2021-08-19 12:14:41 -04:00
|
|
|
import contextlib
|
2021-08-18 19:48:17 -04:00
|
|
|
import grp
|
2021-08-04 01:54:21 -04:00
|
|
|
import importlib.resources
|
|
|
|
import os
|
2021-08-18 19:48:17 -04:00
|
|
|
import pwd
|
2021-08-04 01:54:21 -04:00
|
|
|
import shutil
|
2021-08-17 21:59:24 -04:00
|
|
|
import subprocess
|
|
|
|
import tempfile
|
2021-08-18 19:48:17 -04:00
|
|
|
from unittest.mock import patch
|
2021-08-04 01:54:21 -04:00
|
|
|
|
2021-08-17 21:59:24 -04:00
|
|
|
import flask
|
2021-08-15 01:04:49 -04:00
|
|
|
import ldap3
|
2021-08-04 01:54:21 -04:00
|
|
|
import pytest
|
|
|
|
import socket
|
|
|
|
from zope import component
|
|
|
|
|
|
|
|
from ceo_common.interfaces import IConfig, IKerberosService, ILDAPService, \
|
2021-08-13 20:11:56 -04:00
|
|
|
IFileService, IMailmanService, IHTTPClient, IUWLDAPService, IMailService
|
2021-08-04 01:54:21 -04:00
|
|
|
from ceo_common.model import Config, RemoteMailmanService, HTTPClient
|
2021-08-13 20:11:56 -04:00
|
|
|
from ceod.api import create_app
|
2021-08-04 01:54:21 -04:00
|
|
|
from ceod.model import KerberosService, LDAPService, FileService, User, \
|
2021-08-13 20:11:56 -04:00
|
|
|
MailmanService, Group, UWLDAPService, UWLDAPRecord, MailService
|
2021-08-04 16:59:36 -04:00
|
|
|
from ceod.model.utils import strings_to_bytes
|
2021-08-18 19:48:17 -04:00
|
|
|
import ceod.utils as utils
|
2021-08-13 20:11:56 -04:00
|
|
|
from .MockSMTPServer import MockSMTPServer
|
|
|
|
from .MockMailmanServer import MockMailmanServer
|
2021-08-18 19:48:17 -04:00
|
|
|
from .conftest_ceod_api import client
|
2021-08-04 01:54:21 -04:00
|
|
|
|
|
|
|
|
2021-08-13 20:11:56 -04:00
|
|
|
@pytest.fixture(scope='session')
|
2021-08-04 01:54:21 -04:00
|
|
|
def cfg():
|
2021-08-13 20:11:56 -04:00
|
|
|
with importlib.resources.path('tests', 'ceod_test_local.ini') as p:
|
2021-08-04 01:54:21 -04:00
|
|
|
config_file = p.__fspath__()
|
|
|
|
_cfg = Config(config_file)
|
|
|
|
component.provideUtility(_cfg, IConfig)
|
|
|
|
return _cfg
|
|
|
|
|
|
|
|
|
2021-08-13 20:11:56 -04:00
|
|
|
@pytest.fixture(scope='session')
|
2021-08-04 01:54:21 -04:00
|
|
|
def krb_srv(cfg):
