summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMichal Zidek <mzidek@redhat.com>2012-07-23 14:56:34 +0200
committerJakub Hrozek <jhrozek@redhat.com>2012-08-01 16:36:41 +0200
commit25f8fac2489fd209d603acb2b494f7c72968e9bb (patch)
tree87b6912f49d5176693500c9893e464fe918a52d4
parent294e9a5521d327c5cdc49beeb9cb9e703b3134f1 (diff)
downloadsssd-25f8fac2489fd209d603acb2b494f7c72968e9bb.tar.gz
sssd-25f8fac2489fd209d603acb2b494f7c72968e9bb.tar.bz2
sssd-25f8fac2489fd209d603acb2b494f7c72968e9bb.zip
Added unit test for sysdb_ssh.c
-rw-r--r--Makefile.am14
-rw-r--r--src/tests/sysdb_ssh-tests.c447
2 files changed, 461 insertions, 0 deletions
diff --git a/Makefile.am b/Makefile.am
index 07128642..71d4db71 100644
--- a/Makefile.am
+++ b/Makefile.am
@@ -107,6 +107,7 @@ endif
if HAVE_CHECK
non_interactive_check_based_tests = \
sysdb-tests \
+ sysdb_ssh-tests\
strtonum-tests \
resolv-tests \
krb5-utils-tests \
@@ -780,6 +781,19 @@ sysdb_tests_LDADD = \
libsss_util.la \
libsss_test_common.la
+sysdb_ssh_tests_DEPENDENCIES = \
+ $(ldblib_LTLIBRARIES)
+sysdb_ssh_tests_SOURCES = \
+ src/tests/sysdb_ssh-tests.c
+sysdb_ssh_tests_CFLAGS = \
+ $(AM_CFLAGS)\
+ $(CHECK_CFLAGS)
+sysdb_ssh_tests_LDADD = \
+ $(SSSD_LIBS) \
+ $(CHECK_LIBS) \
+ libsss_util.la \
+ libsss_test_common.la
+
strtonum_tests_SOURCES = \
src/tests/strtonum-tests.c \
src/util/strtonum.c
diff --git a/src/tests/sysdb_ssh-tests.c b/src/tests/sysdb_ssh-tests.c
new file mode 100644
index 00000000..2d5bd8e2
--- /dev/null
+++ b/src/tests/sysdb_ssh-tests.c
@@ -0,0 +1,447 @@
+/*
+ Authors:
+ Michal Zidek <mzidek@redhat.com>
+ Stephen Gallagher <sgallagh@redhat.com>
+
+ This program is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 3 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see <http://www.gnu.org/licenses/>.
+*/
+
+#include <stdlib.h>
+#include <check.h>
+#include <popt.h>
+#include <talloc.h>
+#include <sys/stat.h>
+#include <sys/types.h>
+
+
+#include "config.h"
+#include "tests/common.h"
+#include "util/util.h"
+#include "confdb/confdb.h"
+#include "confdb/confdb_setup.h"
+#include "db/sysdb.h"
+#include "db/sysdb_private.h"
+#include "db/sysdb_services.h"
+#include "db/sysdb_ssh.h"
+
+#define TESTS_PATH "tests_sysdb_ssh"
+#define TEST_CONF_FILE "tests_conf.ldb"
+#define TEST_HOSTNAME "testhost"
+
+struct sysdb_test_ctx {
+ struct sysdb_ctx *sysdb;
+ struct confdb_ctx *confdb;
+ struct tevent_context *ev;
+ struct sss_domain_info *domain;
+};
+
+static int setup_sysdb_tests(struct sysdb_test_ctx **ctx)
+{
+ struct sysdb_test_ctx *test_ctx;
+ char *conf_db;
+ int ret;
+
+ const char *val[2];
+ val[1] = NULL;
+
+ /* Create tests directory if it doesn't exist */
+ /* (relative to current dir) */
+ ret = mkdir(TESTS_PATH, 0775);
+ if (ret == -1 && errno != EEXIST) {
+ fail("Could not create %s directory", TESTS_PATH);
