diff options
author | Michal Zidek <mzidek@redhat.com> | 2012-07-23 14:56:34 +0200 |
---|---|---|
committer | Jakub Hrozek <jhrozek@redhat.com> | 2012-08-01 16:36:41 +0200 |
commit | 25f8fac2489fd209d603acb2b494f7c72968e9bb (patch) | |
tree | 87b6912f49d5176693500c9893e464fe918a52d4 | |
parent | 294e9a5521d327c5cdc49beeb9cb9e703b3134f1 (diff) | |
download | sssd-25f8fac2489fd209d603acb2b494f7c72968e9bb.tar.gz sssd-25f8fac2489fd209d603acb2b494f7c72968e9bb.tar.bz2 sssd-25f8fac2489fd209d603acb2b494f7c72968e9bb.zip |
Added unit test for sysdb_ssh.c
-rw-r--r-- | Makefile.am | 14 | ||||
-rw-r--r-- | src/tests/sysdb_ssh-tests.c | 447 |
2 files changed, 461 insertions, 0 deletions
diff --git a/Makefile.am b/Makefile.am index 07128642..71d4db71 100644 --- a/Makefile.am +++ b/Makefile.am @@ -107,6 +107,7 @@ endif if HAVE_CHECK non_interactive_check_based_tests = \ sysdb-tests \ + sysdb_ssh-tests\ strtonum-tests \ resolv-tests \ krb5-utils-tests \ @@ -780,6 +781,19 @@ sysdb_tests_LDADD = \ libsss_util.la \ libsss_test_common.la +sysdb_ssh_tests_DEPENDENCIES = \ + $(ldblib_LTLIBRARIES) +sysdb_ssh_tests_SOURCES = \ + src/tests/sysdb_ssh-tests.c +sysdb_ssh_tests_CFLAGS = \ + $(AM_CFLAGS)\ + $(CHECK_CFLAGS) +sysdb_ssh_tests_LDADD = \ + $(SSSD_LIBS) \ + $(CHECK_LIBS) \ + libsss_util.la \ + libsss_test_common.la + strtonum_tests_SOURCES = \ src/tests/strtonum-tests.c \ src/util/strtonum.c diff --git a/src/tests/sysdb_ssh-tests.c b/src/tests/sysdb_ssh-tests.c new file mode 100644 index 00000000..2d5bd8e2 --- /dev/null +++ b/src/tests/sysdb_ssh-tests.c @@ -0,0 +1,447 @@ +/* + Authors: + Michal Zidek <mzidek@redhat.com> + Stephen Gallagher <sgallagh@redhat.com> + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program. If not, see <http://www.gnu.org/licenses/>. +*/ + +#include <stdlib.h> +#include <check.h> +#include <popt.h> +#include <talloc.h> +#include <sys/stat.h> +#include <sys/types.h> + + +#include "config.h" +#include "tests/common.h" +#include "util/util.h" +#include "confdb/confdb.h" +#include "confdb/confdb_setup.h" +#include "db/sysdb.h" +#include "db/sysdb_private.h" +#include "db/sysdb_services.h" +#include "db/sysdb_ssh.h" + +#define TESTS_PATH "tests_sysdb_ssh" +#define TEST_CONF_FILE "tests_conf.ldb" +#define TEST_HOSTNAME "testhost" + +struct sysdb_test_ctx { + struct sysdb_ctx *sysdb; + struct confdb_ctx *confdb; + struct tevent_context *ev; + struct sss_domain_info *domain; +}; + +static int setup_sysdb_tests(struct sysdb_test_ctx **ctx) +{ + struct sysdb_test_ctx *test_ctx; + char *conf_db; + int ret; + + const char *val[2]; + val[1] = NULL; + + /* Create tests directory if it doesn't exist */ + /* (relative to current dir) */ + ret = mkdir(TESTS_PATH, 0775); + if (ret == -1 && errno != EEXIST) { + fail("Could not create %s directory", TESTS_PATH); + return EFAULT; + } + + test_ctx = talloc_zero(NULL, struct sysdb_test_ctx); + if (test_ctx == NULL) { + fail("Could not allocate memory for test context"); + return ENOMEM; + } + + /* Create an event context + * It will not be used except in confdb_init and sysdb_init + */ + test_ctx->ev = tevent_context_init(test_ctx); + if (test_ctx->ev == NULL) { + fail("Could not create event context"); + talloc_free(test_ctx); + return EIO; + } + + conf_db = talloc_asprintf(test_ctx, "%s/%s", TESTS_PATH, TEST_CONF_FILE); + if (conf_db == NULL) { + fail("Out of memory, aborting!"); + talloc_free(test_ctx); + return ENOMEM; + } + DEBUG(3, ("CONFDB: %s\n", conf_db)); + + /* Connect to the conf db */ + ret = confdb_init(test_ctx, &test_ctx->confdb, conf_db); + if (ret != EOK) { + fail("Could not initialize connection to the confdb"); + talloc_free(test_ctx); + return ret; + } + + val[0] = "LOCAL"; + ret = confdb_add_param(test_ctx->confdb, true, + "config/sssd", "domains", val); + if (ret != EOK) { + fail("Could not initialize domains placeholder"); + talloc_free(test_ctx); + return ret; + } + + val[0] = "local"; + ret = confdb_add_param(test_ctx->confdb, true, + "config/domain/LOCAL", "id_provider", val); + if (ret != EOK) { + fail("Could not initialize provider"); + talloc_free(test_ctx); + return ret; + } + + val[0] = "TRUE"; + ret = confdb_add_param(test_ctx->confdb, true, + "config/domain/LOCAL", "enumerate", val); + if (ret != EOK) { + fail("Could not initialize LOCAL domain"); + talloc_free(test_ctx); + return ret; + } + + val[0] = "TRUE"; + ret = confdb_add_param(test_ctx->confdb, true, + "config/domain/LOCAL", "cache_credentials", val); + if (ret != EOK) { + fail("Could not initialize LOCAL domain"); + talloc_free(test_ctx); + return ret; + } + + ret = sysdb_init_domain_and_sysdb(test_ctx, test_ctx->confdb, "local", + TESTS_PATH, + &test_ctx->domain, &test_ctx->sysdb); + if (ret != EOK) { + fail("Could not initialize connection to the sysdb (%d)", ret); + talloc_free(test_ctx); + return ret; + } + + *ctx = test_ctx; + return EOK; +} + +static void clean_up(void) +{ + int ret = 0; + + ret += unlink(TESTS_PATH"/"TEST_CONF_FILE); + ret += unlink(TESTS_PATH"/sssd.ldb"); + ret += rmdir(TESTS_PATH); + + if (ret != 0) { + fprintf(stderr, "Unable to remove all test files from %s\n",TESTS_PATH); + } +} + +struct test_data { + struct tevent_context *ev; + struct sysdb_test_ctx *ctx; + + const char *hostname; + const char *alias; + + struct ldb_message **hosts; + struct sysdb_attrs *attrs; + + size_t count; +}; + +static int test_sysdb_store_ssh_host(struct test_data *data) +{ + int ret; + + ret = sysdb_store_ssh_host(data->ctx->sysdb, + data->hostname, + data->alias, + data->attrs); + return ret; +} + +static int test_sysdb_delete_ssh_host(struct test_data *data) +{ + int ret; + + ret = sysdb_delete_ssh_host(data->ctx->sysdb, data->hostname); + return ret; +} + +static int test_sysdb_search_ssh_hosts(struct test_data *data) +{ + int ret; + const char *attrs[] = { SYSDB_NAME, NULL }; + + ret = sysdb_search_ssh_hosts(data->ctx, data->ctx->sysdb, + data->hostname, attrs, + &data->hosts, &data->count); + return ret; +} + +START_TEST (store_one_host_test) +{ + struct sysdb_test_ctx *test_ctx; + struct test_data *data; + int ret; + + ret = setup_sysdb_tests(&test_ctx); + if (ret != EOK) { + fail("Could not set up the test"); + return; + } + + data = talloc_zero(test_ctx, struct test_data); + if (data == NULL) { + fail("Out of memory!"); + talloc_free(test_ctx); + return; + } + + data->ctx = test_ctx; + data->ev = test_ctx->ev; + data->hostname = talloc_strdup(test_ctx, TEST_HOSTNAME); + if (data->hostname == NULL) { + fail("Out of memory!"); + talloc_free(test_ctx); + return; + } + + data->attrs = sysdb_new_attrs(test_ctx); + if (data->attrs == NULL) { + fail("Out of memory!"); + talloc_free(test_ctx); + return; + } + + ret = sysdb_attrs_add_string(data->attrs, SYSDB_OBJECTCLASS, "testClass"); + if (ret != EOK) { + fail("Could not add attribute."); + return; + } + + ret = sysdb_attrs_add_string(data->attrs, SYSDB_NAME, TEST_HOSTNAME); + if (ret != EOK) { + fail("Could not add attribute."); + return; + } + + ret = test_sysdb_store_ssh_host(data); + + fail_if(ret != EOK, "Could not store host into database"); + talloc_free(test_ctx); +} +END_TEST + +START_TEST (delete_existing_host_test) +{ + struct sysdb_test_ctx *test_ctx; + struct test_data *data; + int ret; + + ret = setup_sysdb_tests(&test_ctx); + if (ret != EOK) { + fail("Could not set up the test"); + return; + } + + data = talloc_zero(test_ctx, struct test_data); + if (data == NULL) { + fail("Out of memory!"); + return; + } + + data->ctx = test_ctx; + data->ev = test_ctx->ev; + data->hostname = talloc_strdup(test_ctx, TEST_HOSTNAME); + if (data->hostname == NULL) { + fail("Out of memory!"); + talloc_free(test_ctx); + return; + } + + ret = test_sysdb_delete_ssh_host(data); + + fail_if(ret != EOK, "Could not delete host from database"); + talloc_free(test_ctx); +} +END_TEST + +START_TEST (delete_nonexistent_host_test) +{ + struct sysdb_test_ctx *test_ctx; + struct test_data *data; + int ret; + + ret = setup_sysdb_tests(&test_ctx); + if (ret != EOK) { + fail("Could not set up the test"); + return; + } + + data = talloc_zero(test_ctx, struct test_data); + if (data == NULL) { + fail("Out of memory!"); + talloc_free(test_ctx); + return; + } + + data->ctx = test_ctx; + data->ev = test_ctx->ev; + data->hostname = talloc_strdup(test_ctx, "nonexistent_host"); + if (data->hostname == NULL) { + fail("Out of memory!"); + talloc_free(test_ctx); + return; + } + + ret = test_sysdb_delete_ssh_host(data); + + fail_if(ret != EOK, "Deletion of nonexistent host returned code %d", ret); + talloc_free(test_ctx); + +} +END_TEST + +START_TEST (sysdb_search_ssh_host_test) +{ + struct sysdb_test_ctx *test_ctx; + struct test_data *data; + int ret; + + ret = setup_sysdb_tests(&test_ctx); + if (ret != EOK) { + fail("Could not set up test"); + return; + } + + data = talloc_zero(test_ctx, struct test_data); + if (data == NULL) { + fail("Out of memory!"); + talloc_free(test_ctx); + return; + } + + data->ctx = test_ctx; + data->ev = test_ctx->ev; + data->hostname = talloc_strdup(test_ctx, TEST_HOSTNAME); + if (data->hostname == NULL) { + fail("Out of memory!"); + talloc_free(test_ctx); + return; + } + + data->attrs = sysdb_new_attrs(test_ctx); + if (data->attrs == NULL) { + fail("Out of memory!"); + talloc_free(test_ctx); + return; + } + + ret = sysdb_attrs_add_string(data->attrs, SYSDB_OBJECTCLASS, "testClass"); + if (ret != EOK) { + fail("Could not add attribute."); + talloc_free(test_ctx); + return; + } + + ret = sysdb_attrs_add_string(data->attrs, SYSDB_NAME, TEST_HOSTNAME); + if (ret != EOK) { + fail("Could not add attribute."); + talloc_free(test_ctx); + return; + } + + ret = test_sysdb_store_ssh_host(data); + if (ret != EOK) { + fail("Could not store host '%s' to database", TEST_HOSTNAME); + talloc_free(test_ctx); + return; + } + + ret = test_sysdb_search_ssh_hosts(data); + + fail_if(ret != EOK, "Could not find host '%s'",TEST_HOSTNAME); + talloc_free(test_ctx); +} +END_TEST + + +Suite *create_sysdb_ssh_suite(void) +{ + Suite *s = suite_create("sysdb_ssh"); + TCase *tc_sysdb_ssh = tcase_create("SYSDB_SSH Tests"); + + tcase_add_test(tc_sysdb_ssh, store_one_host_test); + tcase_add_test(tc_sysdb_ssh, delete_existing_host_test); + tcase_add_test(tc_sysdb_ssh, delete_nonexistent_host_test); + tcase_add_test(tc_sysdb_ssh, sysdb_search_ssh_host_test); + suite_add_tcase(s, tc_sysdb_ssh); + return s; +} + +int main(int argc, const char *argv[]) +{ + int failcount; + int opt; + poptContext pc; + Suite* s; + SRunner *sr; + + struct poptOption long_options[] = { + POPT_AUTOHELP + SSSD_MAIN_OPTS + POPT_TABLEEND + }; + + /* Set debug level to invalid value so we can deside if -d 0 was used. */ + debug_level = SSSDBG_INVALID; + + pc = poptGetContext(argv[0], argc, (const char **) argv, long_options, 0); + while ((opt = poptGetNextOpt(pc)) != -1) { + fprintf(stderr, "\nInvalid option %s: %s\n\n", + poptBadOption(pc, 0), poptStrerror(opt)); + poptPrintUsage(pc, stderr, 0); + return 1; + } + poptFreeContext(pc); + + CONVERT_AND_SET_DEBUG_LEVEL(debug_level); + + tests_set_cwd(); + + s = create_sysdb_ssh_suite(); + + sr = srunner_create(s); + srunner_run_all(sr, CK_ENV); + failcount = srunner_ntests_failed(sr); + srunner_free(sr); + + clean_up(); + if (failcount != 0) { + return EXIT_FAILURE; + } + + return EXIT_SUCCESS; +} |