|
2021-08-17 21:59:24 -04:00
|
|
|
# TODO: create temporary Kerberos database using kdb5_util.
|
|
|
|
# We need to be root to read the keytab
|
2021-08-04 01:54:21 -04:00
|
|
|
assert os.geteuid() == 0
|
|
|
|
# this dance again... ugh
|
|
|
|
if socket.gethostname() == cfg.get('ceod_admin_host'):
|
|
|
|
principal = 'ceod/admin'
|
|
|
|
else:
|
|
|
|
principal = 'ceod/' + socket.getfqdn()
|
2021-08-17 21:59:24 -04:00
|
|
|
cache_dir = cfg.get('ceod_krb5_cache_dir')
|
|
|
|
krb = KerberosService(principal)
|
2021-08-04 01:54:21 -04:00
|
|
|
component.provideUtility(krb, IKerberosService)
|
|
|
|
yield krb
|
2021-08-13 20:11:56 -04:00
|
|
|
shutil.rmtree(cache_dir)
|
2021-08-04 01:54:21 -04:00
|
|
|
|
|
|
|
|
2021-08-15 01:04:49 -04:00
|
|
|
def delete_subtree(conn: ldap3.Connection, base_dn: str):
|
2021-08-04 01:54:21 -04:00
|
|
|
try:
|
2021-08-15 01:04:49 -04:00
|
|
|
conn.search(base_dn, '(objectClass=*)', search_scope=ldap3.LEVEL)
|
|
|
|
for entry in conn.entries:
|
|
|
|
conn.delete(entry.entry_dn)
|
|
|
|
conn.delete(base_dn)
|
|
|
|
except ldap3.core.exceptions.LDAPNoSuchObjectResult:
|
2021-08-04 01:54:21 -04:00
|
|
|
pass
|
|
|
|
|
|
|
|
|
2021-08-17 21:59:24 -04:00
|
|
|
@pytest.fixture(scope='session')
|
|
|
|
def ceod_admin_creds(cfg, krb_srv):
|
|
|
|
"""
|
|
|
|
Acquire credentials for ceod/admin and store them
|
|
|
|
in the default ccache.
|
|
|
|
"""
|
|
|
|
subprocess.run(
|
|
|
|
['kinit', '-k', cfg.get('ldap_admin_principal')],
|
|
|
|
check=True,
|
|
|
|
)
|
|
|
|
|
|
|
|
|
2021-08-19 12:14:41 -04:00
|
|
|
@pytest.fixture
|
|
|
|
def g_admin_ctx(cfg, ceod_admin_creds, app):
|
|
|
|
"""
|
|
|
|
Store the principal for ceod/admin in flask.g.
|
|
|
|
This context manager should be used any time LDAP is modified via the
|
|
|
|
LDAPService, and we are not in a request context.
|
|
|
|
This should NOT be active when CeodTestClient is making a request, since
|
|
|
|
that will override the values in flask.g.
|
|
|
|
"""
|
|
|
|
@contextlib.contextmanager
|
|
|
|
def wrapper():
|
|
|
|
admin_principal = cfg.get('ldap_admin_principal')
|
|
|
|
with app.app_context():
|
|
|
|
try:
|
|
|
|
flask.g.sasl_user = admin_principal
|
|
|
|
yield
|
|
|
|
finally:
|
|
|
|
flask.g.pop('sasl_user')
|
|
|
|
return wrapper
|
|
|
|
|
|
|
|
|
2021-08-17 21:59:24 -04:00
|
|
|
@pytest.fixture(scope='session')
|
|
|
|
def ldap_conn(cfg, ceod_admin_creds) -> ldap3.Connection:
|
|
|
|
# Assume that the same server URL is being used for the CSC
|
|
|
|
# and UWLDAP during the tests.
|
|
|
|
cfg = component.getUtility(IConfig)
|
|
|
|
server_url = cfg.get('ldap_server_url')
|
|
|
|
# sanity check
|
|
|
|
assert server_url == cfg.get('uwldap_server_url')
|
2021-08-15 01:04:49 -04:00
|
|
|
return ldap3.Connection(
|
|
|
|
server_url, auto_bind=True, raise_exceptions=True,
|
2021-08-17 21:59:24 -04:00
|
|
|
authentication=ldap3.SASL, sasl_mechanism=ldap3.KERBEROS,
|
|
|
|
user=cfg.get('ldap_admin_principal'))
|
2021-08-15 01:04:49 -04:00
|
|
|
|
|
|
|
|
2021-08-13 20:11:56 -04:00
|
|
|
@pytest.fixture(scope='session')
|
2021-08-19 12:14:41 -04:00
|
|
|
def ldap_srv_session(cfg, krb_srv, ldap_conn):
|
2021-08-17 21:59:24 -04:00
|
|
|
conn = ldap_conn
|
2021-08-04 01:54:21 -04:00
|
|
|
users_base = cfg.get('ldap_users_base')
|
|
|
|
groups_base = cfg.get('ldap_groups_base')
|
2021-08-18 19:48:17 -04:00
|
|
|
sudo_base = cfg.get('ldap_sudo_base')
|
2021-08-04 01:54:21 -04:00
|
|
|
|
2021-08-18 19:48:17 -04:00
|
|
|
for base_dn in [users_base, groups_base, sudo_base]:
|
|
|
|
delete_subtree(conn, base_dn)
|
2021-08-04 01:54:21 -04:00
|
|
|
ou = base_dn.split(',', 1)[0].split('=')[1]
|
2021-08-15 01:04:49 -04:00
|
|
|
conn.add(base_dn, 'organizationalUnit')
|
2021-08-18 19:48:17 -04:00
|
|
|
|
2021-08-04 01:54:21 -04:00
|
|
|
_ldap_srv = LDAPService()
|
|
|
|
component.provideUtility(_ldap_srv, ILDAPService)
|
2021-08-19 12:14:41 -04:00
|
|
|
|
2021-08-04 01:54:21 -04:00
|
|
|
yield _ldap_srv
|
|
|
|
|
2021-08-18 19:48:17 -04:00
|
|
|
for base_dn in [users_base, groups_base, sudo_base]:
|
|
|
|
delete_subtree(conn, base_dn)
|
2021-08-04 01:54:21 -04:00
|
|
|
|
|
|
|
|
2021-08-19 12:14:41 -04:00
|
|
|
@pytest.fixture
|
|
|
|
def ldap_srv(ldap_srv_session, g_admin_ctx):
|
|
|
|
# This is an ugly hack to get around the fact that function-scoped
|
|
|
|
# fixtures (g_admin_ctx) can't be used from session-scoped fixtures
|
|
|
|
# (ldap_srv_session).
|
|
|
|
with g_admin_ctx():
|
|
|
|
yield ldap_srv_session
|
|
|
|
|
|
|
|
|
2021-08-13 20:11:56 -04:00
|
|
|
@pytest.fixture(scope='session')
|
2021-08-04 01:54:21 -04:00
|
|
|
def file_srv(cfg):
|
|
|
|
_file_srv = FileService()
|
|
|
|
component.provideUtility(_file_srv, IFileService)
|
|
|
|
members_home = cfg.get('members_home')
|
|
|
|
clubs_home = cfg.get('clubs_home')
|
|
|
|
|
|
|
|
shutil.rmtree(members_home, ignore_errors=True)
|
|
|
|
shutil.rmtree(clubs_home, ignore_errors=True)
|
|
|
|
yield _file_srv
|
|
|
|
shutil.rmtree(members_home, ignore_errors=True)
|
|
|
|