+ return EFAULT;
+ }
+
+ test_ctx = talloc_zero(NULL, struct sysdb_test_ctx);
+ if (test_ctx == NULL) {
+ fail("Could not allocate memory for test context");
+ return ENOMEM;
+ }
+
+ /* Create an event context
+ * It will not be used except in confdb_init and sysdb_init
+ */
+ test_ctx->ev = tevent_context_init(test_ctx);
+ if (test_ctx->ev == NULL) {
+ fail("Could not create event context");
+ talloc_free(test_ctx);
+ return EIO;
+ }
+
+ conf_db = talloc_asprintf(test_ctx, "%s/%s", TESTS_PATH, TEST_CONF_FILE);
+ if (conf_db == NULL) {
+ fail("Out of memory, aborting!");
+ talloc_free(test_ctx);
+ return ENOMEM;
+ }
+ DEBUG(3, ("CONFDB: %s\n", conf_db));
+
+ /* Connect to the conf db */
+ ret = confdb_init(test_ctx, &test_ctx->confdb, conf_db);
+ if (ret != EOK) {
+ fail("Could not initialize connection to the confdb");
+ talloc_free(test_ctx);
+ return ret;
+ }
+
+ val[0] = "LOCAL";
+ ret = confdb_add_param(test_ctx->confdb, true,
+ "config/sssd", "domains", val);
+ if (ret != EOK) {
+ fail("Could not initialize domains placeholder");
+ talloc_free(test_ctx);
+ return ret;
+ }
+
+ val[0] = "local";
+ ret = confdb_add_param(test_ctx->confdb, true,
+ "config/domain/LOCAL", "id_provider", val);
+ if (ret != EOK) {
+ fail("Could not initialize provider");
+ talloc_free(test_ctx);
+ return ret;
+ }
+
+ val[0] = "TRUE";
+ ret = confdb_add_param(test_ctx->confdb, true,
+ "config/domain/LOCAL", "enumerate", val);
+ if (ret != EOK) {
+ fail("Could not initialize LOCAL domain");
+ talloc_free(test_ctx);
+ return ret;
+ }
+
+ val[0] = "TRUE";
+ ret = confdb_add_param(test_ctx->confdb, true,
+ "config/domain/LOCAL", "cache_credentials", val);
+ if (ret != EOK) {
+ fail("Could not initialize LOCAL domain");
+ talloc_free(test_ctx);
+ return ret;
+ }
+
+ ret = sysdb_init_domain_and_sysdb(test_ctx, test_ctx->confdb, "local",
+ TESTS_PATH,
+ &test_ctx->domain, &test_ctx->sysdb);
+ if (ret != EOK) {
+ fail("Could not initialize connection to the sysdb (%d)", ret);
+ talloc_free(test_ctx);
+ return ret;
+ }
+
+ *ctx = test_ctx;
+ return EOK;
+}
+
+static void clean_up(void)
+{
+ int ret = 0;
+
+ ret += unlink(TESTS_PATH"/"TEST_CONF_FILE);
+ ret += unlink(TESTS_PATH"/sssd.ldb");
+ ret += rmdir(TESTS_PATH);
+
+ if (ret != 0) {
+ fprintf(stderr, "Unable to remove all test files from %s\n",TESTS_PATH);
+ }
+}
+
+struct test_data {
+ struct tevent_context *ev;
+ struct sysdb_test_ctx *ctx;
+
+ const char *hostname;
+ const char *alias;
+
+ struct ldb_message **hosts;
+ struct sysdb_attrs *attrs;
+
+ size_t count;
+};
+
+static int test_sysdb_store_ssh_host(struct test_data *data)
+{
+ int ret;
+
+ ret = sysdb_store_ssh_host(data->ctx->sysdb,
+ data->hostname,
+ data->alias,
+ data->attrs);
+ return ret;
+}
+
+static int test_sysdb_delete_ssh_host(struct test_data *data)
+{
+ int ret;
+
