delete(group2_dn)
378 # trigger replication from DC1 to DC2, for cleanup
379 self._net_drs_replicate(DC=self.dnsname_dc2, fromDC=self.dnsname_dc1, forced=True)