61f723
From d336e3558655d44f8ba797392af882e33d492958 Mon Sep 17 00:00:00 2001
61f723
From: Mark Reynolds <mreynolds@redhat.com>
61f723
Date: Thu, 14 Sep 2017 14:15:25 -0400
61f723
Subject: [PATCH] Ticket 49380 - Add CI test
61f723
61f723
Description:  Add test to verify invalid agreement is rejected, and it
61f723
              does not cause a crash
61f723
61f723
https://pagure.io/389-ds-base/issue/49380
61f723
61f723
Reviewed by: spichugi(Thanks!)
61f723
61f723
(cherry picked from commit 02d76b61489f105f81d72d4f3848e2444463289b)
61f723
---
61f723
 .../tests/suites/replication/acceptance_test.py    | 43 ++++++++++++++++++++++
61f723
 1 file changed, 43 insertions(+)
61f723
61f723
diff --git a/dirsrvtests/tests/suites/replication/acceptance_test.py b/dirsrvtests/tests/suites/replication/acceptance_test.py
61f723
index e6f2ef7..2f8b180 100644
61f723
--- a/dirsrvtests/tests/suites/replication/acceptance_test.py
61f723
+++ b/dirsrvtests/tests/suites/replication/acceptance_test.py
61f723
@@ -3,6 +3,12 @@ from lib389.tasks import *
61f723
 from lib389.utils import *
61f723
 from lib389.topologies import topology_m4 as topo
61f723
 
61f723
+from lib389._constants import (BACKEND_NAME, DEFAULT_SUFFIX, LOG_REPLICA, REPLICA_RUV_FILTER,
61f723
+                               ReplicaRole, REPLICATION_BIND_DN, REPLICATION_BIND_PW,
61f723
+                               REPLICATION_BIND_METHOD, REPLICATION_TRANSPORT, defaultProperties,
61f723
+                               RA_NAME, RA_BINDDN, RA_BINDPW, RA_METHOD, RA_TRANSPORT_PROT,
61f723
+                               DN_DM, PASSWORD, LOG_DEFAULT, RA_ENABLED, RA_SCHEDULE)
61f723
+
61f723
 TEST_ENTRY_NAME = 'mmrepl_test'
61f723
 TEST_ENTRY_DN = 'uid={},{}'.format(TEST_ENTRY_NAME, DEFAULT_SUFFIX)
61f723
 
61f723
@@ -193,6 +199,43 @@ def test_modrdn_entry(topo, test_entry, delold):
61f723
         topo.ms["master1"].delete_s(newrdn_dn)
61f723
 
61f723
 
61f723
+def test_invalid_agmt(topo_m4):
61f723
+    """Test adding that an invalid agreement is properly rejected and does not crash the server
61f723
+
61f723
+    :id: 6c3b2a7e-edcd-4327-a003-6bd878ff722b
61f723
+    :setup: MMR with four masters
61f723
+    :steps:
61f723
+        1. Add invalid agreement (nsds5ReplicaEnabled set to invalid value)
61f723
+        2. Verify the server is still running
61f723
+    :expectedresults:
61f723
+        1. Invalid repl agreement should be rejected
61f723
+        2. Server should be still running
61f723
+    """
61f723
+    m1 = topo_m4.ms["master1"]
61f723
+
61f723
+    # Add invalid agreement (nsds5ReplicaEnabled set to invalid value)
61f723
+    AGMT_DN = 'cn=whatever,cn=replica,cn="dc=example,dc=com",cn=mapping tree,cn=config'
61f723
+    try:
61f723
+        invalid_props = {RA_ENABLED: 'True',  # Invalid value
61f723
+                         RA_SCHEDULE: '0001-2359 0123456'}
61f723
+        m1.agreement.create(suffix=DEFAULT_SUFFIX, host='localhost', port=389, properties=invalid_props)
61f723
+    except ldap.UNWILLING_TO_PERFORM:
61f723
+        m1.log.info('Invalid repl agreement correctly rejected')
61f723
+    except ldap.LDAPError as e:
61f723
+        m1.log.fatal('Got unexpected error adding invalid agreement: ' + str(e))
61f723
+        assert False
61f723
+    else:
61f723
+        m1.log.fatal('Invalid agreement was incorrectly accepted by the server')
61f723
+        assert False
61f723
+
61f723
+    # Verify the server is still running
61f723
+    try:
61f723
+        m1.simple_bind_s(DN_DM, PASSWORD)
61f723
+    except ldap.LDAPError as e:
61f723
+        m1.log.fatal('Failed to bind: ' + str(e))
61f723
+        assert False
61f723
+
61f723
+
61f723
 if __name__ == '__main__':
61f723
     # Run isolated
61f723
     # -s for DEBUG mode
61f723
-- 
61f723
2.9.5
61f723