shutil.rmtree(clubs_home, ignore_errors=True)
|
|
|
|
|
|
|
|
|
2021-08-13 20:11:56 -04:00
|
|
|
@pytest.fixture(scope='session')
|
|
|
|
def http_client(cfg):
|
|
|
|
client = HTTPClient()
|
|
|
|
component.provideUtility(client, IHTTPClient)
|
|
|
|
return
|
|
|
|
|
|
|
|
|
|
|
|
@pytest.fixture(scope='session')
|
|
|
|
def mock_mailman_server():
|
|
|
|
server = MockMailmanServer()
|
|
|
|
server.start()
|
|
|
|
yield server
|
|
|
|
server.stop()
|
|
|
|
|
|
|
|
|
|
|
|
@pytest.fixture(scope='session')
|
|
|
|
def mailman_srv(mock_mailman_server, cfg, http_client):
|
|
|
|
# TODO: test the RemoteMailmanService as well
|
|
|
|
mailman = MailmanService()
|
|
|
|
component.provideUtility(mailman, IMailmanService)
|
|
|
|
return mailman
|
|
|
|
|
|
|
|
|
|
|
|
@pytest.fixture(scope='session')
|
2021-08-17 21:59:24 -04:00
|
|
|
def uwldap_srv(cfg, ldap_conn):
|
|
|
|
conn = ldap_conn
|
2021-08-13 20:11:56 -04:00
|
|
|
base_dn = cfg.get('uwldap_base')
|
|
|
|
|
2021-08-15 01:04:49 -04:00
|
|
|
delete_subtree(conn, base_dn)
|
2021-08-13 20:11:56 -04:00
|
|
|
|
2021-08-15 01:04:49 -04:00
|
|
|
conn.add(base_dn, 'organizationalUnit')
|
2021-08-13 20:11:56 -04:00
|
|
|
_uwldap_srv = UWLDAPService()
|
|
|
|
component.provideUtility(_uwldap_srv, IUWLDAPService)
|
|
|
|
yield _uwldap_srv
|
|
|
|
|
2021-08-15 01:04:49 -04:00
|
|
|
delete_subtree(conn, base_dn)
|
2021-08-13 20:11:56 -04:00
|
|
|
|
|
|
|
|
|
|
|
@pytest.fixture(scope='session')
|
|
|
|
def mock_mail_server():
|
|
|
|
mock_server = MockSMTPServer()
|
|
|
|
mock_server.start()
|
|
|
|
yield mock_server
|
|
|
|
mock_server.stop()
|
|
|
|
|
|
|
|
|
|
|
|
@pytest.fixture(scope='session')
|
|
|
|
def mail_srv(cfg, mock_mail_server):
|
|
|
|
_mail_srv = MailService()
|
|
|
|
component.provideUtility(_mail_srv, IMailService)
|
|
|
|
return _mail_srv
|
|
|
|
|
|
|
|
|
|
|
|
@pytest.fixture(autouse=True, scope='session')
|
|
|
|
def app(
|
|
|
|
cfg,
|
|
|
|
krb_srv,
|
2021-08-19 12:14:41 -04:00
|
|
|
ldap_srv_session,
|
2021-08-13 20:11:56 -04:00
|
|
|
file_srv,
|
|
|
|
mailman_srv,
|
|
|
|
uwldap_srv,
|
|
|
|
mail_srv,
|
|
|
|
):
|
2021-08-19 12:14:41 -04:00
|
|
|
app = create_app({'TESTING': True})
|
2021-08-13 20:11:56 -04:00
|
|
|
return app
|
|
|
|
|
|
|
|
|
2021-08-18 19:48:17 -04:00
|
|
|
@pytest.fixture(scope='session')
|
|
|
|
def mocks_for_create_user():
|
|
|
|
with patch.object(utils, 'gen_password') as gen_password_mock, \
|
|
|
|
patch.object(pwd, 'getpwuid') as getpwuid_mock, \
|
|
|
|
patch.object(grp, 'getgrgid') as getgrgid_mock:
|
|
|
|
gen_password_mock.return_value = 'krb5'