+ ret = sysdb_delete_ssh_host(data->ctx->sysdb, data->hostname);
+ return ret;
+}
+
+static int test_sysdb_search_ssh_hosts(struct test_data *data)
+{
+ int ret;
+ const char *attrs[] = { SYSDB_NAME, NULL };
+
+ ret = sysdb_search_ssh_hosts(data->ctx, data->ctx->sysdb,
+ data->hostname, attrs,
+ &data->hosts, &data->count);
+ return ret;
+}
+
+START_TEST (store_one_host_test)
+{
+ struct sysdb_test_ctx *test_ctx;
+ struct test_data *data;
+ int ret;
+
+ ret = setup_sysdb_tests(&test_ctx);
+ if (ret != EOK) {
+ fail("Could not set up the test");
+ return;
+ }
+
+ data = talloc_zero(test_ctx, struct test_data);
+ if (data == NULL) {
+ fail("Out of memory!");
+ talloc_free(test_ctx);
+ return;
+ }
+
+ data->ctx = test_ctx;
+ data->ev = test_ctx->ev;
+ data->hostname = talloc_strdup(test_ctx, TEST_HOSTNAME);
+ if (data->hostname == NULL) {
+ fail("Out of memory!");
+ talloc_free(test_ctx);
+ return;
+ }
+
+ data->attrs = sysdb_new_attrs(test_ctx);
+ if (data->attrs == NULL) {
+ fail("Out of memory!");
+ talloc_free(test_ctx);
+ return;
+ }
+
+ ret = sysdb_attrs_add_string(data->attrs, SYSDB_OBJECTCLASS, "testClass");
+ if (ret != EOK) {
+ fail("Could not add attribute.");
+ return;
+ }
+
+ ret = sysdb_attrs_add_string(data->attrs, SYSDB_NAME, TEST_HOSTNAME);
+ if (ret != EOK) {
+ fail("Could not add attribute.");
+ return;
+ }
+
+ ret = test_sysdb_store_ssh_host(data);
+
+ fail_if(ret != EOK, "Could not store host into database");
+ talloc_free(test_ctx);
+}
+END_TEST
+
+START_TEST (delete_existing_host_test)
+{
+ struct sysdb_test_ctx *test_ctx;
+ struct test_data *data;
+ int ret;
+
+ ret = setup_sysdb_tests(&test_ctx);
+ if (ret != EOK) {
+ fail("Could not set up the test");
+ return;
+ }
+
+ data = talloc_zero(test_ctx, struct test_data);
+ if (data == NULL) {
+ fail("Out of memory!");
+ return;
+ }
+
+ data->ctx = test_ctx;
+ data->ev = test_ctx->ev;
+ data->hostname = talloc_strdup(test_ctx, TEST_HOSTNAME);
+ if (data->hostname == NULL) {
+ fail("Out of memory!");
+ talloc_free(test_ctx);
+ return;
+ }
+
+ ret = test_sysdb_delete_ssh_host(data);
+
+ fail_if(ret != EOK, "Could not delete host from database");
+ talloc_free(test_ctx);
+}
+END_TEST
+
+START_TEST (delete_nonexistent_host_test)
+{
+ struct sysdb_test_ctx *test_ctx;
+ struct test_data *data;
+ int ret;
+
+ ret = setup_sysdb_tests(&test_ctx);
+ if (ret != EOK) {
+ fail("Could not set up the test");
+ return;
+ }
+
+ data = talloc_zero(test_ctx, struct test_data);
+ if (data == NULL) {
+ fail("Out of memory!");
+ talloc_free(test_ctx);
+ return;
+ }
+
+ data->ctx = test_ctx;
+ data->ev = test_ctx->ev;
+ data->hostname = talloc_strdup(test_ctx, "nonexistent_host");
+ if (data->hostname == NULL) {
+ fail("Out of memory!");
+ talloc_free(test_ctx);
+ return;
+ }
+
+ ret = test_sysdb_delete_ssh_host(data);
+