|
|
|
|
# Normally, if getpwuid or getgrgid do *not* raise a KeyError,
|
|
|
|
# then LDAPService will skip that UID. Therefore, by raising a
|
|
|
|
# KeyError, we are making sure that the UID will *not* be skipped.
|
|
|
|
getpwuid_mock.side_effect = KeyError()
|
|
|
|
getgrgid_mock.side_effect = KeyError()
|
|
|
|
yield
|
|
|
|
|
|
|
|
|
2021-08-04 01:54:21 -04:00
|
|
|
@pytest.fixture
|
|
|
|
def simple_user():
|
|
|
|
return User(
|
|
|
|
uid='test_jdoe',
|
|
|
|
cn='John Doe',
|
|
|
|
program='Math',
|
|
|
|
terms=['s2021'],
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
@pytest.fixture
|
|
|
|
def simple_club():
|
|
|
|
return User(
|
|
|
|
uid='test_club1',
|
|
|
|
cn='Club One',
|
|
|
|
is_club=True,
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
@pytest.fixture
|
2021-08-19 12:14:41 -04:00
|
|
|
def ldap_user(simple_user, g_admin_ctx):
|
|
|
|
with g_admin_ctx():
|
|
|
|
simple_user.add_to_ldap()
|
2021-08-04 01:54:21 -04:00
|
|
|
yield simple_user
|
2021-08-19 12:14:41 -04:00
|
|
|
with g_admin_ctx():
|
|
|
|
simple_user.remove_from_ldap()
|
2021-08-04 01:54:21 -04:00
|
|
|
|
|
|
|
|
|
|
|
@pytest.fixture
|
|
|
|
def krb_user(simple_user):
|
|
|
|
simple_user.add_to_kerberos('krb5')
|
|
|
|
yield simple_user
|
|
|
|
simple_user.remove_from_kerberos()
|
|
|
|
|
|
|
|
|
2021-08-04 02:33:50 -04:00
|
|
|
@pytest.fixture
|
|
|
|
def simple_group():
|
|
|
|
return Group(
|
|
|
|
cn='group1',
|
|
|
|
gid_number=21000,
|
2021-08-18 20:05:44 -04:00
|
|
|
user_cn='Group One',
|
2021-08-04 02:33:50 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
@pytest.fixture
|
2021-08-19 12:14:41 -04:00
|
|
|
def ldap_group(simple_group, g_admin_ctx):
|
|
|
|
with g_admin_ctx():
|
|
|
|
simple_group.add_to_ldap()
|
2021-08-04 02:33:50 -04:00
|
|
|
yield simple_group
|
2021-08-19 12:14:41 -04:00
|
|
|
with g_admin_ctx():
|
|
|
|
simple_group.remove_from_ldap()
|
2021-08-04 16:59:36 -04:00
|
|
|
|
|
|
|
|
|
|
|
@pytest.fixture
|
2021-08-17 21:59:24 -04:00
|
|
|
def uwldap_user(cfg, uwldap_srv, ldap_conn):
|
|
|
|
conn = ldap_conn
|
2021-08-04 16:59:36 -04:00
|
|
|
base_dn = cfg.get('uwldap_base')
|
|
|
|
user = UWLDAPRecord(
|
|
|
|
uid='test_jdoe',
|
|
|
|
mail_local_addresses=['test_jdoe@uwaterloo.internal'],
|
|
|
|
program='Math',
|
|
|
|
cn='John Doe',
|
|
|
|
sn='Doe',
|
|
|
|
given_name='John',
|
|
|
|
)
|
|
|
|
dn = f'uid={user.uid},{base_dn}'
|
2021-08-15 01:04:49 -04:00
|
|
|
conn.add(
|
|
|
|
dn,
|
|
|
|
[
|
2021-08-04 16:59:36 -04:00
|
|
|
'inetLocalMailRecipient',
|
|
|
|
'inetOrgPerson',
|
|
|
|
'organizationalPerson',
|
|
|
|
'person',
|
|
|
|
],
|
2021-08-15 01:04:49 -04:00
|
|
|
{
|
|
|
|
'mailLocalAddress': user.mail_local_addresses,
|
|
|
|
'ou': user.program,
|
|
|
|
'cn': user.cn,
|
|
|
|
'sn': user.sn,
|
|
|
|
'givenName': user.given_name,
|
|
|
|
},
|
|
|
|
)
|
2021-08-04 16:59:36 -04:00
|
|
|
yield user
|
2021-08-15 01:04:49 -04:00
|
|
|
conn.delete(dn)
|