+ fail_if(ret != EOK, "Deletion of nonexistent host returned code %d", ret);
+ talloc_free(test_ctx);
+
+}
+END_TEST
+
+START_TEST (sysdb_search_ssh_host_test)
+{
+ struct sysdb_test_ctx *test_ctx;
+ struct test_data *data;
+ int ret;
+
+ ret = setup_sysdb_tests(&test_ctx);
+ if (ret != EOK) {
+ fail("Could not set up test");
+ return;
+ }
+
+ data = talloc_zero(test_ctx, struct test_data);
+ if (data == NULL) {
+ fail("Out of memory!");
+ talloc_free(test_ctx);
+ return;
+ }
+
+ data->ctx = test_ctx;
+ data->ev = test_ctx->ev;
+ data->hostname = talloc_strdup(test_ctx, TEST_HOSTNAME);
+ if (data->hostname == NULL) {
+ fail("Out of memory!");
+ talloc_free(test_ctx);
+ return;
+ }
+
+ data->attrs = sysdb_new_attrs(test_ctx);
+ if (data->attrs == NULL) {
+ fail("Out of memory!");
+ talloc_free(test_ctx);
+ return;
+ }
+
+ ret = sysdb_attrs_add_string(data->attrs, SYSDB_OBJECTCLASS, "testClass");
+ if (ret != EOK) {
+ fail("Could not add attribute.");
+ talloc_free(test_ctx);
+ return;
+ }
+
+ ret = sysdb_attrs_add_string(data->attrs, SYSDB_NAME, TEST_HOSTNAME);
+ if (ret != EOK) {
+ fail("Could not add attribute.");
+ talloc_free(test_ctx);
+ return;
+ }
+
+ ret = test_sysdb_store_ssh_host(data);
+ if (ret != EOK) {
+ fail("Could not store host '%s' to database", TEST_HOSTNAME);
+ talloc_free(test_ctx);
+ return;
+ }
+
+ ret = test_sysdb_search_ssh_hosts(data);
+
+ fail_if(ret != EOK, "Could not find host '%s'",TEST_HOSTNAME);
+ talloc_free(test_ctx);
+}
+END_TEST
+
+
+Suite *create_sysdb_ssh_suite(void)
+{
+ Suite *s = suite_create("sysdb_ssh");
+ TCase *tc_sysdb_ssh = tcase_create("SYSDB_SSH Tests");
+
+ tcase_add_test(tc_sysdb_ssh, store_one_host_test);
+ tcase_add_test(tc_sysdb_ssh, delete_existing_host_test);
+ tcase_add_test(tc_sysdb_ssh, delete_nonexistent_host_test);
+ tcase_add_test(tc_sysdb_ssh, sysdb_search_ssh_host_test);
+ suite_add_tcase(s, tc_sysdb_ssh);
+ return s;
+}
+
+int main(int argc, const char *argv[])
+{
+ int failcount;
+ int opt;
+ poptContext pc;
+ Suite* s;
+ SRunner *sr;
+
+ struct poptOption long_options[] = {
+ POPT_AUTOHELP
+ SSSD_MAIN_OPTS
+ POPT_TABLEEND
+ };
+
+ /* Set debug level to invalid value so we can deside if -d 0 was used. */
+ debug_level = SSSDBG_INVALID;
+
+ pc = poptGetContext(argv[0], argc, (const char **) argv, long_options, 0);
+ while ((opt = poptGetNextOpt(pc)) != -1) {
+ fprintf(stderr, "\nInvalid option %s: %s\n\n",
+ poptBadOption(pc, 0), poptStrerror(opt));
+ poptPrintUsage(pc, stderr, 0);
+ return 1;
+ }
+ poptFreeContext(pc);
+
+ CONVERT_AND_SET_DEBUG_LEVEL(debug_level);
+
+ tests_set_cwd();
+
+ s = create_sysdb_ssh_suite();
+
+ sr = srunner_create(s);
+ srunner_run_all(sr, CK_ENV);
+ failcount = srunner_ntests_failed(sr);
+ srunner_free(sr);
+
+ clean_up();
+ if (failcount != 0) {
+ return EXIT_FAILURE;
+ }
+
+ return EXIT_SUCCESS;
+}